Skip to main content
Springer logoLink to Springer
. 2022 Feb 1;84(8):2271–2291. doi: 10.1007/s00453-021-00923-7

Vertex Deletion into Bipartite Permutation Graphs

Łukasz Bożyk 1, Jan Derbisz 2, Tomasz Krawczyk 2, Jana Novotná 1,3, Karolina Okrasa 1,4,
PMCID: PMC9304081  PMID: 35880199

Abstract

A permutation graph can be defined as an intersection graph of segments whose endpoints lie on two parallel lines 1 and 2, one on each. A bipartite permutation graph is a permutation graph which is bipartite. In this paper we study the parameterized complexity of the bipartite permutation vertex deletion problem, which asks, for a given n-vertex graph, whether we can remove at most k vertices to obtain a bipartite permutation graph. This problem is NP-complete by the classical result of Lewis and Yannakakis [20]. We analyze the structure of the so-called almost bipartite permutation graphs which may contain holes (large induced cycles) in contrast to bipartite permutation graphs. We exploit the structural properties of the shortest hole in a such graph. We use it to obtain an algorithm for the bipartite permutation vertex deletion problem with running time O(9k·n9), and also give a polynomial-time 9-approximation algorithm.

Keywords: Permutation graphs, Comparability graphs, Partially ordered set, Graph modification problems

Introduction

Many standard computational problems, including maximum clique, maximum independent set, or minimum coloring, which are NP-hard in general, have polynomial-time exact or approximation algorithms in restricted classes of graphs. Due to the practical and theoretical applications, some of such graph classes are particularly intensively studied. Among them are:

  • interval graphs: intersection graphs of intervals on a real line,

  • proper interval graphs: intersection graphs of intervals none of which is contained in another,

  • chordal graphs: intersection graphs of subtrees of a tree,

  • function and permutation graphs: intersection graphs of continuous and linear functions, respectively, defined on the interval [0, 1],

  • comparability graphs: graphs whose edges correspond to the pairs of vertices comparable in some fixed partial order < on the vertex set (such an order is called a transitive orientation of the graph),

  • co-comparability graphs: the complements of comparability graphs.

It is well known that the class of function graphs corresponds to the class of co-comparability graphs [13], and the class of permutation graphs corresponds to the intersection of comparability and co-comparability graphs [24] (see Fig. 1 for the hierarchy of inclusions). All these classes of graphs are hereditary, which means that they are closed under vertex deletion.

Fig. 1.

Fig. 1

Hierarchy of inclusions between graph classes considered in the introduction. An arrow from graph class A to graph class B indicates that AB

Being hereditary is a very useful property in algorithmic design as every hereditary class of graphs can also be uniquely characterized in terms of minimal forbidden induced subgraphs: a graph belongs to a class G if and only if it does not contain any graph from some family F as an induced subgraph. For every graph class introduced above, a characterization by forbidden subgraphs is known, see [8] for perfect graphs, [19] for interval graphs, [12] for comparability and permutation graphs. However, for all of them, the family of forbidden subgraphs is infinite and it may also be quite complex. Moreover, every graph G from any class introduced above is perfect. Grötschel, Lovász, and Schrijver [14] showed that in the class of perfect graphs the maximum clique, the maximum independent set, and the minimum coloring problems can be solved in polynomial time.

Polynomial-time algorithms devised for the above-mentioned graph classes can sometimes be adjusted to also work on graphs that are “close” to graphs from these classes. Usually, the “closeness” of a graph G to a graph class G is measured by the number of operations required to transform G into a graph from the class G, where a single operation consists either on removing a vertex from G or on adding or removing an edge from G. Such an approach leads us to the following generic problem.

Problem: Graph modification problem into a class of graphs G
Input: A graph G (typically not from G) and a number k
Question: Can G be transformed into a graph of the class G
by performing k modifications of an appropriate kind?

Depending on the kind of modifications allowed, we obtain four variants of this problem: vertex deletion problem, edge deletion problem, edge completion problem, and edge edition problem (the latter allowing both deletions and additions of edges). For the class of graphs defined above, all four variants of the modification problem are NP-hard—see [22] for references to NP-hardness proofs. In particular, Lewis and Yannakakis [20] showed that the vertex deletion problem into any non-trivial hereditary class of graphs is NP-hard. This is not surprising, as many classical hard problems can be formulated as vertex deletion problems into particular classes of graphs, for example, Vertex Cover as vertex deletion to edgeless graphs, Feedback Vertex Set as vertex deletion to forests, and Odd Cycle Transversal as vertex deletion to bipartite graphs.

Graph modification problems are a popular research direction in the study of the parameterized complexity of NP-complete problems. In general, for a problem Π, an input of a parameterized problem consists of an instance I of Π and a parameter kN. Then we say that Π is fixed parameter tractable (FPT) if there exists an algorithm deciding whether I is a yes-instance of Π in time f(k)·|I|O(1), where f is some computable function. For a graph modification problem, we often choose the parameter k as a number of allowed modifications, so the instance of such a problem is still a pair (Gk).

It turns out that characterizations by forbidden structures are sometimes useful to design FPT algorithms for graph modification problems. For example, Cai [4] proposed an FPT algorithm for modification problems into classes of graphs characterized by a finite family of forbidden induced subgraphs F. His algorithm identifies a forbidden structure in the input graph (which can be done in polynomial time when F is finite) and branches over all possible ways of modifying that structure. Since the families of forbidden structures are infinite for graph classes introduced above, modification algorithms for these classes have to be much more sophisticated. For several of them modification problems have satisfactory solutions:

  • chordal graphs: all four versions of the modification problem are FPT [7, 23];

  • interval graphs: edge completion and edge deletion are FPT [5, 28], vertex deletion is FPT [7], edge edition remains open;

  • proper interval graphs: all four versions of the modification problem are FPT [6].

On the other hand, it is known that the vertex deletion to perfect graphs is W[2]-hard [15]. It is worth mentioning that for a long time, it was unknown whether there are classes of graphs recognizable in polynomial time for which modification problems are hard. The first such example was given by Lokshtanov [21], who proved that the vertex deletion is W[2]-hard for graphs avoiding all wheels (i.e., cycles with an additional vertex adjacent to all other vertices). It is unknown whether comparability graphs, co-comparability graphs, and permutation graphs have FPT modification algorithms. The class of co-comparability graphs, which constitutes the superclass of interval graphs and an important subclass of perfect graphs, seems to be particularly interesting from the parameterized point of view.

Our focus.Like the class of interval graphs, the class of permutation graphs admits polynomial-time algorithms for rich family problems which are NP-complete in general. Apart from the already mentioned classical hard problems which are polynomial-time solvable for perfect graphs, there also exist polynomial algorithms solving e.g., Hamiltonian Cycle, Feedback Vertex Set or Dominating Set in the class of permutation graphs [3, 9].

In light of the above considerations, since all the modification problems into the class of permutation graphs—and the related classes of comparability and co-comparability graphs—remain open, restricting our attention to the class of bipartite permutation graphs appears to be a natural research direction. Bipartite permutation graphs form an interesting graph class themselves, first investigated by Spinrad, Brandstädt, and Stewart [25], who characterized them by means of appropriately chosen linear orderings of its bipartition classes. One of the most interesting results concerning the bipartite permutation graphs is by Heggernes et al. [16], who showed that the NP-complete problem of computing the cutwidth of a graph (i.e., finding a linear order of the vertices of a graph that minimizes the maximum number of edges intersected by any line inserted between two consecutive vertices) is polynomial for bipartite permutation graphs.

Our algorithm exploits the absence of some forbidden structures in bipartite permutation graphs. Since these structures cannot, in particular, occur in permutation graphs, we believe that besides being a complete result itself, our research is a step towards understanding the parameterized complexity of modification problems into permutation graphs.

Our results. We focus mainly on the modification by vertex deletion.

Theorem 1

There is an O(9k·|V(G)|9)-time algorithm for instances (Gk) of the vertex deletion into bipartite permutation graphs problem.

We prove Theorem 1 in Sect. 4. Our algorithm is based on the characterization of bipartite permutation graphs by forbidden subgraphs. Using the characterization, at first, we get rid of constant-size forbidden subgraphs by branching, which is a standard technique in modification problems on hereditary graph classes [27, 28]. We call graphs without these forbidden subgraphs almost bipartite permutation graphs.

Our main contribution is in the structural analysis of almost bipartite permutation graphs which may contain holes (on more than ten vertices) in contrast to bipartite permutation graphs. This approach is partially inspired by the ideas of van ’t Hof and Villanger [27] who used similar tools in their work on proper interval vertex deletion problem. We use the result of Spinrad, Brandstädt, and Stewart [25], who showed that the vertices of every connected bipartite permutation graph G=(U,W,E) can be embedded into a strip in such a way that the vertices from U are on the bottom edge of the strip, the vertices from W are on the top edge of the strip, the neighbors N(u) of u occur consecutively on the top edge of the strip for every uU (adjacency property), the vertices from N(u)-N(u) occur consecutively on the top edge of the strip for every u,uU (enclosure property), and the analogous properties are satisfied by the vertices in W (see Fig. 2).

Fig. 2.

Fig. 2

Embedding of a bipartite permutation graph (UWE) into a strip satysfying the adjacency and the enclosure properties

Our structural result (see the discussion after Lemma 1) asserts that, depending on the parity of the length of the shortest hole, a connected almost bipartite permutation graph may be naturally embedded in either a cylinder, or a Möbius strip, locally satisfying adjacency and enclosure properties (see Fig. 3).

Fig. 3.

Fig. 3

An embedding of a connected almost bipartite permutation graph in a cylinder or a Möbius strip that locally satisfies the adjacency and enclosure properties

Once we obtain such structure, we show that every minimal vertex cut that destroys all holes lies nearby a few consecutive vertices from the shortest hole. This allows us to check all the possibilities where we can find a minimum cut. Finally, we use a polynomial algorithm for finding maximum flow (and thus a minimum cut).

The approach used to prove Theorem 1 can be slightly modified to obtain a 9-approximation algorithm for the bipartite permutation vertex deletion problem. We show the following.

Theorem 2

There exists a polynomial-time 9-approximation algorithm for vertex deletion into bipartite permutation graphs problem.

Preliminaries

Unless stated otherwise, all graphs considered in this work are simple, i.e., undirected, with no loops and parallel edges. Let G=(V,E) be a graph. For a subset SV, the subgraph of G induced by S is the graph G[S]=(S,{uvuvE,u,vS}). The neighborhood of a vertex uV is the set N(u)={vVuvE}. Similarly, we write N(U)=uUN(u)\U for a set UV. Let u,vV. We say that u and v are at distance k (in G) if k is the length of a shortest path between u and v in G. We denote a complete graph and a cycle on n vertices by Kn and Cn, respectively. By hole we mean an induced cycle on at least five vertices. We say that a hole is even (or odd) if it contains even (odd) number of vertices, respectively.

For a graph G=(V,E), a pair (V,<) is a transitive orientation of G if < is a transitive and irreflexive relation on V that satisfies either u<v or v<u iff uvE for every u,vV.

A partially ordered set (shortly partial order or poset) is a pair P=(X,P) that consists of a set X and a reflexive, transitive, and antisymmetric relation P on X. For a poset (X,P), let the strict partial order <P be a binary relation defined on X such that x<Py if and only if xPy and xy. Equivalently, (X,<P) is a strict partial order if <P is irreflexive and transitive. Two elements x,yX are comparable in P if xPy or yPx; otherwise, xy are incomparable in P. A linear order L=(X,L) is a partial order in which every two vertices x,yX are comparable. A strict linear order (X,<L) is a binary relation defined in a way that x<Ly if and only if xLy and xy.

Let P=(X,P) be a poset. A linear order L=(X,L) is called a linear extension of P if PL. Given a family of posets P={Pi=(X,Pi):iI}, we say that P is the intersection of P if for every x,yX we have xPy if and only if xPiy for every iI. The dimension of a poset P is the minimal number of linear extensions of P that intersect to P. In particular, we say that P is two-dimensional if it is the intersection of two linear extensions of P.

A comparability graph (incomparability graph) of a poset P=(X,P) has X as the set of its vertices and the set including every two vertices comparable (incomparable, respectively) in P as the set of its edges. Note the following: if (X,P) is a poset, then (X,<P) is a transitive orientation of the comparability graph of P. A graph G=(V,E) is a comparability graph (co-comparability graph) if G is a comparability (incomparability, respectively) graph of some poset defined on V. So, G is a comparability graph if and only if G admits a transitive orientation. A graph G is a permutation graph if and only if G and the complement of G are comparability graphs [24] (or equivalently, G and the complement of G admit transitive orientations). Baker, Fishburn, and Roberts [1] proved that G is a permutation graph if and only if G is the incomparability graph of a two-dimensional poset.

We say that two sets X and Y are comparable if X and Y are comparable with respect to -relation (that is, XY or YX holds). We use the convenient (although non-standard) notation [m]:={0,1,,m}, for every mN. For every i,jZ such that ij by [ij] we mean the set {i,i+1,,j}.

The Structure of (Almost) Bipartite Permutation Graphs

The characterization of bipartite permutation graphs presented below was proposed by Spinrad, Brandstädt, and Stewart [25].

Suppose G=(U,W,E) is a connected bipartite graph. A linear order (W,<W) satisfies adjacency property if for each vertex uU the set N(u) consists of vertices that are consecutive in (W,<W). A linear order (W,<W) satisfies enclosure property if for every pair of vertices u,uU such that N(u) is a subset of N(u), vertices in N(u)-N(u) occur consecutively in (W,<W). A strong ordering of the vertices of UW consists of linear orders (U,<U) and (W,<W) such that for every (u,w),(u,w)E, where u,uU, and w,wW, it holds that u<Uu and w<Ww imply (u,w)E and (u,w)E. Note that, whenever (U,<U) and (W,<W) form a strong ordering of UW, then (U,<U) and (W,<W) satisfy the adjacency and enclosure properties.

Theorem 3

(Spinrad, Brandstädt, Stewart [25]) The following three statements are equivalent for a connected bipartite graph G=(U,W,E):

  1. (UWE) is a bipartite permutation graph.

  2. There exists a strong ordering of UW.

  3. There exists a linear order (W,<W) of W satisfying adjacency and enclosure properties.

An example of a bipartite permutation graph G=(U,W,E) with linear order w1<Ww2<W<Ww8<Ww9 of the vertices of W which satisfies the adjacency and the enclosure properties is shown in Fig. 2.

Another characterization of bipartite permutation graphs can be obtained by listing all minimal forbidden induced subgraphs for this class of graphs. Such a list can be compiled by taking all odd cycles of length 3 (forbidden structures for bipartite graphs) and all bipartite graphs from the list of forbidden structures for permutation graphs obtained by Gallai [12]. The whole list is shown in Fig. 4.

Fig. 4.

Fig. 4

Forbidden structures for bipartite permutation graphs

Almost Bipartite Permutation Graphs

The goal of this section is to characterize graphs which do not contain small forbidden subgraphs for the class of bipartite permutation graphs. Following terminology of van ’t Hof and Villanger [27] we call such graphs almost bipartite permutation graphs.

Definition 1

A graph G=(V,E) is an almost bipartite permutation graph if G does not contain T2, X2, X3, K3, Ck for k[5,9] as induced subgraphs.

Suppose G=(V,E) is a connected almost bipartite permutation graph.

Proposition 1

Every hole in G is a dominating set.

Proof

Let C={c0,c1,,cm-1} be a hole in G. Hence, m10. Suppose, for contradiction, that there exists a vertex in the set V\(CN(C)). As G is connected, there must exist vV at distance two from C. Let wN(v)N(C) and let cj be a neighbor of w in C. We now look at the neighborhood of w. As G contains no triangle, wcj-1 and wcj+1 are non-edges. Moreover, as G contains no copy of T2, vertex w is adjacent to at least one of cj-2 and cj+2, say cj-2. Thus, w is nonadjacent to cj-3. Therefore, the set {cj-3,cj-2,cj-1,cj,cj+1,w,v} induces a copy of X2 in G, which leads to a contradiction.

Let C be a shortest hole in G, m be the size of C, and c0,c1,,cm-1 be the consecutive vertices of C, m10. In the remaining part of the paper we use the following notation with respect to C. For any integral number i by ci we denote the unique vertex cimodm from the cycle C. For any two different vertices ci,cj in C, by the set of all vertices between ci and cj from C we mean the set {ci,ci+1,,ci+k}, where k is the smallest natural number such that ci+k=cj. Note that this notion is not symmetric, i.e., the set of all vertices between cj and ci from C contains ci,cj and all the vertices from C that are not between ci and cj.

Proposition 2

For every vertex vV either:

  1. N(v)C={ci} for some i[m-1], or

  2. N(v)C={ci,ci+2} for some i[m-1].

Proof

Since C is an induced cycle, (2) clearly holds for the vertices from C, so let v be a vertex in V\C. As C is a dominating set, by Proposition 1, vertex v has at least one neighbor in C. If v has exactly one neighbor in C, then (1) holds and we are done. So assume that it has more than one neighbor. We now distinguish two cases. First, suppose that there exist two vertices cj,cN(v)C at distance at least three in C such that v has no neighbor in the set of vertices between cj and cl, except cj and cl. Then, {cj,cj+1,,c,v} induces a cycle C on at least five vertices in G. As cj and c are at distance at least three in C, C is shorter than C. In particular, C contradicts either G containing no copy of C, for {5,,9}, or C being a shortest hole in G. Therefore, this case never occurs.

Hence, v has either (i) exactly two neighbors in C and those are at distance two as there is no triangle in G, so (2) holds, or (ii) C has an even number of vertices and v is adjacent to every second vertex of C. It remains to show that the latter never occurs. Indeed, if it does, then without loss of generality c0N(v). But observe that since C has at least ten vertices, the set {c0,c1,c2,c3,c4,c6,v} induces a copy of X3. This concludes the proof.

Given Proposition 2, for every i[m-1] we can set Ai={vV:N(v)C={ci-1,ci+1}} and Bi={vV:N(v)C={ci}}. Note that sets A0,B0,,Am-1,Bm-1 form a partition of V. Moreover, for every i[m-1] we have ciAi. Following our notation, for any integer i by Ai and Bi we denote the sets Aimodm and Bimodm, respectively. Furthermore, for every ij we set:

AG[i,j]=AiBi+1Ai+2Bi+3Aj-1Bjif j-i is odd,AiBi+1Ai+2Bi+3Bj-1Ajif j-i is even,BG[i,j]=BiAi+1Bi+2Ai+3Bj-1Ajif j-i is odd,BiAi+1Bi+2Ai+3Aj-1Bjif j-i is even,andVG[i,j]=AG[i,j]BG[i,j].

We write just A[ij], B[ij], and V[ij], respectively, instead of AG[i,j], BG[i,j], and VG[i,j], when there is no confusion.

We now characterize the neighborhoods of the vertices in sets Ai and Bi, see also Fig. 5.

Fig. 5.

Fig. 5

A possible neighborhood of u in Ai and w in Bi

Proposition 3

Let i[m-1]. Then:

  1. Ai and Bi are independent sets.

  2. For every uAi and every wBi we have uwE.

  3. For every uAi we have BiN(u)B[i-2,i+2].

  4. For every wBi we have AiN(w)A[i-2,i+2].

Proof

Statement (1) follows trivially from the fact that G contains no triangle. To show statement (2), assume for a contrary that uwE for some uAi and some wBi. Since uAi, we have N(u)C={ci-1,ci+1}, and since wBi we have N(w)C={ci}. Hence, the set {ci-2,u,ci,ci+2,ci-1,w,ci+1} induces an X2 in G, which cannot be the case.

To prove statements (3) and (4), consider a graph G induced by the set UW, where

U=A[i-2,i+2]andW=B[i-2,i+2].

Since any edge with two endpoints in U (or two endpoints in W) could be extended by some vertices from {ci-2,ci-1,ci,ci+1,ci+2} to an odd cycle of size 7 in G, the graph G[UW] is bipartite with bipartition classes U and W.

To see that (3) holds, first note that BiN(u) by statement (2). Therefore, suppose that u has a neighbor v in the set V\(UW).

Consider the case when vAj for some j[i-2,i+2]. Since N(u)C={ci-1,ci+1} and N(v)C={cj-1,cj+1}, uv and the vertices between cj+1 and ci-1 in C as well as uv and the vertices between ci+1 and cj-1 in C induce cycles in G of size m-2. Since |C|10, at least one from these cycles has size 6, and as such it cannot occur in G.

So suppose vBj for some j[i-2,i+2]. Since N(v)C={cj}, uv and the vertices between ci+1 and cj in C as well as uv and the vertices between cj and ci-1 in C induce holes in G of size m-2, and as such they cannot occur in G. So, N(u)W, which completes the proof of statement (3).

Statement (4) is proved by similar arguments.

Proposition 3 asserts that all the neighbors of the vertices from Ai and from Bi are contained in the set B[i-2,i+2] and A[i-2,i+2], respectively. The next proposition describes the relations that hold between the neighborhoods of the vertices from B[i-2,i+2] restricted to the set Ai and between the neighborhoods of the vertices from A[i-2,i+2] restricted to the set Bi.

Proposition 4

Let i[m-1]. For (i±2,i±1){(i-2,i-1),(i+2,i+1)}, the following hold:

  1. For every w,wBi±2Ai±1 the sets N(w)Ai and N(w)Ai are comparable.

    Moreover, if wBi±2 and wAi±1, then N(w)AiN(w)Ai.

  2. For every u,uAi±2Bi±1 the sets N(u)Bi and N(u)Bi are comparable.

    Moreover, if uAi±2 and uBi±1, then N(u)BiN(u)Bi.

Proof

To prove (1), we consider the case (i±2,i±1)=(i-2,i-1), as the other one follows by symmetry. Suppose that w,wBi-2Ai-1 are such that neither N(w)AiN(w)Ai nor N(w)AiN(w)Ai holds. It means that there are u,uAi such that wuE, wuE, wuE, and wuE. Since w,wBi-2Ai-1, we have ci-2w,ci-2wE and ci-4w,ci-3w,ci-4w,ci-3wE. Furthermore, wwE and uuE as G contains no triangle. Consequently, the set {ci-3,w,w,ci-4,ci-2,u,u} induces a copy of T2 in G, which cannot be the case. Moreover, if wBi-2, wAi-1, then since ci(N(w)Ai)\(N(w)Ai), the latter statement holds.

To show (2), we again only consider the case (i±2,i±1)=(i-2,i-1). Suppose that u,uAi-2Bi-1 are such that neither N(u)BiN(u)Bi nor N(u)BiN(u)Bi holds. It means that there are w,wBi such that uw,uwE and uw,uwE. Since u,uAi-2Bi-1, we have uci-1,uci-1E and uci+1,uci+1E. Furthermore, uuE and wwE as G contains no triangle. Hence, the set {ci-1,w,w,ci+1,u,ci,u} induces a copy of X3 in G, which cannot be the case.

To see the second part of the statement, assume that N(u)BiN(u)Bi for some uAi-2, uBi-1. That is, there is wBi such that uwE and uwE. In particular, it means that uci-2. Note that uci-1,uci-1E. Consequently, the set {ci-3,ci-2,ci-1,ci,u,u,w} induces a copy of X3 in G, which is a contradiction.

Proposition 4 allows us to order vertices of Ai based on two properties. We now define relation <Ai which combines them and we show that <Ai is a partial order (see Fig. 6 for an illustration). We define for every u,uAi:

u<Aiuiffthere iswBi-2Ai-1such thatuN(w)anduN(w),orthere iswAi+1Bi+2such thatuN(w)anduN(w),

Similarly, we define a relation <Bi for every w,wBi:

w<Biwiffthere isuAi-2Bi-1such thatwN(u)andwN(u),orthere isuBi+1Ai+2such thatwN(u)andwN(u).
Fig. 6.

Fig. 6

The neighborhoods of the vertices from Bi-2Ai-1Ai+1Bi+2 restricted to Ai. We have u1<Ai{u2,u3}<Aiu4<Aiu5<Aiu6<Aiu7

Proposition 5

The following statements hold for every i[m-1]:

  1. (Ai,<Ai) is a strict partial order. Moreover, u,uAi are incomparable in (Ai,<Ai) if and only if N(u)=N(u).

  2. (Bi,<Bi) is a strict partial order. Moreover, w,wBi are incomparable in (Bi,<Bi) if and only if N(w)=N(w).

Proof

Let i[m-1] be fixed. To prove that (Ai,<Ai) is a strict partial order, we need to show that <Ai is irreflexive and transitive. The irreflexivity follows from the definition, in aim to show transitivity, we first prove that <Ai is antisymmetric. Suppose for a contrary that there are u,uAi such that u<Aiu, and u<Aiu. Suppose u<Aiu is witnessed by a vertex wBi-2Ai-1 such that uN(w) and uN(w); the other case wAi+1Bi+2 is analogous. By Proposition 4.(1), there is no wBi-2Ai-1 such that uN(w) and uN(w). Hence, since u<Aiu, there must be a vertex wAi+1Bi+2 such that uN(w) and uN(w). We have uci+1,uci+1E and uci+2,uci+2,uci+3,uci+3E as {u,u}Ai. We have also wci+1,wci+2,wci+3,wci+1,wci+3E and wci+2E as wBi-2Ai-1 and wAi+1Bi+2. Moreover, uu,wwE, by Proposition 3. Consequently, the set {w,w,ci+1,ci+3,u,u,ci+2} induces a copy of X2 in G, which cannot be the case.

To show transitivity, suppose for a contrary that there are vertices u,u,uAi such that u<Aiu and u<Aiu, but u<Aiu does not hold. Suppose u<Aiu is witnessed by a vertex wBi-2Ai-1 such that uN(w) and uN(w); the other case wAi+1Bi+2 is symmetric. We have uN(w) as otherwise u<Aiu, by definition. Suppose u<Aiu is witnessed by a vertex wBi-2Ai-1Ai+1Bi+2. Note that if wBi-2Ai-1, then uN(w) and uN(w), which enforces also uN(w) as u<Aiu and we already proved that <Ai is antisymmetric. Thus, uN(w) and uN(w), which shows u<Aiu. Hence, we must have wAi+1Bi+2, and so uN(w) and uN(w). Moreover, uN(w) as otherwise u<Aiu. As {u,u}Ai, wBi-2Ai-1, and wAi+1Bi+2, we have uu,wwE, by Proposition 3. Consequently, {w,w,ci+1,ci+3,u,u,ci+2} induces a copy of X2 in G, which is not possible. We conclude that (Ai,<Ai) is a strict partial order.

By definition, if N(u)=N(u), then u and u are incomparable in (Ai,<Ai). Hence, for the second statement of (1), it is enough to show that N(u)N(u) implies that u and u are comparable in (Ai,<Ai). Let w be a vertex such that wuE and wuE. By Proposition 3.(2) and (3), wBi-2Ai-1Ai+1Bi+2. However, if wBi-2Ai-1 then u<Aiu and if wAi+1Bi+2 then u<Aiu, by definition. Hence, u and u are comparable in <Ai.

The proof of (2) is similar. For antisymmetry, suppose that we have w,wBi such that w<Biw and w<Biw. Let w<Biw and w<Biw be witnessed by u and u from Ai-2Bi-1Bi+1Ai+2, respectively. Analogously to (1), by Proposition 4.(2), we can assume that uAi-2Bi-1 and uBi+1Ai+2 and uw,uwE, uw,uwE. Observe that the set {ci-1,w,w,ci+1,u,ci,u} induces a copy of X3 in G, a contradiction.

For transitivity of <Bi, suppose that for some w,w, and wBi we have w<Biw and w<Biw, but w<Biw does not hold. By symmetry of the proof of (1), we reach the case uAi-2Bi-1 and uBi+1Ai+2, uw,uw,uw,uwE and uw,uwE. Then, one can easily check that the set {w,w,ci+1,u,ci,u,ci+2} induces a copy of X2 in G, a contradiction.

Now, assume that N(w)N(w). Without loss of generality assume that there exists uAi-2Bi-1Bi+1Ai+2 such that uN(w)\N(w). Analogously as before, observe that if uAi-2Bi-1 then w<Biw and if uBi+1Ai+2 then w<Biw. Therefore, w and w are comparable, which finishes the proof.

Finally, for every i[m-1] we order arbitrarily the elements inside every antichain of (Ai,<Ai) and of (Bi,<Bi), obtaining strict linear orders (Ai,<Ai) and (Bi,<Bi). We introduce a binary relation defined on the set V, such that vv for v,vV if one of the following conditions holds for some i[m-1]:

  • v,vAi, v<Aiv, and v,v are consecutive in (Ai,<Ai),

  • v,vBi, v<Biv, and v,v are consecutive in (Bi,<Bi),

  • v is the maximum of (Ai,<Ai) and v is the minimum of (Bi+1,<Bi+1),

  • v is the maximum of (Bi,<Bi) and v is the minimum of (Ai+1,<Ai+1).

Informally, to get an embedding of G into a cylinder (the shortest hole is even) or into a Möbius strip (the shortest hole is odd) which locally satisfies the adjacency and the enclosure properties, we place the vertices v,v satisfying vv next to each other, v before v assuming that the border of the cylinder or the Möbius strip are oriented as shown in Fig. 3. In what follows we extend relation as follows:

  • For every VV by <V we denote the transitive closure of restricted to V,

  • For v,vV we set v<clv if v,vA[i-2,i+2] and v<A[i-2,i+2]v for some i[m-1] or v,vB[i-2,i+2] and v<B[i-2,i+2]v for some i[m-1].

Finally, the following lemma characterizes the global structure of an almost bipartite permutation graph.

Lemma 1

Let ij be such that ij, |j-i|=m-3. Let U=A[i,j] and W=B[i,j]. Then G[UW] is a bipartite permutation graph with bipartition classes U and W.

Moreover, (U,<U) and (W,<W) are strict linear orders that satisfy the adjacency and enclosure properties in G[UW].

Proof

Proposition 3 asserts there is no edge between a vertex in V[j-1,j] and a vertex in V[i,i+1]. In particular, G[UW] is a bipartite graph and (U,<U) and (W,<W) are strict linear orders. Given Theorem 3.(c), to prove the lemma we need to show that (W,<W) satisfies the adjacency and enclosure properties in G[UW].

To prove the adjacency property, consider uAkU for some suitable k. Recall that by Proposition 3.(3), BkN(u)B[k-2,k+2]. To show that N(u) consists of consecutive vertices in W it suffices to note that:

  • if wAk+1, wBk+2 and uwE then uwE, by Proposition 4,

  • if w,wAk+1 (resp. w,wBk+2) are such that w<Ak+1w (resp. w<Bk+2w) and uwE, then uwE, by Proposition 5,

and that analogous statements hold by symmetry for the part of N(u) contained in Ak-1Bk-2. If uBkU, the case analysis is similar (one needs to swap letters A and B in the reasoning above). Therefore, the adjacency property is proved.

To show that (W,<W) satisfies the enclosure property assume for a contradiction that there are w,w,wW and u,uU such that N(u)N(u), w<Ww<Ww and uw,uw,uwE, uwE, and uw,uwE.

Claim

There is k[i,j] such that either u,uAk, or u,uBk.

Proof of Claim

If uBk, then since N(u)CN(u)C={ck}, we have uBk, so the claim holds. Therefore, assume that uAk, and suppose that uAk. Then N(u)CN(u)C={ck-1,ck+1}. Assuming u<Uu (the other case is symmetric), we have that uBk+1. Due to Proposition 3 and w<Ww we have w,wA[k-1,k+2]. Moreover, as we already proved that N(u) is consecutive in (W,<W) (adjacency property), and ck+1N(u), we have ck+1<Ww. Therefore wAk+1Bk+2. Note that:

  • if wBk+2, then, since uwE, we have that wN(u)Bk+2. However, by Proposition 4.(2), we have N(u)Bk+2N(u)Bk+2, so it implies that uwE, a contradiction,

  • if wAk+1, then by Proposition 3.(2) we would have uwE, a contradiction.

This concludes the proof of claim.

Suppose u,uAk. Since uw,uwE and uck-1,uck+1E, we have by adjacency property of (W,<W) that w<Wck-1<Wck+1<Ww. Therefore, we must have wBk-2Ak-1 and wAk+1Bk+2. Observe that w witnesses that u<Aku by definition, however, w witnesses the opposite, that is u<Aku. We have a contradiction by Proposition 5.

Suppose u,uBk. An analysis, which is analogous to the one in the previous case (again, it is enough to swap letters A and B in that reasoning above), gives us that we must have wAk-2Bk-1 and wBk+1Ak+2. Again, we obtain a contradiction by the definition of <Bk and Proposition 5.

Lemma 1 provides an interesting view on classification of almost bipartite permutation graphs. Specifically, if m is even, then the graph may be drawn on a cylinder, whose boundary consists of two closed curves, one of which traverses the vertices of A0,B1,Am-2,Bm-1, and the second one—the vertices of B0,A1,,Bm-2,Am-1. If in turn m is odd, then the graph can be represented on a Möbius strip, whose boundary traverses the vertices of A0,B1,,Bm-2,Am-1 and then B0,A1,Am-2,Bm-1. In both cases we draw the vertices of Ai and of Bi on the opposite side of the strip according to the orders given by <Ai and <Bi, for i[m-1] (recall Fig. 3).

The following definitions are taken from [27]. A hole cut of G is a vertex set XV such that G-X is a bipartite permutation graph. Lemma 1 asserts that for every i[m-1] the set V[i,i+1] is a hole cut in G. A hole cut X of G is minimum if G does not have a hole cut whose size is strictly smaller than the size of X. A hole cut X of G is minimal if any proper subset of X is not a hole cut in G.

The next proposition describes the structure of every hole in G.

Proposition 6

Suppose C is a hole of size t in G for some tm. Then, the consecutive vertices of C can be labeled by c0,c1,,ct-1 so as the following conditions hold (the indices are taken modulo k):

  • cici+1E for every i[t-1],

  • ci<clci+2 for every i[t-1],

  • {cC:ci<clc<clci+2}= for every i[t-1].

Proof

Let c0, c1, c2, , ct-1 be consecutive vertices of C denoted in such a way that c0<clc2. We can assume it, since c0,c2N(c1), thus, by Proposition 3.(3) and (4), both c0,c2 belong to A[-2,+2] or both belong to B[-2,+2] for some [m-1].

Now, we show that if there exists j[t-1] such that cj<clcj+2, then cj+1<clcj+3. Suppose, for contradiction that cj<clcj+2 and cj+1clcj+3. Let i[m-1] be such that cj+2(AiBi). Similarly, as cj+1,cj+3N(cj+2), either cj+1,cj+3B[i-2,i+2] if cj+2Ai or cj+1,cj+3A[i-2,i+2] if cj+2Bi. In both cases Lemma 1 implies that <cl restricted to V[i-4,i+2] is a strong ordering of G[V[i-4,i+2]]. Moreover, cj+1,cj+3 are comparable in <cl, by Proposition 3.(3) or (4), and the definition of <cl. Since we assumed that cj+1clcj+3, we must have cj+3<clcj+1, and from Theorem 3.(b) we get that cjcj+3E, so C has a chord—contradiction. Therefore cj<clcj+2 implies cj+1<clcj+3 for every integer j. Applying the above observation repeatedly for j=0,1,2,, we get that c0<clc2<clc4<cl and c1<clc3<clc5<cl

For the last property, suppose for the sake of contradiction that there exists j{i,i+2} such that ci<clcj<clci+2. Then, by Lemma 1, cjci+1E due to the adjacency property. But then the edge cjci+1 is a chord in C. This completes the proof.

The structure of holes described above asserts that for every i[m-1] the sets A[i-2,i+2] and B[i-2,i+2] are hole cuts. We use this observation to prove the following statement about minimal hole cuts in G.

Proposition 7

Every minimal hole cut X in G is fully contained in the set V[i-2,i+2] for some i[m-1].

Proof

Let X be a minimal hole cut. Since X is minimal, we can choose elements z1,x1,x2,z2 in V such that the following conditions hold:

  • we have z1x1clx2z2, the set X={x:x1clxclx2} is non-empty and is contained in X, and the elements z1,z2 are not in X.

Note that either {z1,z2}XB[i-2,i+2] or {z1,z2}XA[i-2,i+2] for some i[m-1]. Otherwise, we have B[j,j+3]X or A[j,j+3]X for some j[m-2]. However, Proposition 6 and Proposition 3.(3) and (4) imply that the sets A[j,j+3] and B[j,j+3] are hole cuts for every j[m-1]. Otherwise, the set A[j,j+3] (B[j,j+3]) is contained in the neighbourhood of some vertex of a hole avoiding A[j,j+3] (B[j,j+3], respectively) in G and the neighborhood of this vertex intersects also Bj-1 and Aj+4 (Aj-1 and Bj+4, respectively), which cannot be the case due to Proposition 3.(3) and (4). So, we have either B[j,j+3]=X=X or A[j,j+3]=X=X as X is a minimal hole cut. But then, we have XV[j,j+3], which completes the proof of our claim.

Therefore, for the rest of the proof we assume {z1,z2}XB[i-2,i+2]; the other case is proved similarly. Moreover, we may assume that i is picked such that:

  • z1B[i-2,i], z2B[i,i+2], and XB[i-2,i+2].

See Fig. 7 for an illustration.

Fig. 7.

Fig. 7

Illustration of the proof: the cycle C is marked with a dashed line. The set X is shaded

Suppose Y is the set consisting of all the neighbors of both z1 and z2; that is, Y=N(z1)N(z2). Clearly, we have YA[i-2,i+2]. To complete the proof of the proposition we show that:

  • every element of Y is a member of X,

  • XY is a hole cut in G.

Then, since XX, we have XY=X by minimality of X and consequently XV[i-2,i+2]. So, it remains to prove the claims about the set Y.

Suppose we have yY such that yX. We fix some xX, clearly, since X is a minimal hole cut, there is a hole C in G-(X\{x}). Note that C must contain x. Suppose c0,,c-1 for some 9 are consecutive vertices in C chosen such that cj<clcj+2 for every j[-1] (indices are taken modulo ). Now we pick p,q[-1] such that cp<clz1clcp+2 and cqclz2<clcq+2. Since xC, we have cp+2clx and xclcq. Note that cp+1 is adjacent to z1 and cq+1 is adjacent to z2 due to the adjacency property. Next we replace in C all the vertices between cp+2 and cq (this set includes x) with the vertices z1,y,z2 and we obtain a cycle C containing no elements from X. Clearly, we can easily find a hole among the elements from C that avoids all the elements from X. This yields a contradiction as X is a hole cut.

To prove the second claim, suppose there is a hole C in G-(XY). By Proposition 6 there are c1,c2,c3C such that c1<clX<clc3 and c1,c3N(c2). However, since c1clz1<clz2clc3 and c1,c3N(c2), we have z1N(c2) and z2N(c2). So, we have c2Y, which is a contradiction.

Proof of Theorem 1

The aim of this section is to provide a complete proof of Theorem 1 using structural results from the previous section. Let us start by showing that the Bipartite Permutation Vertex Deletion problem can be decided in polynomial time on almost bipartite permutation graphs.

Lemma 2

Let (Gk) be an instance of Bipartite Permutation Vertex Deletion where G is an n-vertex almost bipartite permutation graph. Then Bipartite Permutation Vertex Deletion can be decided in time O(n6).

Proof

If G is a bipartite permutation graph, (Gk) is a yes-instance, thus, we are done in this case. If G is not connected, we can consider each connected component independently and, at the end, we compare k with the total number of deleted vertices over all components. Let G be a connected r-vertex component of G such that G is not a bipartite permutation graph (otherwise, clearly, no vertex needs to be deleted). Let C={c0,,cm-1} be a shortest hole in G (it exists as G is not a bipartite permutation graph). It can be found in time O(r6) as follows. We iterate over all possible four-element subsets S={v1,v2,v3,v4} of V(G). For these S for which G[S] is an induced P4, with consecutive vertices v1,v2,v3,v4, we construct a graph G~ by removing the vertices from (N(v2)N(v3))\{v1,v4} (note that v2 and v3 also get removed). Then we find a shortest v1-v4-path in G~ in time O(r2).

By Proposition 7, every minimal hole cut X in G is contained in the set V=VG[i-2,i+2] for some i[m-1]. Therefore, we may check all the possibilities where a minimal cut is contained. For every i, we run an algorithm for finding a maximum flow in the following digraph Hi.

Digraph Hi has the vertex set V×{in,out}{s,t} and arc set consisting of:

  • all arcs of the form (u,out)(v,in), where uv is an edge of G[V],

  • s(v,in) if there exists uVG[i-4,i-3] such that uv is an edge of G,

  • (u,out)t if there exists vVG[i+3,i+4] such that uv is an edge of G,

  • (u,in)(u,out) for all uV.

Set capacities of arcs of the form (u,in)(u,out) to 1 and capacities of all the remaining arcs to (practically |VG|). It is readily seen that minimum (st)-cut in the defined network Hi corresponds to minimum hole cut in G[V] (arc of unit capacity (u,in)(u,out) naturally corresponds to the vertex u of G).

Therefore it remains to apply classical max-flow algorithm to each Hi for i[m-1] and remember the smallest size kG of minimal (st)-cuts. This can be performed in time O(m·(|V|+2)·(|EG[V]|+2|V|)2)=O(r6) [11]. Finally, (Gk) is a yes-instance if and only if the sum of remembered sizes kG over the all considered connected components G is at most k. Clearly, the total running time is O(n6).

We now propose the algorithm. Given an n-vertex graph G=(V,E) and number k, we want to answer the Bipartite Permutation Vertex Deletion problem. We say that (Gk) is the initial instance. We split our algorithm into two parts. The first part consists of a branching algorithm for deletion to almost bipartite permutation graphs. The output of the first part is a set of instances (G,k) where G is an almost bipartite permutation graph and 0kk (or no-answer is no such instance exists) such that the initial instance (Gk) is a yes-instance if and only if at least one of these instances is a yes-instance. In the second part, the algorithm runs an O(n6)-time algorithm for Bipartite Permutation Vertex Deletion for each instance (G,k) output by the first phase.

Let us start with the first part. We say that XV is a forbidden set if G[X] is isomorphic to one of the graphs: K3,T2,X2,X3,C5,C6,C7,C8,C9. We define the following rule.

  • Rule

    : Given an instance (Gk), k1, and a minimal forbidden set X, branch into |X| instances, (G-v,k-1) for each vX.

Starting with the initial instance, the algorithm applies the rule exhaustively. In other words, the algorithm forms a branching tree with leaves corresponding to instances (G,k) where k=0 or G is an almost bipartite permutation graph. Clearly, as at least one vertex from each forbidden set must be removed from G, the initial instance is a yes-instance if and only if at least one of the leaves is a yes-instance.

The algorithm continues to the second part only with such leaves (G,k) that G is an almost bipartite permutation graph (as otherwise, the leaf is no-instance). It runs the algorithm described in Lemma 2 to find if G can be transformed into a bipartite permutation graph by using at most k vertex deletions. It either finds a yes-instance or concludes after checking all the instances that there is no solution; that is, the initial instance is a no-instance.

We note that such a branching into a bounded number of smaller instances is a standard technique, see e.g., [27] for more details.

We now analyze the running time of the whole algorithm. In the first part, observe that the branching tree has depth at most k and has at most 9k leaves, as k decreases by one whenever the algorithm branches and each of the listed forbidden subgraphs has at most nine vertices. Therefore the total number of nodes in the branching tree is O(9k). Moreover, in each node (G,k) the algorithm works in time O(n9) as it checks if G contains a forbidden set of size at most 9. So, the first part works in time O(9k·n9). In the second part, the algorithm does a work O(n6) in each of at most 9k leaves, by Lemma 2. Thus, the second part works in time O(9k·n6). We conclude that the total running time of our algorithm for Bipartite Permutation Vertex Deletion is O(9k·n9).

Proof of Theorem 2

In this section, we provide a proof of Theorem 2. The idea of the algorithm is very similar to the FPT algorithm described in Sect. 4.

Let G=(V,E) be a graph and let YV be a subset of vertices of G such that G-Y is a bipartite permutation graph. We want to construct a set ZV in polynomial time such that G-Z is a bipartite permutation graph and |Z|9|Y|. We construct Z as follows. We start with Z=. Then, as long as G-Z contains a set X isomorphic to one of K3,T2,X2,X3,C5,C6,C7,C8,C9 we add all vertices of X to Z. Observe that YX and |X|9.

After this step G-Z is an almost bipartite permutation graph. Note that |Z|9|ZY|. We find a shortest hole C={c0,,cm-1} in G-Z and find a minimum hole cut X as described in Sect. 4. Since (Y-Z) is a hole cut in G-Z we have |X||Y-Z|. We add X to Z. Observe that G-Z is a bipartite permutation graph.

Since K3,T2,X2,X3,C5,C6,C7,C8,C9 have at most 9 vertices, we have that |Z|9|Y|. This implies that the above algorithm is a 9-approximation algorithm. It runs in polynomial time because finding small forbidden subgraphs can be done in polynomial time and finding a minimum hole cut in an almost bipartite permutation graph can be done in polynomial time.

Conclusion

In this paper we investigate for the first time the modification problems in graph classes related to partial orders. Our main result says that the bipartite permutation vertex deletion problem is fixed parameter tractable. We leave open the following two questions that inspired our research.

Problem 1

What is the parameterized status of the vertex deletion problems to the class of permutation graphs and to the class of co-comparability graphs?

We recall that, due to the result of Lewis and Yannakakis [20], both of these problems are NP-complete. Problem 1 appears to be difficult; in particular, in contrast to bipartite permutation graphs, in which sufficiently large forbidden structures are just cycles, arbitrarily large forbidden structures for permutation graphs and co-comparability graphs may belong to several different infinite families of graphs. One of the most important results of our work is the description of the structure of almost bipartite permutation graphs, which are defined as graphs which do not induce small graphs from the list of forbidden structures for bipartite permutation graphs. In a similar fashion we can define the class of almost permutation and almost co-comparability graphs. Although the families of forbidden structures for permutation graphs and co-comparability graphs are quite complex, the next two questions seem very natural in order to solve Problem 1.

Problem 2

What is the structure of almost permutation and almost co-comparability graphs?

We are aware that the two problems mentioned above can be quite difficult. Therefore, it is worth considering intermediate problems that may be easier to attack. One of the proposed simplifications relies on the transition from the world of graphs to the world of posets. The following vertex deletion into two-dimensional posets problem seems very natural in the context of our research: we are given in the input a poset P and a number k and we ask whether we can delete at most k points from P so that the remaining points induce a two-dimensional poset in P.

Problem 3

What is the parameterized status of the vertex deletion into two-dimensional poset problem?

Since permutation graphs are co-comparability graphs of two-dimensional posets and since permutation graphs are both comparability and co-comparability graphs, the vertex deletion into two-dimensional poset problem is equivalent to the vertex deletion into co-comparability graph (or into permutation graph) problem if we assume that only comparability graphs can be given in the input. The class of two-dimensional posets is very well understood; in particular, the list of minimal forbidden structures for this class of posets, which is still infinite, is known (obtained independently by Trotter and Moore [26] and by Kelly [18]). Of course, it is natural to ask the following question:

Problem 4

What is the structure of almost two-dimensional posets?

Since the comparability graphs of posets do not contain odd holes of size 5, we know the structure of almost two-dimensional posets that are bipartite. Indeed, these are the posets whose comparability graphs are almost bipartite permutation graphs embeddable into cylinder stripes. The last problem we want to ask is as follows:

Problem 5

Is there a polynomial kernel for the bipartite permutation vertex deletion problem?

A positive answer to this question obtained by indicating so-called irrelevant vertices may give some hope to solve Problem 1 with the use of irrelevant vertex technique.

Acknowledgements

When this paper was under review, Problem 5 has been solved independently by Kanesh, Madathil, Sahu, Saurabh, and Verma [17] and by Derbisz [10].

The authors are grateful to Bartosz Walczak for valuable comments and help with merging two groups of researchers working on similar projects into one. They also would like to thank the anonymous reviewers for their helpful comments.

Open Access

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Footnotes

The extended abstract of the work was presented on IPEC 2020 [2]. Ł.B., J.N., and K.O. were supported by the project CUTACOMBS that has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme, grant agreement 714704. Their research was partially carried out during the Parameterized Algorithms Retreat of the University of Warsaw, PARUW 2020, held in Krynica-Zdrój in February 2020. T.K. was partially supported by Polish National Science Center (NCN) grant 2015/17/B/ST6/01873. J.N. was supported by the student grant SVV-2020-260578.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Łukasz Bożyk, Email: l.bozyk@uw.edu.pl.

Jan Derbisz, Email: jan.derbisz@doctoral.uj.edu.pl.

Tomasz Krawczyk, Email: krawczyk@tcs.uj.edu.pl.

Jana Novotná, Email: janca@kam.mff.cuni.cz.

Karolina Okrasa, Email: k.okrasa@mini.pw.edu.pl.

References

  • 1.Baker KA, Fishburn PC, Roberts FS. Partial orders of dimension 2. Networks. 1972;2(1):11–28. doi: 10.1002/net.3230020103. [DOI] [Google Scholar]
  • 2.Bożyk, L., Derbisz, J., Krawczyk, T., Novotná, J., Okrasa, K.: Vertex Deletion into Bipartite Permutation Graphs. In: 15th International Symposium on Parameterized and Exact Computation (IPEC 2020), Leibniz International Proceedings in Informatics (LIPIcs), vol. 180, pp. 5:1–5:16. Schloss Dagstuhl–Leibniz-Zentrum für Informatik, Dagstuhl, Germany (2020). 10.4230/LIPIcs.IPEC.2020.5. https://drops.dagstuhl.de/opus/volltexte/2020/13308
  • 3.Brandstädt, A., Kratsch, D.: On the restriction of some NP-complete graph problems to permutation graphs. In: Fundamentals of Computation Theory, FCT ’85, Cottbus, GDR, September 9-13, 1985. Lecture Notes in Computer Science, vol. 199, pp. 53–62. Springer (1985). 10.1007/BFb0028791
  • 4.Cai L. Fixed-parameter tractability of graph modification problems for hereditary properties. Inf. Process. Lett. 1996;58(4):171–176. doi: 10.1016/0020-0190(96)00050-6. [DOI] [Google Scholar]
  • 5.Cao, Y.: Linear recognition of almost interval graphs. In: Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, pp. 1096–1115. SIAM (2016). 10.1137/1.9781611974331.ch77
  • 6.Cao Y. Unit interval editing is fixed-parameter tractable. Inf. Comput. 2017;253:109–126. doi: 10.1016/j.ic.2017.01.008. [DOI] [Google Scholar]
  • 7.Cao Y, Marx D. Chordal editing is fixed-parameter tractable. Algorithmica. 2016;75(1):118–137. doi: 10.1007/s00453-015-0014-x. [DOI] [Google Scholar]
  • 8.Chudnovsky, M., Robertson, N., Seymour, P., Thomas, R.: The strong perfect graph theorem. Ann. Math. pp. 51–229 (2006)
  • 9.Deogun JS, Steiner G. Polynomial algorithms for hamiltonian cycle in cocomparability graphs. SIAM J. Comput. 1994;23(3):520–552. doi: 10.1137/S0097539791200375. [DOI] [Google Scholar]
  • 10.Derbisz, J.: A polynomial kernel for vertex deletion into bipartite permutation graphs. CoRR arXiv:2111.14005 (2021) [DOI] [PMC free article] [PubMed]
  • 11.Edmonds J, Karp RM. Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM (JACM) 1972;19(2):248–264. doi: 10.1145/321694.321699. [DOI] [Google Scholar]
  • 12.Gallai T. Transitiv orientierbare graphen. Acta Mathematica Academiae Scientiarum Hungarica. 1967;18(1–2):25–66. doi: 10.1007/BF02020961. [DOI] [Google Scholar]
  • 13.Golumbic MC, Rotem D, Urrutia J. Comparability graphs and intersection graphs. Discret. Math. 1983;43(1):37–46. doi: 10.1016/0012-365X(83)90019-5. [DOI] [Google Scholar]
  • 14.Grötschel, M., Lovász, L., Schrijver, A.: Geometric Algorithms and Combinatorial Optimization. Algorithms and Combinatorics, vol. 2. Springer (1988). 10.1007/978-3-642-97881-4
  • 15.Heggernes P, van ’t Hof P, Jansen BMP, Kratsch S, Villanger Y. Parameterized complexity of vertex deletion into perfect graph classes. Theor. Comput. Sci. 2013;511:172–180. doi: 10.1016/j.tcs.2012.03.013. [DOI] [Google Scholar]
  • 16.Heggernes P, van ’t Hof P, Lokshtanov D, Nederlof J. Computing the cutwidth of bipartite permutation graphs in linear time. SIAM J. Discret. Math. 2012;26(3):1008–1021. doi: 10.1137/110830514. [DOI] [Google Scholar]
  • 17.Kanesh, L., Madathil, J., Sahu, A., Saurabh, S., Verma, S.: A Polynomial Kernel for Bipartite Permutation Vertex Deletion. In: Golovach, P.A., Zehavi, M. (eds.) 16th International Symposium on Parameterized and Exact Computation (IPEC 2021). Leibniz International Proceedings in Informatics (LIPIcs), vol. 214, pp. 23:1–23:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany (2021). 10.4230/LIPIcs.IPEC.2021.23. https://drops.dagstuhl.de/opus/volltexte/2021/15406
  • 18.Kelly D. The 3-irreducible partially ordered sets. Can. J. Math. 1977;29:367–383. doi: 10.4153/CJM-1977-040-3. [DOI] [Google Scholar]
  • 19.Lekkeikerker C, Boland J. Representation of a finite graph by a set of intervals on the real line. Fundamenta Mathematicae. 1962;51(1):45–64. doi: 10.4064/fm-51-1-45-64. [DOI] [Google Scholar]
  • 20.Lewis JM, Yannakakis M. The node-deletion problem for hereditary properties is NP-complete. J. Comput. Syst. Sci. 1980;20(2):219–230. doi: 10.1016/0022-0000(80)90060-4. [DOI] [Google Scholar]
  • 21.Lokshtanov, D.: Wheel-free deletion is W[2]-hard. In: Grohe, M., Niedermeier, R. (eds.) Parameterized and Exact Computation, Third International Workshop, IWPEC 2008, Victoria, Canada, May 14-16, 2008. Proceedings. Lecture Notes in Computer Science, vol. 5018, pp. 141–147. Springer (2008). 10.1007/978-3-540-79723-4_14
  • 22.Mancini, F.: Graph modification problems related to graph classes. PhD degree dissertation, University of Bergen Norway 2 (2008)
  • 23.Marx D. Chordal deletion is fixed-parameter tractable. Algorithmica. 2010;57(4):747–768. doi: 10.1007/s00453-008-9233-8. [DOI] [Google Scholar]
  • 24.Pnueli A, Lempel A, Even S. Transitive orientation of graphs and identification of permutation graphs. Can. J. Math. 1971;23(1):160–175. doi: 10.4153/CJM-1971-016-5. [DOI] [Google Scholar]
  • 25.Spinrad JP, Brandstädt A, Stewart L. Bipartite permutation graphs. Discret. Appl. Math. 1987;18(3):279–292. doi: 10.1016/S0166-218X(87)80003-3. [DOI] [Google Scholar]
  • 26.Trotter WT, Jr, Moore JI., Jr Characterization problems for graphs, partially ordered sets, lattices, and families of sets. Discret. Math. 1976;16(4):361–381. doi: 10.1016/S0012-365X(76)80011-8. [DOI] [Google Scholar]
  • 27.van ’t Hof P, Villanger Y. Proper interval vertex deletion. Algorithmica. 2013;65(4):845–867. doi: 10.1007/s00453-012-9661-3. [DOI] [Google Scholar]
  • 28.Villanger Y, Heggernes P, Paul C, Telle JA. Interval completion is fixed parameter tractable. SIAM J. Comput. 2009;38(5):2007–2020. doi: 10.1137/070710913. [DOI] [Google Scholar]

Articles from Algorithmica are provided here courtesy of Springer

RESOURCES