On the Routing Problems in Graphs with Ordered Forbidden Transitions

  • Conference paper
  • First Online:
Computing and Combinatorics (COCOON 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14422))

Included in the following conference series:

  • 346 Accesses

Abstract

Finding a path between two vertices of a given graph is one of the most classic problems in graph theory. Recently, problems of finding a route avoiding forbidden transitions, that is, two edges that cannot be passed through consecutively, have been studied. In this paper, we introduce the ordered variants of these problems, namely the Path Avoiding Ordered Forbidden Transitions problem (PAOFT for short) and the Trail Avoiding Ordered Forbidden Transitions problem (TAOFT for short). We show that both the problems are NP-complete even for bipartite planar graphs with maximum degree three. Since the problems are solvable for graphs with maximum degree two, the NP-completeness results are tight with respect to the maximum degree of a graph. Furthermore, we show that TAOFT remains NP-complete for cactus graphs. As positive results of PAOFT, we give a polynomial-time algorithm for bounded treewidth graphs and a linear-time algorithm for cactus graphs.

A. Suzuki—Partially supported by JSPS KAKENHI Grant Number JP20K11666, Japan.

Y. Tamura—Partially supported by JSPS KAKENHI Grant Number JP21K21278, Japan.

X. Zhou—Partially supported by JSPS KAKENHI Grant Number JP19K11813, Japan.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    In [5], only a sketch of the algorithm was given. For more details, see a full version from the following URL: https://inria.hal.science/hal-01115395/file/PAFT.pdf.

  2. 2.

    A set of ordered forbidden transitions for \(G^\prime \) can be constructed by scanning \(\mathcal {F}\) and removing redundant transitions from \(\mathcal {F}\) in \(O(|\mathcal {F}|)\) time. Then, PAOFT on \(G^\prime \) can be solved in O(n) time.

References

  1. Bellitto, T., Li, S., Okrasa, K., Pilipczuk, M., Sorge, M.: The complexity of routing problems in forbidden-transition graphs and edge-colored graphs. Algorithmica 85(5), 1202–1250 (2023). https://doi.org/10.1007/s00453-022-01064-1

    Article  MathSciNet  MATH  Google Scholar 

  2. Bodlaender, H.L., Kloks, T.: Efficient and constructive algorithms for the pathwidth and treewidth of graphs. J. Algorithms 21(2), 358–402 (1996). https://doi.org/10.1006/jagm.1996.0049

    Article  MathSciNet  MATH  Google Scholar 

  3. Hopcroft, J., Tarjan, R.: Algorithm 447: efficient algorithms for graph manipulation. Commun. ACM 16(6), 372–378 (1973). https://doi.org/10.1145/362248.362272

    Article  Google Scholar 

  4. Kanté, M.M., Laforest, C., Momège, B.: An exact algorithm to check the existence of (elementary) paths and a generalisation of the cut problem in graphs with forbidden transitions. In: van Emde Boas, P., Groen, F.C.A., Italiano, G.F., Nawrocki, J., Sack, H. (eds.) SOFSEM 2013. LNCS, vol. 7741, pp. 257–267. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35843-2_23

    Chapter  MATH  Google Scholar 

  5. Kanté, M.M., Moataz, F.Z., Momège, B., Nisse, N.: Finding paths in grids with forbidden transitions. In: Mayr, E.W. (ed.) WG 2015. LNCS, vol. 9224, pp. 154–168. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53174-7_12

    Chapter  MATH  Google Scholar 

  6. Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W., Bohlinger, J.D. (eds.) Complexity of Computer Computations, pp. 85–103. Springer (1972). https://doi.org/10.1007/978-1-4684-2001-2

  7. Kotzig, A.: Moves without forbidden transitions in a graph. Matematický časopis 18(1), 76–80 (1968). https://eudml.org/doc/33972

  8. Nguyên, L.T.D.: Unique perfect matchings, forbidden transitions and proof nets for linear logic with Mix. Logical Methods in Computer Science 16(1) (2020). https://doi.org/10.23638/LMCS-16(1:27)2020

  9. Szeider, S.: Finding paths in graphs avoiding forbidden transitions. Discret. Appl. Math. 126(2), 261–273 (2003). https://doi.org/10.1016/S0166-218X(02)00251-2

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

We thank the referees for their valuable comments and suggestions which greatly helped to improve the presentation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuma Tamura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumakura, K., Suzuki, A., Tamura, Y., Zhou, X. (2024). On the Routing Problems in Graphs with Ordered Forbidden Transitions. In: Wu, W., Tong, G. (eds) Computing and Combinatorics. COCOON 2023. Lecture Notes in Computer Science, vol 14422. Springer, Cham. https://doi.org/10.1007/978-3-031-49190-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49190-0_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49189-4

  • Online ISBN: 978-3-031-49190-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation