Exact exponential algorithms

FV Fomin, P Kaski - Communications of the ACM, 2013 - dl.acm.org
Exact exponential algorithms Page 1 80 coMMunicATions of ThE AcM | MARCh 2013 | Vol. 56
| No. 3 review articles Exact Exponential Algorithms of non-parameterized instances of intractable …

Solving connectivity problems parameterized by treewidth in single exponential time

M Cygan, J Nederlof, M Pilipczuk… - 2011 IEEE 52nd …, 2011 - ieeexplore.ieee.org
For the vast majority of local problems on graphs of small tree width (where by local we
mean that a solution can be verified by checking separately the neighbourhood of each …

A survey of heuristics for matrix bandwidth reduction

SLG de Oliveira - Computer Science Review, 2025 - Elsevier
This paper surveys heuristic methods for matrix bandwidth reduction, including low-cost
methods and metaheuristics. This optimization min–max problem represents a demanding …

Quantum speedups for exponential-time dynamic programming algorithms

A Ambainis, K Balodis, J Iraids, M Kokainis… - Proceedings of the …, 2019 - SIAM
In this paper we study quantum algorithms for NP-complete problems whose best classical
algorithm is an exponential time application of dynamic programming. We introduce the path …

Structural parameterizations for two bounded degree problems revisited

M Lampis, M Vasilakis - ACM Transactions on Computation Theory, 2024 - dl.acm.org
We revisit two well-studied problems, Bounded Degree Vertex Deletion and Defective
Coloring, where the input is a graph G and a target degree Δ, and we are asked either to edit …

Maximizing Nash Social Welfare under Two-Sided Preferences

P Jain, R Vaish - Proceedings of the AAAI Conference on Artificial …, 2024 - ojs.aaai.org
The maximum Nash social welfare (NSW)---which maximizes the geometric mean of agents'
utilities---is a fundamental solution concept with remarkable fairness and efficiency …

Deterministic parameterized connected vertex cover

M Cygan - Algorithm Theory–SWAT 2012: 13th Scandinavian …, 2012 - Springer
Abstract In the Connected Vertex Cover problem we are given an undirected graph G
together with an integer k and we are to find a subset of vertices X of size at most k, such that …

An exact algorithm for the maximum leaf spanning tree problem

H Fernau, J Kneis, D Kratsch, A Langer… - Theoretical Computer …, 2011 - Elsevier
Given an undirected graph with n vertices, the Maximum Leaf Spanning Tree problem is to
find a spanning tree with as many leaves as possible. When parameterized in the number of …

On subexponential and FPT-time inapproximability

E Bonnet, B Escoffier, EJ Kim, VT Paschos - Algorithmica, 2015 - Springer
Fixed-parameter algorithms, approximation algorithms and moderately exponential
algorithms are three major approaches to algorithm design. While each of them being very …

Bandwidth of WK-recursive networks and its sparse matrix computation

R Nathiya, D Meiyappan, S Prabhu… - The Journal of …, 2025 - Springer
Recursively scalable networks are a concept in computer science and networking where
networks are designed in a way that allows them to expand or scale-up seamlessly by …