1 Introduction

In the quest to design efficient algorithms for NP-hard graph problems, a very successful approach is to exploit the sparsity of input graphs: many problems that are assumed to be hard in general graphs turn out to be efficiently solvable in sparse graphs [1, 17, 25, 34, 36, 39, 45]. One popular sparseness measure that has been used for a variety of graph problems is the degeneracy of the input graph G, defined as follows. For a vertex \(v \in V(G)\), let \(\deg _G(v){:}{=}\vert N(v) \vert \) denote the degree of v.

Definition 1

A graph G is d-degenerate if one of the following two equivalent conditions holds:

  • There exists a degeneracy ordering \(\delta {:}{=}(v_1,\ldots , v_n)\) of G, that is, an ordering such that \(\deg _{G_i}(v_i)\le d\) where \(G_i{:}{=}G[\{v_i,\ldots , v_n\}]\)

  • Every induced subgraph \(G'\) of G has a vertex v with \(\deg _{G'}(v)\le d\).

The degeneracy of a graph G is the smallest integer d such that G is d-degenerate.

Many graph algorithms which exploit the fact that the input graph has bounded degeneracy have been proposed. For example, there is an algorithm that enumerates all maximal cliques of a graph in \(\mathcal {O}(3^{d/3}\cdot dn)\) time and performs very efficiently on real-world input instances [17]. This algorithm is an FPT-algorithm for the parameter d since the exponential part of the running time depends only on d. Further applications of degeneracy include FPT-algorithms for clique relaxations [34, 36] and for biclique enumeration algorithms [16, 27]. Degeneracy can also be used for problems that are W[1]-hard for their standard parameterization by solution size. For example, Dominating Set and related problems are W[1]-hard with respect to the solution size k but have FPT-algorithms for \(d+k\) [1, 24, 42].

In a recent work, Fox et al. [20] proposed exploiting a different property of real-world graphs that is motivated by the triadic closure principle. This principle postulates that people in a social network which have many common friends are likely to be friends themselves. Many real-world social networks give evidence for this postulate as they contain no pair of nonadjacent vertices with many common neighbors. The degree to which a given graph adheres to the triadic closure principle can be expressed in the closure number of G, defined as follows.

Definition 2

[20] Let \({{\,\textrm{cl}\,}}_G(v) {:}{=}\max _{v' \in V {\setminus } N[v]} \vert N(v) \cap N(v') \vert \) denote the closure number of a vertex v in a graph G. A graph G is c-closed if \({{\,\textrm{cl}\,}}_G(v) < c\) for all \(v \in V(G)\). The closure number of a graph G is the smallest integer c such that G is c-closed.

Fox et al. [20] showed that a c-closed graph has \(\mathcal {O}(3^{c/3}\cdot n^2)\) maximal cliques. Given that all maximal cliques can be enumerated in \(\mathcal {O}(\alpha \cdot n^2)\) time, where \(\alpha \) is the number of maximal cliques [8], this bound implies that all maximal cliques of a c-closed graph can be enumerated in \(\mathcal {O}^*(3^{c/3})\) time.Footnote 1 This means that the clique enumeration problem has an FPT-algorithm with respect to the closure number of the input graph. In companion works, we showed that several hard graph problems such as Independent Set, Dominating Set, Induced Matching and Partial Vertex Cover admit polynomial kernels on c-closed graphs when parameterized by the respective solution size [30, 32]. Recently, FPT-algorithms for further problems related to Dominating Set such as Perfect Code were obtained by Kanesh et al. [28]. Koana and Nichterlein [33] studied the time complexity of finding and enumerating small induced subgraphs in c-closed graphs.

Fox et al. [20] suggested a further graph parameter which combines sparseness and triadic closure, the weak closure of a graph.

Definition 3

[20] A graph G is weakly \(\gamma \)-closedFootnote 2 if one of the following holds:

  • There exists a weak closure ordering \(\sigma {:}{=}(v_1, \dots , v_n)\) of G, that is, an ordering such that \({{\,\textrm{cl}\,}}_{G_i}(v_i) < \gamma \) for all \(i \in [n]\) where \(G_i {:}{=}G[\{ v_i, \dots , v_n \}]\).

  • Every induced subgraph \(G'\) of G has a vertex \(v \in V(G')\) such that \({{\,\textrm{cl}\,}}_{G'}(v) < \gamma \).

The weak closure number of a graph G is the smallest integer \(\gamma \) such that G is weakly \(\gamma \)-closed.

Table 1 A comparison of the number n of vertices, number m of edges, the maximum degree \(\Delta \), the closure c, the degeneracy d and the weak closure \(\gamma \) in social and biological networks

The weak closure number \(\gamma \) of a graph G is never larger than \(d+1\) where d is the degeneracy of G and also never larger than the closure number c of G. Consequently, fixed-parameter algorithms for \(\gamma \) are, in principle, preferable to those for the closure number c or the degeneracy d. From an application point of view, the weak closure number is also an excellent parameter in such graphs since it tends to take on very small values in real-world social networks [20] (see also Table 1). Fox et al. [20] showed that a graph has \(\mathcal {O}(3^{\gamma /3}\cdot n^2)\) maximal cliques which, again using known clique enumeration algorithms, gives an algorithm that enumerates all maximal cliques in \(\mathcal {O}^*(3^{\gamma /3})\) time. Very recently, it was shown that Dominating Set is FPT with respect to \(\gamma +k\) [38] and that several problems like Connected Vertex Cover and Induced Matching admit kernels of size \(k^{\mathcal {O}(\gamma )}\) [31].

Our Results

In a nutshell, we show that when the graph has a small weak closure number, it helps in solving a variety of graph problems that are related to searching for sparse or dense subgraphs or for sparse or dense dominating sets. Our main results for clique relaxations are listed in Table 2; our main results for variants of Dominating Set are listed in Table 3.

Our results improve over the state of the art in the following sense: the best known tractability results for these problems employ the degeneracy of the input graph as a parameter and, as discussed above, the weak closure is essentially a smaller parameter. For some problems, we also provide results for the c-closure parameter. There are two reasons for this. First, for some problems we obtain better running time bounds for the parameter c. Second, we provide some lower bounds for the problems under consideration and, whenever possible, we provide them for the larger closure parameter c.

From a practical point of view, the most important results are, in our opinion, the enumeration algorithms for maximal non-induced bicliques and maximal s-plexes whose running times grow moderately with \(\gamma \). Both algorithms are based on the algorithm to enumerate all maximal cliques in weakly \(\gamma \)-closed graphs [20]. Independently, Behera et al. [2] obtained similar results for the enumeration of maximal s-plexes and further dense subgraphs parameterized by the c-closure; it seems that their algorithms for s-plex enumeration can be adapted to parameterization by weak closure as well [2].

Table 2 An overview of our results for clique relaxations. Our algorithms for s-Plex and Non-Induced \((k_1, k_2)\)-Biclique and our \(\mathcal {O}(2^{\gamma } n^{s + 3})\)-time algorithm for s-Defective Clique are based on algorithms enumerating all maximal s-plexes (Theorem 2), non-induced bicliques (Theorem 8), and s-defective cliques (Theorem 4), respectively
Table 3 An overview of our results for variants of Dominating Set

Preliminaries

For \(n \in \mathbb {N}\), we denote by [n] the set \(\{ 1, \dots , n \}\). For a graph G, we denote by V(G) and E(G) its vertex set and edge set, respectively. We let \(n {:}{=}\vert V(G) \vert \) denote the number of vertices. Let \(X \subseteq V(G)\) be a vertex set. We let G[X] denote the subgraph induced by X and \(G - X {:}{=}G[V(G) {\setminus } X]\) the graph obtained by removing the vertices of X. We denote by \(N_G(X){:}{=}\{ y \in V(G) {\setminus } X \mid xy \in E(G), x \in X \}\) and \(N_G[X]{:}{=}N_G(X) \cup X\), the open and closed neighborhood of X, respectively. For all these notations, when X is a singleton \(\{ x \}\) we may write x instead of \(\{x\}\). The maximum degree of G is \(\Delta {:}{=}\max _{v \in V(G)} \deg _G(v)\). The \({h}_G\)-index of a graph G is the largest integer h such that G has at least h vertices of degree at least h [18]. We may drop the subscript \(\cdot _G\) when it is clear from context.

Instances (Ik) of a parameterized problem consist of a classical input instance I and a parameter \(k\in \mathbb {N}\). A parameterized problem is fixed-parameter tractable if every instance (Ik) can be solved in \(f(k) \cdot \vert I \vert ^{\mathcal {O}(1)}\) time for some computable function f. An algorithm with such a running time is an FPT-algorithm. A basic class of parameterized intractability is W[1]: it is widely assumed that W[1]-hard problems do not admit an FPT-algorithm. W[1]-hardness can be shown via a parameterized reduction from a W[1]-hard problem. A parameterized reduction from a parameterized problem L to a parameterized problem \(L'\) is an algorithm that maps each instance (Ik) of L in \(f(k)\cdot \vert I \vert ^{\mathcal {O}(1)}\) time to an equivalent instance \((I',k')\) of \(L'\) such that \(k'\le g(k)\) for some computable function g.

A kernelization is a polynomial-time algorithm which transforms every instance (Ik) into an equivalent instance \((I', k')\) such that \( \vert I' \vert + k' \le g(k)\) for some computable function g. If g is a polynomial function, then we speak of a polynomial kernel. A problem is fixed-parameter tractable if and only if it admits a kernelization. There are, however, many problems which are fixed-parameter tractable but do not admit a polynomial kernel under standard complexity-theoretic assumptions.

For more details on parameterized complexity, we refer to the standard monographs [12, 15].

2 Sparse Subgraphs

In this section we study problems that are related to finding sparse subgraphs of a given graph. The most fundamental problem in this context is the Independent Set problem, where one aims to find a large edgeless subgraph or, in other words, a large set of vertices without edges between them.

figure a

Since Independent Set is NP-hard already on graphs with maximum degree 3 [22], there is no hope for FPT-algorithms for parameterization by the closure number c or the weak closure number \(\gamma \). Parameterization by \(c+k\), however, leads to fixed-parameter tractability: in a companion work [32], we provided an \(\mathcal {O}(ck^2)\)-vertex kernel for Independent Set. Here, we strengthen this result by showing that a generalization of Independent Set admits a polynomial kernel with respect to the parameter \(k + \gamma \).

The problem that we consider is defined as follows. Let \(\mathcal {G}\) be a graph class. We say that \(\mathcal {G}\) is monotone if \(\mathcal {G}\) is closed under vertex and edge deletions. That is, if \(G\in \mathcal {G}\), then for each (not necessarily induced) subgraph H of G we have \(H\in \mathcal {G}\). The aim is now to find a large induced subgraph belonging to \(\mathcal {G}\).

figure b

When \(\mathcal {G}\) is the class of edgeless graphs, then \(\mathcal {G}\)-Subgraph is the same as Independent Set.

The kernelization algorithm consists of one reduction rule that works on a weak closure ordering \((v_1, v_2, \dots , v_n)\) of the input graph G. The correctness of the reduction rule hinges on the following observation about the size of common neighborhoods of nonadjacent vertices \(v_i\) and \(v_j\) when we consider only the vertices with higher index than \(v_i\). To state this observation and the data reduction itself, let \(G_i {:}{=}G[V_i]\) for \(V_i = \{ v_i, v_{i + 1}, \dots , v_n \}\).

Lemma 1

Let \(j\in [n] {\setminus } \{ i \}\). If \(v_i v_j \notin E(G)\), then \( \vert N_{G_i}(v_i) \cap N_{G}(v_j) \vert < \gamma \).

Proof

First, assume that \(j < i\). Then, we have \( \vert N_{G_j}(v_i) \cap N_{G_j}(v_j) \vert < \gamma \) by the definition of weak closure orderings. Since \(V_i\subseteq V_j\) this implies that \( \vert N_{G_i}(v_i) \cap N_{G}(v_j) \vert < \gamma \). Second, assume that \(j > i\). By the definition of weak closure orderings we have \( \vert N_{G_i}(v_i) \cap N_{G_i}(v_j) \vert < \gamma \). \(\square \)

Lemma 1 allows us to show the correctness of the following reduction rule, which removes vertices with many neighbors that have higher index in the weak closure ordering.

ReductionRule 1

If \(\deg _{G_i}(v_i) \ge \gamma k\), then remove \(v_i\).

Lemma 2

Reduction Rule 1 is correct for monotone graph classes.

Proof

Let \(G'{:}{=}G - v_i\) for \(v_i \in V\) with \(\deg _{G_i}(v_i) \ge \gamma k\) be the graph obtained by applying Reduction Rule 1. Clearly, if \(G'[S]\in \mathcal {G}\) for some vertex set \(S\subseteq V(G')\), then also \(G[S]\in \mathcal {G}\).

Hence, it remains to show that if there is a vertex set \(S\subseteq V(G)\) of size k such that \(G[S]\in \mathcal {G}\), then there is a vertex set \(S'\subseteq V(G')\) of size k such that \(G'[S']\in \mathcal {G}\). If \(v_i \notin S\), we observe that \(G'[S] \in \mathcal {G}\). Thus, in the following we assume that \(v_i \in S\). Let \(S_i {:}{=}S {\setminus } N_G(v_i)\) be the set of vertices in S that are not adjacent to \(v_i\). We show that there is some vertex \(u\notin S\) that is not adjacent to any vertex of \(S_i\). By Lemma1, any vertex \(v_j \in S_i\) has less than \(\gamma \) neighbors in \(N_{G_i}(v_i)\). Since \(\deg _{G_i}(v_i) \ge \gamma k\) and \(\vert S_i\vert <k\), there exists at least one vertex u in \(N_{G_i}(v_i)\) that is not adjacent to any vertex from \(S_i\). Consequently, \(N_G(u)\cap S\subseteq N_G(v_i)\cap S\). Since \(\mathcal {G}\) is monotone, we may thus replace \(v_i\) in S with u: for \(S' {:}{=}(S {\setminus } \{ v_i \}) \cup \{ u \}\) we have \(G'[S'] \in \mathcal {G}\). \(\square \)

Theorem 1

Let \(\mathcal {G}\) be a monotone graph class. Then, \(\mathcal {G}\)-Subgraph has a kernel with at most \(\gamma k^2\) vertices.

Proof

One can exhaustively apply Reduction Rule 1 in polynomial time. The resulting graph has a weak closure ordering where every vertex \(v_i\) has less than \(\gamma k\) neighbors in \(G_i\). Hence, this graph has degeneracy \(d < \gamma k\). Note that any graph G on at least \((d + 1) k\) vertices contains an independent set S of size k. Due to the monotonicity of \(\mathcal {G}\), \(G[S] \in \mathcal {G}\) for an independent set S. Thus, returning Yes is correct whenever \( \vert V(G) \vert \ge \gamma k^2\) and we obtain an equivalent instance with at most \(\gamma k^2\) vertices. \(\square \)

Since the class of edgeless graphs is monotone, we obtain the following.

Corollary 1

Independent Set has a kernel with at most \(\gamma k^2\) vertices.

Theorem 1 also implies kernels for many other problems, including Acyclic Subgraph, Bipartite Subgraph, Planar Subgraph, and Bounded Degree Subgraph. These problems ask whether the input graph G contains a vertex set \(S \subseteq V(G)\) such that \( \vert S \vert \ge k\) and G[S] is acyclic, bipartite, planar, or has bounded maximum degree, respectively. All of these problems are W[1]-hard in general graphs [29].

Corollary 2

Each of Acyclic Subgraph, Bipartite Subgraph, Bounded Degree Subgraph, and Planar Subgraph has a kernel with \(\gamma k^2\) vertices.

Moreover, it follows from Theorem 1 that Sparsest-k-Subgraph, the problem of finding an induced subgraph with exactly k vertices and at most t edges, also admits a polynomial kernel in weakly \(\gamma \)-closed graphs.

Corollary 3

Sparsest-k-Subgraph has a kernel with at most \(\gamma k^2\) vertices.

This is in sharp contrast to Densest-k-Subgraph, where one asks for a set \(S\subseteq V(G)\) of exactly k vertices such that G[S] has at least t edges: Densest-k-Subgraph is W[1]-hard with respect to k even in 2-closed graphs [43].

3 Clique Relaxations

In this section, we present algorithms for generalizations of the Clique problem. In contrast to the variants of Independent Set considered in Sect. 2, here we only consider parameterization by the weak closure number \(\gamma \). Recall, that Fox et al. [20] showed that a graph has \(\mathcal {O}(3^{\gamma /3}\cdot n^2)\) many maximal cliques. Using known clique enumeration algorithms this gives an algorithm that enumerates all maximal cliques in \(\mathcal {O}^*(3^{\gamma /3})\) time.

3.1 s-Plex

A clique is a vertex set S such that each vertex \(v\in S\) is adjacent to each other vertex in S. One way to relax the clique definition is to allow each vertex \(v\in S\) to have at most s non-neighbors in S. This idea can be formalized as follows.

Definition 4

In a graph \(G=(V,E)\) a set \(S\subseteq V\) is an s-plex if every vertex in G[S] has degree at least \(\vert S\vert - s\) in G[S].

Observe that cliques are exactly the 1-plexes. Here, we study the task of enumerating maximal s-plexes which has received some interest in practice [9, 10], and the problem of finding a sufficiently large s-plex, defined as follows.

figure c

On the negative side, s-Plex is W[1]-hard when parameterized by k for all \(s \in \mathbb {N}\) [29, 35]. On the positive side, a simple algorithm can enumerate all maximal s-plexes of a d-degenerate graph in \(2^d n^{s + \mathcal {O}(1)}\) time [34].

For the problem of enumerating all maximal s-plexes, we obtain an FPT-algorithm for the weak closure number.

Theorem 2

For \(s \ge 2\), a graph G has \(\mathcal {O}(2^{\gamma } n^{2s - 1})\) maximal s-plexes. Moreover, all maximal s-plexes of G can be enumerated in \(\mathcal {O}(2^\gamma n^{2s + 1})\) time.

Proof

First, we show the bound on the number of maximal s-plexes in a weakly \(\gamma \)-closed graph. Let \(v \in V(G)\) be a vertex such that \({{\,\textrm{cl}\,}}_G(v) < \gamma \) and let \(G' {:}{=}G - v\) be the graph obtained by deleting v. Let \(\mathcal {S}\) and \(\mathcal {S}'\) be the collections of all maximal s-plexes (without duplicates) in G and \(G'\), respectively. We show that \( \vert \mathcal {S} \vert \le \vert \mathcal {S}' \vert + 2^\gamma n^{2s-2}\) and that \(\mathcal {S}\) can be constructed from \(\mathcal {S}'\) in \(\mathcal {O}( \vert \mathcal {S}' \vert \cdot n + 2^\gamma n^{2s + 1})\) time. To obtain the bound we identify the following four types of maximal s-plexes in G:

  1. Type 1:

    S does not contain v. Then, S is also maximal in \(G'\).

  2. Type 2:

    S contains v and \(S {\setminus } \{ v \}\) is maximal in \(G'\).

  3. Type 3:

    S contains v\(S {\setminus } \{ v \}\) is not maximal in \(G'\), and S contains a non-neighbor of v (that is, \(S {\setminus } N_G(v) \ne \emptyset \)).

  4. Type 4:

    S contains v\(S {\setminus } \{ v \}\) is not maximal in \(G'\), and S is contained in the neighborhood of v, that is, \(S \subseteq N_G[v]\).

Clearly, each maximal s-plex is of one of these four types. It is easy to see that there are \( \vert \mathcal {S}' \vert \) maximal s-plexes of Type 1 and Type 2. Hence, it remains to bound the number of maximal s-plexes of Type  3 and Type 4.

Next, we bound the number of maximal s-plexes of Type 3. Consider such an s-plex S. We may partition S into three parts as follows: We first divide S into \(S_v {:}{=}S \cap N_G[v]\) and \(\widetilde{S_{v}} {:}{=}S {\setminus } N_G[v]\). We divide \(S_v\) further into \(S_{uv} {:}{=}S_v \cap N_G(u)\) and \(\widetilde{S_{uv}} {:}{=}S_v {\setminus } N_G(u)\) for some vertex \(u \in \widetilde{S_v}\). Here, u is any non-neighbor of v to exploit the weak \(\gamma \)-closure. By the definition of s-plexes, \( \vert \widetilde{S_v} \vert < s\) and \( \vert \widetilde{S_{uv}} \vert < s\). Hence, there are at most \(n^{2s - 2}\) choices for \(\widetilde{S_v}\) and \(\widetilde{S_{uv}}\). For \(S_{uv}\), there are at most \(2^{\gamma - 1}\) choices because \(S_{uv} \subseteq N_G(v) \cap N_G(u)\) and \( \vert N_G(v) \cap N_G(u) \vert< {{\,\textrm{cl}\,}}_G(v) < \gamma \). Overall, there are at most \(2^{\gamma - 1} n^{2s - 2}\) maximal s-plexes of Type 3.

It remains to bound the number of maximal s-plexes of Type 4. Let S be one of these s-plexes. Since \(S' {:}{=}S {\setminus } \{ v \}\) is not maximal in \(G'\), there exists a vertex \(u \in V(G) {\setminus } S\) such that \(S' \cup \{ u \}\) is an s-plex in \(G'\). If \(u \in N_G(v)\), then \(S \cup \{ u \}\) is also an s-plex in G, which contradicts the fact that S is maximal in G. Hence, we can assume that \(u \notin N_G(v)\). Then, \(S {\setminus } N_G(u)\) contains at most \(s - 1\) vertices, which in turn implies that there are at most \(n^{s - 1}\) choices for \(S {\setminus } N_G(u)\). Since \(S\subseteq N(v)\) we observe that \(S \cap N_G(u) \subseteq N_G(v) \cap N_G(u)\) and \( \vert N_G(v) \cap N_G(u) \vert \le {{\,\textrm{cl}\,}}_G(v) < \gamma \). Thus, we have \(2^{\gamma - 1}\) choices for \(S \cap N_G(v)\). All in all, there are at most \(2^{\gamma - 1} n^s\) maximal s-plexes of Type 4.

By the above analysis, we obtain \( \vert \mathcal {S} \vert \le \vert \mathcal {S}' \vert + 2^{\gamma - 1} n^{2s - 2} + 2^{\gamma - 1} n^s \le \vert \mathcal {S}' \vert + 2^\gamma n^{2s - 2}\). Next, we bound the overall number of maximal s-plexes in a graph with n vertices. To this end, let \(a_n\) be the number of maximal s-plexes in weakly \(\gamma \)-closed graphs on n vertices. Clearly, \(a_1 = 1\). Furthermore, the above analysis showed that \(a_{n} - a_{n - 1} = \vert \mathcal {S} \vert - \vert \mathcal {S}' \vert \le 2^{\gamma } n^{2s - 2}\). Hence, by induction we obtain \(a_n = a_1 + \sum _{i = 2}^{n} (a_{i} - a_{i - 1}) \le 2^\gamma n^{2s - 1} + 1\). In other words, a weakly \(\gamma \)-closed graph on n vertices has at most \(2^\gamma n^{2s - 1} + 1\) maximal s-plexes.

Second, we bound the overall time needed to enumerate all maximal s-plexes. To obtain this bound, we again let \(v\in V(G)\) be any vertex such that \({{\,\textrm{cl}\,}}_G(v) < \gamma \), let \(G' {:}{=}G - v\) be the graph obtained by deleting v, and let \(\mathcal {S}\) and \(\mathcal {S}'\) be the collections of all (without duplicates) maximal s-plexes in G and \(G'\). Observe that all maximal s-plexes of Type 1 and 2 can be found in \(\mathcal {O}( \vert \mathcal {S}' \vert \cdot n)\) time. Furthermore, maximal s-plexes of Type 3 and 4 can be enumerated in \(\mathcal {O}((2^{\gamma -1}n^{2s-2}+2^{\gamma -1}n^s) \cdot n^2)\) time, because it takes \(\mathcal {O}(n^2)\) time to verify whether a vertex set is a maximal s-plex or not. Finally, we remove duplicates in \(\mathcal {O}(( \vert \mathcal {S}' \vert +2^{\gamma -1}n^{2s-2}+2^{\gamma -1}n^s)\cdot n)=\mathcal {O}( \vert \mathcal {S}' \vert \cdot n+2^\gamma n^{2s-1})\) time, using radix sort. Altogether, the algorithm needs \(\mathcal {O}( \vert \mathcal {S}' \vert \cdot n + 2^\gamma n^{2s})\) time to enumerate all maximal s-plexes in G. Recall that \(a_n\) is the number of maximal s-plexes in a weakly \(\gamma \)-closed graph on n vertices. Thus, all maximal s-plexes of a weakly \(\gamma \)-closed graph on n vertices can be enumerated in \(\mathcal {O}((a_n \cdot n + 2^\gamma n^{2s}) \cdot n) = \mathcal {O}(2^\gamma n^{2s + 1})\) time. \(\square \)

A factor of \(n^{2s - 2}\) for the number of maximal s-plexes in Theorem 2 is unavoidable: Consider a graph G consisting of two cliques \(C_1\) and \(C_2\) of equal size. Clearly, G is 1-closed. Each subset of \(C_1\) of size exactly \(s - 1\) and each subset of \(C_2\) of size exactly \(s - 1\) together form a maximal s-plex. Hence, there exist 1-closed graphs with \(\Omega ((n/2)^{2s - 2})\) maximal s-plexes.

For s-Plex, Theorem 2 directly implies the following.

Corollary 4

For \(s\ge 2\), s-Plex can be solved in \(\mathcal {O}(2^{\gamma } n^{2s+1})\) time.

Next, we show that there is presumably no \(f(k) \cdot n^{\mathcal {O}(1)}\)-time algorithm for s-Plex in 2-closed graphs. Moreover, our reduction also shows that s-Plex is W[1]-hard for the parameter \(k + s+d\).

Theorem 3

s-Plex is W[1]-hard in 2-closed graphs when parameterized by \(k + s + d\).

Proof

We reduce from Clique. An illustration of our construction is shown in Fig. 1. Let (Gk) be an instance of Clique with \(k \ge 4\). First, we subdivide each edge uv of G twice. That is, we remove the edge uv and add edges \(u x_{u}^v\), \(x_{u}^v x_v^u\), and \(x_v^u v\), where \(x_{u}^v\) and \(x_v^u\) are two new vertices. Second, for each edge \(uv \in E(G)\), we introduce \(k - 3\) vertices \(x_{uv}^1, \dots , x_{uv}^{k - 3}\). Let \(X_{uv} {:}{=}\{ x_{u}^v, x_v^u, x_{uv}^1, \dots , x_{uv}^{k - 3} \}\) and let \(X {:}{=}\bigcup _{uv \in E(G)} X_{uv}\). We then add edges so that \(X_{uv}\) forms a clique. Lastly, we introduce a set \(T {:}{=}\{ t^1, \dots , t^{k - 3} \}\) of \(k - 3\) vertices and add edges between \(x_{uv}^i\) and \(t^i\) for each \(uv \in E(G)\) and each \(i \in [k - 3]\). Let \(G'\) be the resulting graph.

Fig. 1
figure 1

Illustration of the construction of Theorem 3. a The graph G of the Clique instance and b the graph \(G'\) of s-Plex. Here, the sets \(X_{uw}\) and \(X_{vw}\) are not drawn. Note that the sets \(X_{uv}\) and \(X_{vy}\) are cliques

It is easy to verify that \(G'\) is 2-closed. Moreover, \(G'\) is \((k - 1)\)-degenerate: Each vertex \(x \in X_{uv}\) is of degree \(k - 1\) and there is no edge in \(G' - X\). We show that G has a clique of size k if and only if \(G'\) has an s-plex of size \(k'\), where \(k' {:}{=}2k - 3 + (k - 1) \left( {\begin{array}{c}k\\ 2\end{array}}\right) \) and \(s {:}{=}k' - (k - 1)\).

Suppose that G has a clique S of size exactly k. Let \(S' = S \cup T \cup \bigcup _{u,v \in S} X_{uv}\). Observe that \( \vert S' \vert = k'\). We verify that each vertex in \(G'[S']\) has degree at least \(k' - s = k - 1\).

  • Let \(v \in S\). By construction, we have \(x_{v}^u \in N_{G'}(v)\) for each \(u \in S {\setminus } \{ v \}\). Since \(x_{v}^u\) is contained in \(S'\), v has at least \(k - 1\) neighbors in \(G'[S']\).

  • We have \(\deg _{G'[S']}(t^i) \ge \left( {\begin{array}{c}k\\ 2\end{array}}\right) \ge k - 1\) for each \(i \in [k - 3]\), because \(t^i\) is adjacent to \(x_{uv}^i\) for all \(uv \in E(G[S])\).

  • Consider \(x_{u}^v\) for \(uv \in E(G[S])\). We have \(u \in N_{G'}(x_{u}^v)\) by construction. Moreover, \(x_{u}^{v}\) is adjacent to all \(k - 2\) vertices in \(X_{uv} {\setminus } \{ x_{u}^v \}\). Thus, we have \(\deg _{G'[S']}(x_{u}^v) \ge k - 1\).

  • Consider \(x_{uv}^i\) for \(uv \in E(G[S])\) and \(i \in [k - 3]\). We have \(t^i \in N_{G'}(x_{uv}^i)\) by construction. Moreover, \(x_{uv}^i\) is adjacent to all \(k - 2\) vertices in \(X_{uv} {\setminus } \{ x_{uv}^i \}\). Thus, we have \(\deg _{G'[S']}(x^i_{uv}) \ge k - 1\).

Thus, every vertex has at least \(k - 1 = k' - s\) neighbors in \(G'[S']\).

Conversely, suppose that \(S'\) is an s-plex of size exactly \(k'\). We start with the following claim.

Claim 1

If \(S'\) contains a vertex x of \(X_{uv}\) for some \(uv \in E(G)\), then \(S'\) also contains all vertices in \(N_{G'}[X_{uv}]\), that is, \(\{u, v\}\cup X_{uv}\cup T \subseteq S'\).

Proof of Claim

By construction, \(\deg _{G'}(x) = k - 1\). Since each vertex in \(G'[S']\) has degree \( \vert S' \vert - s \ge k - 1\) by the definition of s-plexes, we have \(N_{G'}[X_{uv}] \subseteq S'\). \(\blacksquare \)

Let \(\ell = \vert S' \cap V(G) \vert \). We conclude that there are at most \(\left( {\begin{array}{c}\ell \\ 2\end{array}}\right) \) edges \(uv \in E(G)\) with \(X_{uv} \cap S' \ne \emptyset \) since otherwise the above claim would imply that \(\vert S' \cap V(G) \vert >\ell \). By construction, we have \( \vert X_{uv} \vert = k - 1\) for each \(uv \in E(G)\). Thus, we have

$$\begin{aligned} \vert S' \vert = \vert S' \cap V(G) \vert + \vert T \vert + \vert S' \cap X \vert \le \ell + k - 3 + (k - 1) \left( {\begin{array}{c}\ell \\ 2\end{array}}\right) . \end{aligned}$$

Since \( \vert S' \vert = k' = 2k - 3 + \left( {\begin{array}{c}k\\ 2\end{array}}\right) \), we obtain \(\ell \ge k\).

By definition, each vertex \(v \in S' \cap V(G)\) has at least \( \vert S' \vert - s \ge k - 1\) neighbors in \(G'[S']\). So there are at least \(\ell (k - 1) / 2\) edges \(uv \in E(G)\) such that \(S' \cap X_{uv} \ne \emptyset \). From the above claim we know that \(X_{uv}\subseteq S'\) for each \(X_{uv}\) with \(X_{uv}\cap S'\ne \emptyset \). Hence, we obtain that

$$\begin{aligned} \vert S' \vert \ge \vert S' \cap V(G) \vert + \vert T \vert + \vert S' \cap X \vert \ge \ell + k - 3 + (k - 1) \cdot \ell (k - 1) / 2. \end{aligned}$$

Since \( \vert S' \vert = k' = 2k - 3 + (k - 1) \left( {\begin{array}{c}k\\ 2\end{array}}\right) \), we obtain \(\ell = k\) and \( \vert S' \cap X \vert = (k - 1) \left( {\begin{array}{c}k\\ 2\end{array}}\right) \). Since \(\vert S' \cap X \vert = (k - 1) \left( {\begin{array}{c}k\\ 2\end{array}}\right) \) we conclude that each two vertices in \(S'\cap V(G)\) are adjacent. Thus, \(S' \cap V(G)\) is a clique of k vertices in G by construction. \(\square \)

3.2 s-Defective Clique

A clique is a vertex set S such that no vertex pair in S is nonadjacent. One way to relax the clique definition is to allow up to s nonadjacent vertex pairs. This idea can be formalized as follows.

Definition 5

In a graph \(G=(V,E)\) a set \(S\subseteq V\) is an s-defective clique if G[S] has at least \(\left( {\begin{array}{c} \vert S \vert \\ 2\end{array}}\right) - s\) edges.

Note that cliques are exactly the 0-defective cliques. Similar to s-plexes, we consider the problems of enumerating all maximal s-defective cliques and finding a sufficiently large s-defective clique in (weakly) closed graphs. The latter problem can be formalized as follows.

figure d

One can show that s-Defective Clique is W[1]-hard with respect to k even if \(c = 2\) by adapting a previous hardness proof for Densest-k-Subgraph on 2-degenerate graphs [43, Theorem 20].

First, we study the problem of enumerating all maximal s-defective cliques. To obtain an FPT-algorithm for this problem for the weak closure number, we adapt the algorithm of Theorem 2. The only difference to the proof of Theorem 2 is the following: For bounding the number of s-plexes of Type 3 the sets \(\widetilde{S_v}\) and \(\widetilde{S_{uv}}\) were bounded by \(s-1\) each. Since a maximal s-defective clique contains at most s non-edges and \(uv\notin E(G)\) we observe that \( \vert \widetilde{S_v}\cup \widetilde{S_{uv}} \vert <s\). Hence, there are at most \(2^{\gamma -1}n^{s-1}\) maximal s-defective cliques of Type 3. Thus, we can bound the overall number of maximal s-defective cliques by \(2^{\gamma }n^{s+1}+1\). Since the rest of the proof is completely analogous, we omit it.

Theorem 4

For \(s\ge 2\), there are \(\mathcal {O}(2^{\gamma }n^{s+1})\) maximal s-defective cliques in weakly \(\gamma \)-closed graphs and they can be enumerated in \(\mathcal {O}(2^\gamma n^{s+3})\) time.

A factor of \(n^{s + 1}\) in the number of maximal s-defective cliques in Theorem 4 is inevitable due to the following lower bound: Again we consider the graph G consisting of two disjoint cliques \(C_1\) and \(C_2\), each of size n/2. For each clique \(C \subseteq C_1\) of size s and each \(v \in C_2\), the vertex set \(C \cup \{ v \}\) is a maximal s-defective clique. Thus, G has \(\Omega ((n/2)^{s+1})\) maximal s-defective cliques.

Second, we study s-Defective Clique, the decision problem of finding a sufficiently large s-defective clique. Theorem 4 directly implies the following.

Corollary 5

s-Defective Clique can be solved in \(\mathcal {O}(2^\gamma n^{s+3})\) time.

Next, we present faster algorithms in terms of the dependence on s. First, we show that each s-defective clique can be covered by \(\mathcal {O}(\sqrt{s})\) maximal cliques.

Lemma 3

Let S be an s-defective clique for \(s \ge 1\). Then, there is a collection \(\mathcal {C}\) of at most \(\mathcal {O}(\sqrt{s})\) cliques such that \(S \subseteq \bigcup _{C \in \mathcal {C}} C\).

Proof

Let H denote the complement graph of G[S]. By definition, H has at most s edges. Since a clique becomes an independent set in the complement graph, it suffices to show that there is an \(\mathcal {O}(\sqrt{s})\)-coloring of H (that is, \(\chi (H) = \mathcal {O}(\sqrt{s})\)). Although this is known folklore, we describe its proof for the sake of completeness. Consider an optimal coloring. Then, for each pair of colors, say red and blue, there is at least one edge with one endpoint red and the other blue (otherwise we find a coloring with fewer colors). Recall that H is the complement graph of G[S]. Hence, H has at most s edges, we obtain \(s \ge \left( {\begin{array}{c}\chi (H)\\ 2\end{array}}\right) \), or equivalently, \(\chi (H) \le \sqrt{2s + \frac{1}{4}} + \frac{1}{2}\). \(\square \)

Note that a trivial brute-force algorithm can enumerate all (not necessarily maximal) cliques in \(\mathcal {O}(2^d d n)\) time. Lemma 3 says that each s-defective clique is covered by at most \(\mathcal {O}(\sqrt{s})\) cliques. Hence, by a simple brute-force we obtain the following.

Theorem 5

s-Defective Clique can be solved in \(2^{\mathcal {O}(d \sqrt{s})} n^{\mathcal {O}(\sqrt{s})}\) time.

We can also use Lemma 3 to obtain an algorithm in terms of the smaller parameter \(\gamma \) instead of the degeneracy d without increasing the exponent of n.

Theorem 6

s-Defective Clique can be solved in \(2^{\mathcal {O}(\gamma \sqrt{s} + s \log k}) n^{\mathcal {O}(\sqrt{s})}\) time.

Proof

We first enumerate all maximal cliques in \((3^{\gamma / 3} \cdot n^{\mathcal {O}(1)})\) time [20]. If there is a clique of size at least k, then return Yes, since each clique is also an s-defective clique. Now, we assume that there is no clique of size at least k. By Lemma 3, it suffices to check whether there is an s-defective clique of size k in \(\bigcup _{C \in \mathcal {C}} C\) for each collection \(\mathcal {C}\) of \(\mathcal {O}(\sqrt{s})\) maximal cliques. Observe that each fixed collection in \(\mathcal {C}\) has \(\mathcal {O}(k \sqrt{s})\) vertices. Let \(W_{\mathcal {C}}\) denote the vertex set of \(\mathcal {C}\). By applying the algorithm of Corollary 5 to find the largest s-defective clique, we can determine in \(\mathcal {O}(2^\gamma (\sqrt{s}k)^{\mathcal {O}(s+3)})\) time whether \(W_{\mathcal {C}}\) contains an s-defective clique of size at least k. Since there are \(\mathcal {O}^*(3^{\gamma / 3})\) maximal cliques, the overall running time of this algorithm is \((3^{\gamma / 3} \cdot n^{\mathcal {O}(1)})^{\mathcal {O}(\sqrt{s})} \cdot \mathcal {O}(2^\gamma (\sqrt{s} k)^{\mathcal {O}(s+3)}) = 2^{\mathcal {O}(\gamma \sqrt{s} + s \log k)} n^{\mathcal {O}(\sqrt{s})}\). \(\square \)

For c-closed graphs, we can obtain an algorithm whose running time does not depend on k. This is due to the following lemma.

Lemma 4

Let \(S \subseteq V(G)\) be an s-defective clique in G, in which at least one pair of vertices is nonadjacent. Then, \( \vert S \vert \le c + s\).

Proof

Let \(u, v \in S\) be vertices such that \(uv \notin E(G)\). We show that \( \vert S' \vert \le c + s - 2\) for \(S' {:}{=}S {\setminus } \{ u, v \}\). Since G is c-closed, there are at most \(c - 1\) vertices in \(S'\) adjacent to both u and v. Moreover, there are at most \(s - 1\) vertices in \(S'\) which are nonadjacent to either u or v in \(S'\), by the definition of s-defective cliques. Thus, we obtain \( \vert S' \vert \le (c - 1) + (s - 1) = c + s - 2\). \(\square \)

From Lemma 4 we directly obtain the following.

Corollary 6

s-Defective Clique can be solved in \(2^{\mathcal {O}(c \sqrt{s} + s \log (c + s))} n^{\mathcal {O}(\sqrt{s})}\) time.

3.3 2-Clubs

A clique is a vertex set S such that each vertex in S has distance 1 to each other vertex within S. One way to relax the clique definition is to allow greater distances of pairs of vertices within G[S]. This idea can be formalized as follows.

Definition 6

For a graph G and \(s \in \mathbb {N}\), a set \(S\subseteq V(G)\) is an s-club if each pair of vertices in S has distance at most s in G[S].

Note that cliques are exactly the 1-clubs. This definition leads to the following decision problem.

figure e

It is known that 2-Club parameterized by k admits an FPT-algorithm [7, 44] and that it does not admit a polynomial kernel unless coNP \(\subseteq \) NP/poly[44]. Since the largest 2-club containing some vertex v is \(N_2[v]\), we observe that the size of a largest 2-club is \(\Delta ^2+1\). This implies fixed-parameter tractability for \(\Delta \). In contrast, 2-Club is W[1]-hard with respect to h-index and it is NP-hard on 6-degenerate graphs [26]. Since \(\gamma \le d+1\), this also implies NP-hardness for constant values of \(\gamma \). We extent these results, by showing that 2-Club remains NP-hard even on 4-closed graphs.

Theorem 7

2-Club remains NP-hard even on 4-closed graphs.

Proof

We reduce from Clique.

Construction Let (Gk) be an instance of Clique. We construct an equivalent instance \((G',k')\) of 2-Club such that \(G'\) is 4-closed. We set \(k'{:}{=}k\cdot n^2\). For each vertex \(w\in V(G)\), we add a clique \(K_w{:}{=}\{w_j\mid j\in \{ 0,\dots , n^2-1 \} \}\) of size \(n^2\) to \(G'\). We denote the graph constructed so far by \(G^0\). Furthermore, let \((e_1,e_2, \ldots , e_m)\) be an arbitrary but fixed ordering of the edges in E(G). We will add edges corresponding to each edge \(e_i\in E(G)\) to \(G'\). We denote by \(G^i\) the graph after we added the gadgets for the edges \(e_1\) to \(e_i\) to \(G^0\). Note that \(G^0\) is the graph constructed so far; a disjoint union of cliques, and that \(G^m=G'\). The idea for the gadget of edge \(e_i=uv\) is as follows: We add a matching between the vertices of the cliques \(K_u\) and \(K_v\). More precisely, we add the edges \(u_iv_{i+\ell _{uv}\bmod n^2}\) for each \(i\in \{ 0,\dots , n^2-1 \}\) and some fixed integer \(\ell _{uv}\). We call \(\ell _{uv}\) the shift of uv. We will assume that \(\ell _{uv} + \ell _{vu} = n^2\). To simplify notation, we will assume that the modulo \(n^2\) is taken after the addition of a shift. The difficult part lies in choosing \(\ell _{uv}\) carefully to obtain a graph with constant closure.

For a vertex pair (ab) of G by \(A_{ab}\) we denote the set of vertices in the cliques \(K_a\) and \(K_b\) and by \(B_{ab}\) the remaining vertices of \(V(G')\). Next, we prove the following invariant which is an essential ingredient to show that \(G'=G^m\) has constant closure number.

Invariant For each i, there is a shift \(\ell _{uv}\) for the gadget of the ith edge \(e_i=uv\) such that for each two nonadjacent vertices \(x\in K_a\) and \(y\in K_b\) for any vertices \(a,b\in V(G)\) we have \( \vert N_{G^i}(x)\cap N_{G^i}(y)\cap B_{ab} \vert \le 1\). Moreover, we can find \(\ell _{uv}\) is polynomial time.

That is, we want to maintain the invariant that two nonadjacent vertices in \(K_a \cup K_b\) have at most one common neighbor in \(B_{ab}\). Recall that \(G^0\) is a disjoint union of cliques. Thus, the invariant holds for \(G^0\). In the following, we assume that the invariant holds for the graph \(G^{i-1}\). Recall that the graph \(G^i\) is constructed from \(G^{i-1}\) by adding the matching for the edge \(e_i= uv\). We will show that the invariant can be maintained for \(G^i\). More precisely, we show that we can compute a shift \(\ell _{uv}\in \{ 0,\dots , n^2-1 \}\) in polynomial time such that adding the edges \(u_jv_{j+\ell _{uv}}\) for each \(j\in \{ 0,\dots , n^2-1 \}\) to \(G^{i-1}\) does not violate the invariant.

Assume to the contrary that the invariant is violated by two nonadjacent vertices in \(G^i\). Observe that there could be three possibilities on how the invariant could be violated in \(G^i\):

  1. Case 1

    Two nonadjacent vertices in \(A_{pq}\) for \(p,q\in V(G){\setminus }\{u,v\}\) violate the invariant,

  2. Case 2

    two nonadjacent vertices in \(A_{uv}\) violate the invariant, or

  3. Case 3

    two nonadjacent vertices in \(A_{wp}\) for \(w\in \{u,v\}\) and \(p\in V(G){\setminus }\{u,v\}\) violate the invariant.

In the following, we show that we can choose the shift \(\ell _{uv}\) in such a way to fulfill the invariant also for \(G^i\). We distinguish the three above cases:

Case 1 Let x and y be a pair of nonadjacent vertices in \(A_{pq}\) violating the invariant. Note that each edge added to \(G^{i-1}\) to obtain \(G^i\) is of the form \(u_rv_s\). Clearly, \(u_r,v_s\notin A_{pq}\). Hence, we conclude that \( \vert N_{G^i}(x)\cap N_{G^i}(y)\cap B_{pq} \vert = \vert N_{G^{i-1}}(x)\cap N_{G^{i-1}}(y)\cap B_{pq} \vert \le 1\) since the invariant holds for \(G^{i-1}\). Thus, this case is not possible.

Case 2 Let x and y be a pair of nonadjacent vertices in \(A_{uv}\) violating the invariant. As in case 1, since only edges with both endpoints in \(A_{uv}\) are added to the graph \(G'\), we obtain that \( \vert N_{G^i}(x)\cap N_{G^i}(y)\cap B_{uv} \vert = \vert N_{G^{i-1}}(x)\cap N_{G^{i-1}}(y)\cap B_{uv} \vert \le 1\) since the invariant holds for \(G^{i-1}\). Thus, this case is also not possible.

Case 3 Without loss of generality, assume that \(w=u\). Recall that adding a matching between the cliques \(K_u\) and \(K_v\) can increase the number of common neighbors in \(B_{up}\) of two nonadjacent vertices in \(A_{up}\) by at most 1. Thus, two vertices in \(A_{up}\) violating the invariant in \(G^i\) have a common neighbor in some clique \(K_t\) in \(G^{i-1}\). Since only the matchings corresponding to the edges \(ut,pt\in E(G)\) result in edges between \(K_u\) and \(K_t\) and between \(K_p\) and \(K_t\), the matchings corresponding to the edges ut and pt are already added to \(G^{i-1}\). To obtain \(G^i\) from \(G^{i-1}\) only a matching between \(K_u\) and \(K_v\) is added. Thus, we conclude that the matching corresponding to the edge pv was already present in \(G^{i-1}\).

For every \(j \in \{ 0,\dots , n^2-1 \}\), we have \(N(u_j) \cap K_t = \{ t_{j + \ell _{ut}} \}\) and \(N(t_{j + \ell _{ut}}) \cap K_p = \{ p_{j + \ell _{ut} + \ell _{tp}} \}\). Hence, \(u_j\) and \(p_{j'}\) have a common neighbor in \(K_p\) if and only if \(j' - j \equiv \ell _{ut} + \ell _{tp}\). Similarly, \(u_j\) and \(p_{j'}\) have a common neighbor in \(K_v\) if and only if \(j'- j \equiv \ell _{uv} + \ell _{vp}\). Consequently, the invariant is only violated if \(\ell _{uv} \equiv \ell _{ut} + \ell _{tp} +\ell _{pv}\). Thus, for each p and t, there is at most one shift violating the invariant, amounting to at most \((n - 2)^2\) forbidden shifts. Since there are \(n^2\) possible shifts, we conclude that we can choose a shift \(\ell _{uv}\) in a way which does not violate the invariant. Note that this does not only show the existence of a shift maintaining the invariant, the above argument also shows that the shift \(\ell _{uv}\) can be constructed in polynomial time, although no explicit formula for \(\ell _{uv}\) is given here.

Thus, we have shown that the invariant is maintained for each i, in particular for \(i=m\) and hence for the resulting graph \(G'\).

Bounded Closure We use the invariant to show that \(G'\) is 4-closed. Consider two nonadjacent vertices \(x\in K_u\) and \(y\in K_v\) in \(G'\). Observe that \(u\ne v\) since otherwise \(xy\in E(G')\). By the invariant, we have \( \vert N_{G'}(x)\cap N_{G'}(y)\cap B_{uv} \vert \le 1\). Recall that \(A_{uv}=K_u\cup K_v\). Since x has at most one neighbor in \(K_v\) and since y has at most one neighbor in \(K_u\), we conclude that x and y have at most three common neighbors. Thus, \(G'\) is 4-closed.

Correctness Suppose that G contains a clique C of size at least k. Let \(S{:}{=}\{K_v\mid v\in C\}\). Clearly, S has size \(k'=k\cdot n^2\). It remains to show that S is a 2-club. Consider two nonadjacent vertices \(x,y\in S\). Note that \(x\in K_u\) and \(y\in K_v\) for \(u,v\in C\) such that \(u\ne v\) since otherwise \(xy\in E(G')\). Since C is a clique, we have \(uv\in E(G)\) and thus we added a matching between the cliques \(K_u\) and \(K_v\). Hence, x has a neighbor z in \(K_v\) and thus x and y have distance 2 since \(K_v\) is a clique.

Conversely, suppose that S contains an 2-club S of size at least \(k'=k\cdot n^2\). Let \(T{:}{=}\{v\mid \vert K_v\cap S \vert \ge n+1\}\). Observe that \( \vert T \vert \ge k\), since otherwise \(\vert S \vert \le \vert T \vert \cdot n^2+(n-\vert T \vert )\cdot n \le kn^2 - (k - 1)n\). In the following, we show that T is a clique in G. Assume towards a contradiction that T is not a clique and let \(u,v\in T\) such that \(uv\notin E(G)\). Let \(u^*\) be a vertex in \(K_u\cap S\) and let \(U{:}{=}N(u^*){\setminus } K_u\). Note that since \(uv\notin E(G)\) we have \(U\cap K_v=\emptyset \). Furthermore, note that by construction each vertex \(y\in K_w\) has at most one neighbor in \(K_x\) for any \(w,x\in V(G)\) such that \(w\ne x\). Thus, \( \vert U \vert \le n\). Furthermore, by the same argument we obtain that each vertex in U has at most 1 neighbor in \(K_v\). Thus, \(u^*\) has distance at most 2 to at most n vertices in \(K_v\). This is a contradiction to the fact that \( \vert S\cap K_v \vert \ge n+1\) and that S is an 2-club. Hence, T is a clique and thus G contains a clique of size at least k. \(\square \)

We leave the complexity of 2-Club on 2-closed graphs and 3-closed graphs open. We want to point out that 2-closed graphs of diameter two are also known to be geodetic, that is, each pair of vertices has a unique shortest path between them. Moreover, it is known that every 2-closed graph G of diameter two satisfies one of the following [3]:

  • G contains a vertex v such that \(N(v) = V(G)\), or

  • G is strongly regular, that is, G is regular and for some \(\lambda , \mu \in \mathbb {N}\), every two adjacent (nonadjacent) vertices have \(\lambda \) (\(\mu \), respectively) common neighbors (note that \(\mu = 1\) since G is 2-closed), or

  • G has exactly two vertex degrees.

To show that 2-Club in 2-closed graph is solvable in polynomial time exploiting these three properties might be helpful.

For 2-clubs we only studied the decision variant 2-Club in which we ask for an sufficiently large 2-club in c-closed graphs. The enumeration of all maximal 2-clubs is not possible in FPT-time even for graphs with constant closure: Observe that in the construction of Theorem 7C is a maximal clique in the graph G of the Clique instance if and only if \(\{K_c\mid c\in C\}\) is a maximal 2-club in the graph \(G'\) of the 2-Club instance. The number of maximal cliques in an n-vertex graph is \(3^{n/3}\) [40]. Hence, the above correspondence shows that even a 4-closed graph may have up to \(3^{n/3}\) maximal 2-clubs.

4 Bicliques

The counterpart of cliques in bipartite graphs are (non-) induced bicliques. In this section we study the parameterized complexity of enumerating all maximal (non-) induced bicliques and finding a sufficiently large (non-) induced biclique in (weakly) closed graphs.

4.1 Non-induced Biclique

In this subsection, we study problems of finding non-induced maximal bicliques fulfilling certain cardinality constraints. Next, we formally define non-induced bicliques.

Definition 7

In a graph \(G=(V,E)\) two disjoint vertex sets \(S\subseteq V\) and \(T\subseteq V\) are a non-induced biclique if \(st\in E(G)\) for each \(s\in S\) and each \(t\in T\).

There is an algorithm that enumerates in \(\mathcal {O}^*(2^{d})\) time all maximal pairs of sets S and T such that each vertex of S is adjacent to each vertex of T [16].Footnote 3 We also consider the problem of finding a sufficiently large non-induced biclique.

figure f

Non-Induced \((k_1, k_2)\)-Biclique is W[1]-hard with respect to \(k_1\) even if \(k_1=k_2\) [37]. We also consider Non-Induced Max-Edge Biclique where we demand that \( \vert S \vert \cdot \vert T \vert \ge k\) instead of putting constraints on the partition sizes. We may assume that \(\min \{ \vert S \vert , \vert T\vert \} \le \sqrt{k}\). Thus, Non-Induced Max-Edge Biclique can be solved by solving \(\sqrt{k}\) instances of Non-Induced \((k_1, k_2)\)-Biclique and thus the latter problem can be considered to be more difficult in our setting. Non-Induced Max-Edge Biclique can be solved in \(\mathcal {O}(k^{2.5}k^{\sqrt{k}}n)\) time by applying the algorithm for Induced Max-Edge Biclique on bipartite graphs [19].

First, we study the parameterized complexity of enumerating all maximal non-induced bicliques in weakly \(\gamma \)-closed graphs. We need to define carefully, however, what we mean by enumerating bicliques: The algorithm of Eppstein [16] enumerates in \(\mathcal {O}^*(2^{d})\) time all maximal pairs of sets S and T such that each vertex of S is adjacent to each vertex of T. For this enumeration problem, an FPT-algorithm for the weak closure is unattainable since any clique of size n is 1-closed and admits \(\Theta (2^{n})\) bipartitions that need to be enumerated. To circumvent this issue, we view a biclique as a vertex set that can be partitioned into sets S and T. Thus, in order to strengthen the parameterization from d to \(\gamma \), we go from an explicit listing of bicliques with bipartitions to a compact representation of bicliques as vertex sets and this is indeed necessary. We say that a vertex set \(U \subseteq V(G)\) is a non-induced biclique if G[U] contains a biclique as a (not necessarily induced) subgraph. Note that it can be decided in \(\mathcal {O}(n^2)\) time whether a vertex set \(U \subseteq V(G)\) is a non-induced biclique or not, because U is a non-induced biclique if and only if the complement of G[U] has multiple connected components. We adapt the algorithm of Theorem 2 to obtain an \(\mathcal {O}^*(2^\gamma )\)-time algorithm to enumerate all maximal non-induced bicliques.

Recall that in Theorem 2 we bounded the overall number of maximal s-plexes in a weakly \(\gamma \)-closed graph G by distinguishing 4 different types of maximal s-plexes if we are provided wih the set of maximal s-plexes of \(G-v\). As in the proof of Theorem 2, we aim to enumerate all maximal non-induced bicliques in G, provided with the collection \(\mathcal {S'}\) of all non-induced maximal bicliques in \(G' {:}{=}G - v\). Again, we define the same four types of non-induced bicliques S: Type 1: S does not contain v, Type 2: S contains v and \(S {\setminus } \{ v \}\) is maximal in \(G'\), Type 3: S contains v\(S {\setminus } \{ v \}\) is not maximal in \(G'\), and S contains a non-neighbor u of v, and Type 4: S contains v\(S {\setminus } \{ v \}\) is not maximal in \(G'\), and S is contained in the neighborhood of v, that is, \(S \subseteq N_G[v]\).

First and foremost, all maximal non-induced bicliques of Type 1 and Type 2 can be enumerated from \(\mathcal {S}'\) in \( \vert \mathcal {S}' \vert \cdot n^2\) time. We claim that there are at most \(2^{\gamma - 1} n\) maximal non-induced bicliques of Type 3: Let U be such a non-induced biclique with a bipartition (ST). Without loss of generality, assume that \(u, v \in S\). There are at most n choices for \(u \in S {\setminus } N_G[v]{}\) and there are at most \(2^{\gamma - 1}\) choices for \(T \subseteq N_G(v) \cap N_G(u)\). Since U is a maximal non-induced biclique, we obtain \(S = \bigcap _{w \in T} N_G(w)\). Finally, there is only one maximal non-induced biclique of Type 4, namely \(N_G[v]\). Thus, we obtain the following theorem.

Theorem 8

All maximal non-induced bicliques can be enumerated in \(\mathcal {O}^*(2^\gamma )\) time.

Second, we consider the decision variant of this problem. We show that Non-Induced \((k_1, k_2)\)-Biclique can be solved in \(\mathcal {O}^*(2^\gamma )\) time, using this enumeration algorithm.

Theorem 9

Non-Induced \((k_1, k_2)\)-Biclique can be solved in \(\mathcal {O}^*(2^{\gamma })\) time.

Proof

With the algorithm behind Theorem 8 we can enumerate the vertex sets of all maximal non-induced bicliques. This algorithm, however, only returns the vertex set, and not a bipartition of any maximal non-induced biclique. To check whether any of these maximal non-induced bicliques has a bipartition into sets S and T such that \(\vert S\vert \ge k_1\) and \(\vert T\vert \ge k_2\), we use the following observation: Let \(G'\) denote the complement graph of G. Any connected component of \(G'\) is either completely contained in S or completely contained in T. Now, we can use this observation to define an instance of Subset Sum to check whether there exists a valid bipartition. Subset Sum is formally defined as follows.

figure g

A standard dynamic programming algorithm can solve Subset Sum in \(\mathcal {O}(n \cdot \sum _{a \in A} a)\) time. To solve Non-Induced \((k_1, k_2)\)-Biclique, we construct an instance \((A', k_1', k_2')\) of Subset Sum for each maximal non-induced biclique U with \(\vert U\vert \ge k_1+k_2\) returned by the algorithm of Theorem 8, where \(k_1' {:}{=}k_1\)\(k_2' {:}{=}\vert U \vert - k_2\), and \(A' {:}{=}\{ \vert C_i \vert :i \in [\ell ] \}\) for the connected components \(C_1, \dots , C_{\ell } \subseteq V(G)\) of the complement of G[U]. Observe that \((G, k_1, k_2)\) is a Yes-instance if and only if the constructed instance of Subset Sum is a Yes-instance for some maximal non-induced biclique U: note that \(k_1'\) is a lower bound and \(k_2'\) is an upper bound for the size of the smaller side of any valid bipartition and any solution B of the Subset Sum instance corresponds to S, the smaller side of the bipartition of U, and \(A{\setminus } B\) corresponds to the other part of the bipartition. \(\square \)

Recall that Non-Induced Max-Edge Biclique can be solved by solving \(\sqrt{k}\) instances of Non-Induced \((k_1, k_2)\)-Biclique. Hence, we obtain the following from Theorem 9.

Corollary 7

Non-Induced Max-Edge Biclique can be solved in \(\mathcal {O}^*(2^{\gamma })\) time.

4.2 Induced Biclique

In this subsection, we study problems where one aims to find induced maximal bicliques fulfilling certain cardinality constraints. Formally, we consider the following.

Definition 8

In a graph \(G=(V,E)\) two disjoint vertex sets \(S\subseteq V\) and \(T\subseteq V\) are an induced biclique if \(G[S \cup T]\) is isomorphic to a complete bipartite graph, that is, \(st\in E(G)\) for each \(s\in S\) and each \(t\in T\)\(ss'\notin E(G)\) for each \(s,s'\in S\), and \(tt'\notin E(G)\) for each \(t,t'\in T\).

Gaspers et al. [23] provided an \(\mathcal {O}^*(3^{n/3})\)-time algorithm to enumerate all maximal induced bicliques. Moreover, all maximal induced bicliques can be enumerated in \(\mathcal {O}^*(3^{(\Delta +d)/3})\) time [27]. On the negative side, it is impossible to enumerate all maximal induced bicliques in time \(\mathcal {O}^*(f(d + c))\) for any function f because a graph may have too many maximal induced bicliques [27]: Consider the graph with a single universal vertex u and \((n - 1) / 3\) disjoint triangles. This graph is 3-degenerate and 2-closed, and it has \(3^{(n - 1) / 3}\) maximal induced bicliques where one part consists of u.

In addition to the enumeration problem, we also study the following decision problem.

figure h

When \(k_1 = k_2\), we will refer to the problem as Induced (kk)-Biclique. Induced (kk)-Biclique is W[1]-hard [12]. We also consider Induced Max-Edge Biclique where we demand that \( \vert S \vert \cdot \vert T \vert \ge k\) instead of putting constraints on the partition sizes. Induced Max-Edge Biclique is NP-hard [41] and W[1]-hardness with respect to the solution size k can be shown by a reduction from Independent Set where we attach an universal vertex. As in the non-induced case, Induced Max-Edge Biclique can be solved by solving \(\sqrt{k}\) instances of Induced \((k_1,k_2)\)-Biclique. Thus, positive results for Induced \((k_1,k_2)\)-Biclique transfer to Induced Max-Edge Biclique.

First, we present an FPT-algorithm for Induced (kk)-Biclique parameterized by \(\gamma \).

Theorem 10

Induced (kk)-Biclique can be solved in \(\mathcal {O}^*(\gamma ^{\mathcal {O}(\gamma )})\) time.

Proof

Since a biclique \(K_{\gamma , \gamma }\) is not weakly \(\gamma \)-closed, (Gkk) is a No-instance if \(k \ge \gamma \). Moreover, Induced (kk)-Biclique is trivially solvable in polynomial time when \(k \le 1\). Hence, we may assume that \(2 \le k < \gamma \). Let \(\sigma \) be a fixed weak closure ordering of G. Suppose that (ST) is a solution of (Gk). Furthermore, let \(v \in S \cup T\) be the vertex of \(S\cup T\) that appears in \(\sigma \) before all other vertices of \(S \cup T\). We assume without loss of generality that v lies in S. Note that there are at most n choices for v. Let \(G'\) be the graph obtained by removing all vertices preceding v in \(\sigma \). Furthermore, let \(v' \in V(G') {\setminus } \{ v \}\) be another vertex which is contained in S. Note that there are at most n choices for \(v'\). Next, we determine an independent set \(T \subseteq N_{G'}(v) \cap N_{G'}(v')\) of at least k vertices. Since \( \vert N_{G'}(v) \cap N_{G'}(v') \vert < \gamma \), there are at most \(2^\gamma \) possibilities for T. Now, it remains to find an independent set \(S \subseteq \bigcap _{u \in T} N_{G'}(u)\) of size at least k in \(G'\). Recall that Independent Set admits a kernel with at most \(\gamma k^2\) vertices by Corollary 1, and thus this can be achieved in \(\mathcal {O}^*((\gamma k^2)^k)\) time. Since \(k < \gamma \), the overall running time is \(\mathcal {O}^*(2^\gamma \gamma ^{3\gamma }) = \mathcal {O}^*(\gamma ^{\mathcal {O}(\gamma )})\). \(\square \)

For c-closed graphs, we show that there is a single-exponential time algorithm when \(k_1 \ge 2\). Our algorithm is based on a reduction to a variant of Independent Set called Bicolored Independent Set [11].

figure i

Theorem 11

Induced \((k_1, k_2)\)-Biclique with \(k_1\ge 2\) can be solved in \(\mathcal {O}^*(1.611^c)\) time.

Proof

Let \((G=(V,E),k_1,k_2)\) be an instance of Induced \((k_1, k_2)\)-Biclique. Since \(k_1\ge 2\) any induced biclique with \(k_1\) vertices in one partite set and with \(k_2\) vertices in the other partite set contains at least on cycle on four vertices. For each induced cycle \((u_S, u_T, v_S, v_T)\) on four vertices in G we search the largest induced biclique containing these four vertices. Now, we construct an instance \((G', V_1', V_2', k_1, k_2)\) of Bicolored Independent Set, where

  • \(V_1' {:}{=}N_G(u_S) \cap N_G(v_S)\),

  • \(V_2' {:}{=}N_G(u_T) \cap N_G(v_T)\), and

  • \(G' {:}{=}(V_1' \cup V_2', E(G[V_1']) \cup E(G[V_2']) \cup \{ v_1' v_2' \mid v_1' \in V_1', v_2' \in V_2', v_1' v_2' \notin E(G) \})\).

In other words, \(G'\) is constructed from \(G[V_1' \cup V_2']\) by flipping the adjacency between \(V_1'\) and \(V_2'\). By the c-closure of G, there are at most \(2c - 2\) vertices in \(G'\). Since \(v_1' \in V_1'\) and \(v_2' \in V_2'\) are adjacent in G if and only if they are not in \(G'\), there is a \((k_1, k_2)\)-biclique containing \(u_S, u_T, v_S, v_T\) if and only if \((G', V_1', V_2', k_1, k_2)\) is a Yes-instance. Since Bicolored Independent Set is \(\mathcal {O}^*(1.2691^n)\)-time solvable on n-vertex graphs [11], we obtain an \(\mathcal {O}^*(1.611^c)\)-time algorithm for Induced \((k_1, k_2)\)-Biclique. \(\square \)

By using a reduction similar to the one in the proof of Theorem 11, and using the algorithm of Gaspers et al. [23] to enumerate all maximal induced bicliques in \(\mathcal {O}^*(3^{n/3})\) time we obtain the following.

Proposition 1

All maximal induced bicliques in which each part has at least two vertices can be enumerated in \(\mathcal {O}^*(3^{2c/3})\) time.

However, even 2-closed graphs may have \(\Omega (3^{n/3})\) maximal induced bicliques: Consider the aforementioned graph proposed by Hermelin and Manoussakis [27], which consists of a single universal vertex u and \((n - 1) / 3\) disjoint triangles. Observe that this graph is 2-closed and has \(3^{(n - 1) / 3}\) maximal induced bicliques where one part consists of u.

In contrast to our positive result for \(k_1 \ge 2\) presented in Theorem 11, we prove that Induced (1, k)-Biclique is NP-hard even on graphs with constant h-index, c-closure, and weak \(\gamma \)-closure.

Theorem 12

Induced Max-Edge Biclique and Induced \((1, k_2)\)-Biclique remain NP-hard even on graphs with h-index 4, c-closure 3, and weak \(\gamma \)-closure 2.

Proof

We first show the NP-hardness for Induced Max-Edge Biclique. We reduce from Independent Set, which is NP-hard even on graphs in which each vertex has degree at most 3 [21]. Recall that in Independent Set we are given a graph G and an integer k, and ask whether G contains an independent set of size at least k. We assume that \(k\ge 10\), since otherwise the instance (Gk) can be solved in polynomial time. We construct an instance \((G',k')\) of Induced Max-Edge Biclique as follows: We begin with a copy of G. Then, each edge \(uv\in E(G)\) is replaced by a path on four vertices \(u, u_v, v_u\), and v. Finally, we introduce a new universal vertex w (that is, \(N_{G'}[w] = V(G')\)) and set \(k'{:}{=}k+\vert E(G) \vert \). It is easy to see that \(G'\) has h-index 4 (because every vertex except w has degree at most 4), is 3-closed and weakly 2-closed. It remains to show that G contains an independent set of size k if and only if \(G'\) contains an induced biclique with at least \(k'=k+ \vert E(G) \vert \) edges.

Suppose that G contains an independent set I of size at least k. Then, there is an independent set \(I'\) of size \(k + \vert E(G) \vert \) in \(G' - w\): Since I is an independent set, for each edge \(uv\in E(G)\) we have without loss of generality that \(u\notin I\). Let \(F{:}{=}\{u_v\mid uv\in E(G)\text { such that }\)u\(\notin \) I\(\}\) be the union of the neighbors of these vertices u not in the independent set in paths on four vertices in \(G'\). Then, \(I'\) is the disjoint union of I and F. Thus, the set \(I' \cup \{ w \}\) is an induced biclique with at least \(k+ \vert E(G) \vert \) edges in \(G'\).

Conversely, suppose that \(G'\) contains a biclique (ST) with at least \(k'=k+\vert E(G)\vert \) edges. Since each vertex in \(G' - w\) has degree at most 3 and \(k\ge 10\), we see that vertex w is contained in (ST). Without loss of generality, assume that \(w \in S\). Since w is a universal vertex, we obtain \(S=\{w\}\). It follows that T is an independent set of size at least \(k + \vert E(G) \vert \) in \(G'\). We may assume \(\vert T \cap \{ u_v, v_u \} \vert = 1\): For each edge \(uv\in E(G)\), the set T contains at most one of \(u_v\) and \(v_u\). If neither is in T, then \((T {\setminus } \{ u \}) \cup \{ u_v \}\) is another independent set of size \(k'\). Thus, we may assume that \(\vert T \cap \{ u_v, v_u\} \vert = 1\) for every \(uv \in E(G)\). No pair of adjacent vertices u and v in G are part of T since otherwise T contains three vertices from a path \((u, u_v, v_u, v)\). Thus, \(T \cap V(G)\) is an independent set of size \(\vert T' \vert - \vert E(G) \vert \ge k\).

Finally, note that this reduction also shows NP-hardness of Induced \((1, k_2)\)-Biclique (let \(k_2 = k'\)). \(\square \)

Together with Theorem 12, the next theorem paints a full picture of the complexity of Induced \((k_1, k_2)\)-Biclique with respect to the weak closure number.

Theorem 13

For constant \(k_1 \ge 2\), Induced \((k_1, k_2)\)-Biclique on weakly \(\gamma \)-closed graphs is polynomial-time solvable if \(\gamma \le k_1 + 1\) and NP-hard otherwise. Moreover, Induced \((1, k_2)\)-Biclique on weakly 1-closed graphs is polynomial-time solvable.

Proof

We start with the NP-hardness. We adapt the reduction in the proof of Theorem 12: Instead of adding a single universal vertex w, we add \(k_1\) universal vertices (which are pairwise nonadjacent). Note that the graph constructed by our reduction is weakly \((k_1 + 2)\)-closed (consider an ordering in which all the universal vertices appear last).

Our polynomial-time algorithms solve Independent Set on weakly 1-closed graphs as a subroutine. We fix a weak closure ordering \(\sigma \). Start with \(I = \emptyset \).

In a first step, we add the last vertex v of \(\sigma \) to I and then delete N[v] from the graph. For the correctness of this step, observe that the neighborhood of v is a clique. Otherwise, there exists a non-neighbor u of v with \(u<_\sigma v\) and distance 2 to v. Since u and v have at least one common neighbor, we obtain a contradiction to the fact that the graph is weakly 1-closed. Since N[v] is a clique, there exists a maximum independent set containing v. We repeat this step until the graph is empty.

Next, we give a polynomial-time algorithm for Induced \((1, k_2)\)-Biclique on weakly 1-closed graphs. Without loss of generality, we assume that the input graph G is connected. Observe that there is a universal vertex u that is adjacent to every other vertex. Now, observe that there is an induced \((1, k_2)\)-biclique in G if and only if a maximum independent set of size \(k_2\) in \(G - u\). Since a maximum independent set in a weakly 1-closed graph can be found in polynomial time, we are done.

Finally, we prove the polynomial-time solvability for \(\gamma \le k_1 + 1\). Observe that if \(\gamma \le k_1\), then we have a No-instance of Induced \((k_1, k_2)\)-Biclique since an induced \((k_1,k_2)\)-biclique has weak closure \(k_1+1\). Hence, in the following we assume that \(\gamma =k_1+1\). Now, consider a hypothetical solution (ST) with \(\vert S \vert = k_1\) and \( \vert T \vert = k_2\). We can guess which vertices correspond to the smaller side S in \(\mathcal {O}(n^{k_1})\) time. Let \(\sigma \) be a fixed weak closure ordering and let X be the set of vertices that occur in \(\sigma \) before any vertex in S. Since \(T\cap X\) are common neighbors of S we observe that \(T\cap X\) has size at most \(\gamma -1=k_1\). Hence, in \(\mathcal {O}(n^{k_1})\) time, we can guess \(T\cap X\). It remains to find \(T \cap X\). Note that \(T \cap X \subseteq U {:}{=} \bigcap _{s \in S} N(s)\), that is, \(S \subseteq N(t)\) for every vertex \(t \in T \cap X\). Observe that \(G[U \cap X]\) is weakly 1-closed: In the ordering \(\sigma \), two nonadjacent vertices \(u,u'\in U\cap X\) such that \(u <_{\sigma } u'\) have no common neighbor \(w \in U \cap X\) with \(u <_{\sigma } w\) since u and \(u'\) have S as common neighbors which appear after \(u'\) in \(\sigma \), and S has size \(k_1=\gamma - 1\). As argued above, we can find a maximum independent set in \(G[U \cap X]\) in polynomial time. Thus, Induced \((k_1, k_2)\)-Biclique can be solved in polynomial time if \(k_1\) is a constant and \(\gamma \le k_1+1\). \(\square \)

To complete the dichotomy with respect to c, we prove that Induced Max-Edge Biclique and Induced \((k_1, k_2)\)-Biclique can be solved in polynomial time if \(c=2\). Observe that Theorem 11 implies a polynomial-time algorithm for \(k_1\ge 2\) if \(c=2\). Hence, it remains to show that Induced \((1, k_2)\)-Biclique can be solved in polynomial-time if \(c=2\). For this, is it sufficient to consider diamond-free graphs since each 2-closed graph is diamond-free.

Proposition 2

Induced \((1, k_2)\)-Biclique can be solved in polynomial time on diamond-free graphs.

Proof

Suppose that the input graph G is diamond-free. Then, for each vertex \(v \in V(G)\) the graph G[N(v)] is a disjoint union of cliques. Thus, \((G, 1, k_2)\) is a Yes-instance if and only if there is a vertex \(v \in V(G)\) such that G[N(v)] has at least \(k_2\) connected components. \(\square \)

Now, from Proposition 2 (\(k_1=1\)) and Theorem 11 (\(k_1\ge 2\)) we obtain the following.

Corollary 8

Induced \((k_1, k_2)\)-Biclique and Induced Max-Edge Biclique can be solved in polynomial time on 2-closed graphs.

Our results for Induced \((k_1, k_2)\)-Biclique can be summarized as follows (see also Table 2): If \(k_1 = k_2\), then the problem becomes FPT with respect to the weak closure number \(\gamma \) (Theorem 9). In the general case, the complexity strongly depends on whether \(k_1 \ge 2\) or \(k_1 = 1\). If \(k_1 \ge 2\), the problem is polynomial-time solvable for \(\gamma \le k_1 + 1\) (Theorem 13), NP-hard for \(\gamma \ge k_1 + 2\) (Theorem 13), and FPT for the parameterization by c (Theorem 11). If \(k_1 = 1\), then we have a complexity dichotomies in terms of c and \(\gamma \): we have a polynomial-time algorithm for \(c = 2\) (Corollary 8) and \(\gamma = 1\) (Theorem 13) and NP-hardness for \(c \ge 3\) (Theorem 12) and \(\gamma \ge 2\) (Theorem 12).

5 Variants of Dominating Set

In companion work [32], we showed that Dominating Set admits a kernel of size \(k^{\mathcal {O}(c)}\). Recently, Lokshtanov and Surianarayanan showed that Dominating Set parameterized by \(\gamma +k\) can be solved in \(\mathcal {O}^*(k^{\mathcal {O}(\gamma ^2k^3)})\) time [38]. Here, we develop FPT-algorithms for the related Independent Dominating Set and Dominating Clique problems in weakly \(\gamma \)-closed graphs.

5.1 Independent Dominating Set

We consider the Independent Dominating Set problem. The task in this problem is to find a small independent set S that dominats all vertices in G.

Definition 9

A vertex set \(S\subseteq V(G)\) is a dominating set in G if  \(S\cap N[v]\ne \emptyset \) for each \(v\in V\). Moreover, \(S\subseteq V(G)\) is an independent dominating set in G if S is a dominating set and all vertices of S are pairwise nonadjacent.

figure j

Independent Dominating Set is W[2]-hard for the parameter k [15]. There are several fixed-parameter tractability results in restricted graph classes: Independent Dominating Set has a kernel of \(\mathcal {O}(d^2 k^{d+1})\) vertices computable in \(\mathcal {O}^*(2^d)\) time [42]. Moreover, when the graph contains no cycles of length 3 or 4, Independent Dominating Set can be solved in \(\mathcal {O}^*(k^{\mathcal {O}(k)})\) time [43].

We present an FPT-algorithm SolveIDS (Algorithm 1) with running time \(\mathcal {O}^*((\frac{\gamma -1}{2})^k k^{2k})\). Note that our algorithm extends the \(\mathcal {O}^*(k^{\mathcal {O}(k)})\) time algorithm of Raman and Saurabh [43], because any graph without cycles of length 3 or 4 is 2-closed. Let \(G'\) be a copy of G. Algorithm 1 first greedily computes an independent set I of G of size at most \(k+1\) by iteratively choosing vertices v such that \({{\,\textrm{cl}\,}}_{G'}(v) \le \gamma - 1\) and afterwards removing N[v] from \(G'\) (Line 6). If I is inclusion-maximal and of size at most k, then I constitutes a solution. Otherwise, we find a vertex set P to branch on. The choice of I will ensure that P has at most \((\gamma - 1) \left( {\begin{array}{c}k + 1\\ 2\end{array}}\right) \) vertices.

figure k

Theorem 14

Independent Dominating Set can be solved in \(\mathcal {O}^*((\frac{\gamma -1}{2})^k k^{2k})\) time.

Proof

We show that the search tree algorithm Algorithm 1 solves any instance (Gk) of Independent Dominating Set in the claimed time. First, we prove the correctness of Algorithm 1. Let I be the independent set of size at most \(k+1\) of G obtained in Lines 4 to 7. Suppose that \( \vert I \vert \le k\). Since I is a maximal independent set, each vertex \(v\in V(G)\) is either contained in I or a neighbor of a vertex in I. Hence, I is an independent dominating set of size at most k of G. Thus, (Gk) is a Yes-instance. Now, suppose that \( \vert I \vert =k+1\). Let P be the set of vertices in G which have at least two neighbors in I (Line 10). Since \( \vert I \vert =k+1\), the sought solution S must contain at least one vertex u of P. If \(u \in S\), then S does not contain any neighbor of u. Thus, the branching into \((G - N_G[u], k - 1)\) in Line 13 is correct.

Now, we analyze the running time of Algorithm 1. First, we bound the number of children of any node in the search tree. To do so, we prove that \( \vert P \vert \le (\gamma -1) \left( {\begin{array}{c}k + 1\\ 2\end{array}}\right) \). Let \(v_i\) be the ith vertex added to I in Line 7 and let \(G_i {:}{=}G - N_G[\{ v_1, \dots , v_{i - 1} \}]\) for each \(i \in [k + 1]\). Observe that \({{\,\textrm{cl}\,}}_{G_i}(v_i) \le \gamma - 1\) for each \(i \in [k]\) since G is weakly \(\gamma \)-closed. For a vertex \(u \in P\), let \(v_i \in I\) be the first vertex that u is adjacent to. Then, u is present in the graph \(G_i\) and we have \(u \in N_{G_i}(v_i)\). Thus, \(P \subseteq \bigcup _{i \in [k+1]} N_{G_i}(v_i)\) and we see that \( \vert P \vert \le \sum _{i \in [k + 1]} \vert N_{G_i}(v_i) \cap P \vert \). Moreover, we have \( \vert N_{G_i}(v_i) \cap P \vert \le \sum _{j \in [i + 1, k + 1]} \vert N_{G_i}(v_i) \cap N_{G_i}(v_j) \vert \) for each \(i \in [k]\). Since I is an independent set we obtain that \(\vert N_{G_i}(v_i) \cap N_{G_i}(v_j) \vert \le \gamma -1\) for each \(j\in [i+1,k+1]\). Therefore,

$$\begin{aligned} \vert P \vert \le \sum _{i < j \in [k + 1]} \vert N_{G_i}(v_i) \cap N_{G_i}(v_j) \vert \le (\gamma - 1) \left( {\begin{array}{c}k + 1\\ 2\end{array}}\right) . \end{aligned}$$

It is easy to see that finding an independent set I in Lines 4 to 7 only requires polynomial time. Hence, the algorithm spends polynomial time in each search tree node. Since each node has at most \((\gamma -1) \left( {\begin{array}{c}k + 1\\ 2\end{array}}\right) \) children in the search tree and its depth is at most k, the overall running time of Algorithm 1 is \(\mathcal {O}^*((\gamma -1 \cdot \left( {\begin{array}{c}k + 1\\ 2\end{array}}\right) )^k) = \mathcal {O}^*((\frac{\gamma -1}{2})^k k^{2k})\). \(\square \)

A natural next question is whether Independent Dominating Set admits a polynomial kernel in weakly \(\gamma \)-closed graphs. We answer this question in the negative way, that is, we provide kernel lower bounds for Independent Dominating Set via a cross-composition [4, 5].

An equivalence relation R on \(\Sigma ^*\) is called a polynomial equivalence relation if the following two conditions hold: (1) There is an algorithm that given two strings \(x,y\in \Sigma ^*\) decides whether x and y belong to the same equivalence class in \(( \vert x \vert + \vert y \vert )^{\mathcal {O}(1)}\) time, and (2) for any finite set \(S\subseteq \Sigma ^*\) the equivalence relation R partitions the elements of S into at most \((\max _{x\in S} \vert x \vert )^{\mathcal {O}(1)}\) classes.

Definition 10

Let \(L\subseteq \Sigma ^*\) be a set and let \(Q\subseteq \Sigma ^*\times \mathbb {N}\) be a parameterized problem. We say that L cross-composes into Q if there is a polynomial equivalence relation R and an algorithm which, given \(2^t\) strings \(x_1,x_2,\ldots ,x_{2^t}\) belonging to the same equivalence class of R, computes an instance \((x^*,k^*)\in \Sigma ^*\times \mathbb {N}\) in time polynomial in \(\sum _{i=1}^{2^t} \vert x_i \vert \) such that:

  1. 1.

    \((x^*,k^*)\in Q\) if and only if \(x_i\in L\) for some \(i\in [2^t]\), and

  2. 2.

    \(k^*\) is bounded by a polynomial in \(\max _{i \in [2^t]} \vert x_i \vert +t\).

It is known that if an NP-hard problem cross-composes into a parameterized problem, then the parameterized problem does not admit a kernel of polynomial size unless coNP \(\subseteq \) NP/poly [4, 5].

Theorem 15

Unless coNP \(\subseteq \) NP/poly, Independent Dominating Set admits

  • no kernel of size \((k + c)^{\mathcal {O}(1)}\) and

  • no kernel of size \(k^{\mathcal {O}(1)}\) even if \(\gamma = 2\).

Proof

We provide a cross-composition from Independent Dominating Set on 2-closed graphs. Note that Independent Dominating Set remains NP-hard on 2-closed graphs and hence also on weakly 2-closed graphs. This follows from the fact that Independent Dominating Set is NP-hard on graphs of girth at least five [6, 46]. In particular, the graph constructed by the cross-composition procedure is weakly 2-closed and \((t + 2)\)-closed.

Assume that we are given \(2^t\) instances \(I_x{:}{=}(G_x,k)\) of Independent Dominating Set on 2-closed graphs for \(x\in [2^t]\). We will describe how to construct an instance \((G',k')\) of Independent Dominating Set with weak closure 2 and closure \(t+2\) that meets the requirements as specified in Definition 10. To do so, we write an integer \(x \in [2^t]\) in binary encoding \((x_1,\ldots , x_t)\). For \(y\in \{0,1\}\) let \({\widetilde{y}}{:}{=}1 - y\). Furthermore, for any string \(x{:}{=}(x_1,\ldots , x_s)\) a string \((x_1,\ldots , x_p)\) for some \(p\in [s]\) is a prefix of x.

First, we construct the instance selector gadget \(H_t\). For each string \(z\in \{0,1\}^*\) of length at most t, we introduce a vertex \(w_z\) to \(H_t\). We add an edge \(w_{z} w_{y}\) whenever z is a prefix of y. Furthermore, we add an edge \(w_{z}w_{y}\) whenever z and y are of the same length s and they differ only in the last bit, that is, \(z{:}{=}(z_1,\ldots ,z_{s-1},z_s)\) and \(y{:}{=}(z_1,\ldots , z_{s-1},\widetilde{z_s})\). This concludes the construction of \(H_t\).

To construct \(G'\), start with a disjoint union of \(G_x\) for all \(x \in [2^t]\) and with \(H_t\). We then add an edge from vertex \(w_z\) to every vertex in \(V(G_x)\) whenever z is a prefix of x. Finally, we set \(k'{:}{=}k+t\). As we will show, every independent set of \(H_t\) avoids dominating the vertices of \(G_x\) for some \(x \in \{ 0, 1 \}^t\) (see Claim 2). Intuitively speaking, this ensures that \(G_x\) has an independent dominating set of size at most k whenever \((G', k')\) is a Yes-instance.

Before showing the correctness, we verify that \(G'\) is weakly 2-closed. To this end, we show that every induced subgraph \(G^*\) of \(G'\) has a vertex \(v\in V(G^*)\) such that \({{\,\textrm{cl}\,}}_{G^*}(v)<2\). If \(G^*\) does not contain any vertex of \(H_t\), then \(G^*\) is 2-closed. Otherwise, assume that \(G^*\) contains at least one vertex of \(H_t\). Let \(w_z\in V(G^*)\) be a vertex such that \(z{:}{=}(z_1,\ldots , z_{s-1},z_s)\) has the shortest length among all vertices \(w_y\in V(H_t)\cap V(G^*)\). We show that \(w_z\) and any vertex \(v \in V(G^*) {\setminus } N[w_z]\) have at most one common neighbor. We show this claim for \(v=w_y\); the proof for \(v \in V(G_x)\) with \(x \in [2^t]\) is analogous because \(N(v) \subseteq N(w_x)\). Since \(w_zw_y\notin E(G')\), we observe that z is not a prefix of y. By construction, we have

$$\begin{aligned} N_{G'}(w_z)\cap N_{G'}(w_y) \subseteq Z \cup \{ w_{(z_1, \dots , \widetilde{z_s})}\}, \end{aligned}$$

Here, \(Z {:}{=}\{ w_{z'} \mid z'\) is a prefix of both y and \(z \}\). Since z has the shortest length among all strings \(z'\) such that \(w_{z'}\in V(G^*)\), we have \(Z \cap V(G^*) = \emptyset \). Hence, we have \( \vert N_{G^*}(w_z)\cap N_{G^*}(w_y) \vert \le 1\). We thus have shown that \(G'\) is weakly 2-closed.

We then examine the c-closure of \(G'\). By construction, each vertex has at most t neighbors in \(H_t\). Hence, any two nonadjacent vertices of \(G'\) have at most t common neighbors in \(H_t\). Moreover, since the \(2^t\) many instances of Independent Dominating Set are 2-closed and disjoint and any two vertices in \(H_t\) having a common neighbor in some \(G_x\) are adjacent, we conclude that any two nonadjacent vertices of \(G'\) have at most one common neighbor in \(\bigcup _{x \in [2^t]} V(G_x)\). Thus, \(G'\) is \((t + 2)\)-closed.

Next we show that \(G'\) contains an independent dominating set of size at most \(k'\) if and only if \(G_x\) contains an independent dominating set of size at most k for some \(x\in [2^t]\).

Assume that S is an independent dominating set of size at most k for the instance \(I_x\). Recall that the binary encoding of x is \((x_1,\ldots , x_t)\) where \(x_i\in \{0,1\}\) for each \(i\in [t]\). We define \(y_i{:}{=}(x_1,\ldots , x_{i-1},\widetilde{x_i})\) for each \(i\in [t]\). In the following, we verify that \(S'{:}{=}S\cup \{w_{y_i}\mid i\in [t]\}\) is an independent dominating set of size at most \(k'\) of \(G'\). Clearly, \(S'\) has size at most \(k+t=k'\). It remains to verify that \(S'\) is an independent dominating set of \(G'\).

First, we show that \(S'\) is an independent set in \(G'\). Since \(y_i\) is not a prefix of x for each \(i\in [t]\), we conclude that \(z_{y_i}\) is not adjacent to any vertex of \(V(G_x)\). Furthermore, by assumption S is an independent set. Thus, it remains to show that \(w_{y_i}w_{y_j}\notin E(G')\) for each \(i\ne j\). Without loss of generality, assume that \(i<j\). Recall that \(y_i=(x_1,\ldots ,x_{i-1},\widetilde{x_i})\) and that \(y_j=(x_1,\ldots , x_{i-1},x_i,\ldots , x_{j-1},\widetilde{x_j})\). Hence, \(y_i\) is not a prefix of \(y_j\). Thus, \(S'\) is an independent set.

Second, we show that \(S'\) is a dominating set of \(G'\). First, we show that \(S'\) dominates \(w_z\) for every vertex of \(H_t\). Assume that z is a prefix of x. Let \(y\in S\). Since \(S\subseteq V(G_x)\)\(S\subseteq S'\), and since \(w_zq\in E(G')\) we see that y dominates \(w_z\). Otherwise, assume that z is no prefix of x. Let \(i \in [t]\) be the smallest number such that \(x_i\ne z_i\). Then, \(z=(x_1,\ldots ,x_{i-1},\widetilde{x_i},z_{i+1},\ldots z_s)\) where s denotes the length of z. Observe that \(y_i=(x_1,\ldots , x_{i-1},\widetilde{x_i})\) is a prefix of z. Hence, \(w_z\) is dominated by \(w_{y_i}\in S'\). We can analogously show that every vertex in \(v\in V(G_y)\) for some \(y \in [2^t]\) is dominated by \(S'\): either \(y=x\), then v is dominated by some vertex in \(S\subseteq S'\) since S is an independent dominating set of \(G_x\), or \(y\ne x\), then there exists a prefix z of y such that \(w_z\in S'\) and \(vw_z\in E(G')\). Thus, we have shown that \(S'\) is a dominating set of \(G'\).

Conversely, suppose that \(G'\) has an independent dominating set \(S'\) of size at most \(k'=k+t\). We prove that \(G_x\) has an independent dominating set of size k for some \(x \in [2^t]\). We start with an observation on independent sets in the instance selector gadget \(H_t\).

Claim 2

Let \(I'\) be an independent set of \(H_t\). Then, there exists an \(x=(x_1,\ldots , x_t)\) such that for any prefix y of x, the vertex \(w_y\) is not contained in \(I'\).

Proof of Claim

We construct the string \(x=(x_1, \ldots , x_t)\) inductively. First, we construct \(x_1\) for the start of the induction. Observe that \(w_{(0)}\) and \(w_{(1)}\) are adjacent in \(G'\) (note that these correspond to the 1-bit strings). Hence, \(I'\) can contain at most one of these two vertices. In other words, \(w_i\notin I'\) for some \(i\in \{0,1\}\). We set \(x_1{:}{=}i\). Now, we consider the inductive step. Here we assume that we already constructed the string \((x_1,\ldots , x_s)\) for some \(s\in [t-1]\) and now we aim to construct \(x_{s+1}\). Observe that for \(y{:}{=}(x_1, \ldots , x_s, 0)\) and \(z{:}{=}(x_1, \ldots , x_s,1)\) the vertices \(w_y\) and \(w_z\) are adjacent in \(G'\). Hence, \(I'\) can contain at most one of these two vertices. In other words, \(w_{(x_1, \ldots , x_s,i)}\notin I'\) for some \(i\in \{0,1\}\). We set \(x_{s+1}{:}{=}i\). Now, the claim follows after constructing \(x_t\).\(\blacksquare \)

Let \(I'{:}{=}S'\cap V(H_t)\). In the following, let \(x=(x_1,\ldots , x_t)\) be a string fulfilling the conditions of Claim 2, that is, for any prefix y of x, the vertex \(w_y\) is not contained in \(I'\) and hence also not in \(S'\). Furthermore, let \(G_x\) be the graph of the Independent Dominating Set instance corresponding to x. Since \(w_y\notin S'\) for any prefix y of x, we obtain that \(S'\cap V(G_x)\ne \emptyset \). Consider the vertex \(w_{y_i}\) where \(y_i {:}{=}(x_1,\ldots , x_{i-1},\widetilde{x_i})\) for some \(i\in [t]\). By construction, the vertices \(\{w_{y_i}\mid i\in [t]\}\) are pairwise unreachable in \(G' - N[S' \cap V(G_x)]\). Hence, \(G' - N[S' \cap V(G_x)]\) has at least t connected components. Since \(S'\) contains at least one vertex of each connected component, it follows that there is an independent dominating set in \(G_x\) of size at most \(k' - t = k\). \(\square \)

5.2 An FPT-Algorithm for Dominating Clique

We now consider the Dominating Clique problem. The task in this problem is to find a small clique that dominates all vertices.

Definition 11

A set \(S\subseteq V(G)\) is a dominating clique in G if all vertices of S are pairwaise adjacent and S is a dominating set.

figure l

It is known that Dominating Clique is W[2]-hard with respect to k even on graphs which do not contain a 4-claw (a \(K_{1,4}\)) as an induced subgraph [14].

Note that there is a straightforward \(\mathcal {O}^*(d^k)\)-time algorithm for Dominating Clique on d-degenerate graphs: Enumerate all cliques of size at most k and check if any of them dominates all vertices. To see the running time bound, observe that we may use a degeneracy ordering \((v_1, \dots , v_n)\) of G and recall that for this ordering \(\deg _{G_i}(v_i) \le d\) where \(G_i{:}{=}G[\{v_i,\ldots , v_n\}]\). By considering all n possibilities for the first vertex of the dominating clique in this ordering, we can enumerate every clique of at most k vertices in \(\mathcal {O}(n\cdot d^k)\) time. Instead, one may also solve Dominating Clique in \(\mathcal {O}^*(2^d)\) time by enumerating all cliques of G. At first glance, an \(\mathcal {O}^*(2^d)\)-time algorithm may sometimes seem prefrable to the \(\mathcal {O}^*(d^k)\)-time algorithm. However, a more precise running time bound of the latter algorithm is \(\mathcal {O}^*(\left( {\begin{array}{c}d\\ k\end{array}}\right) )\) which is never larger than \(\mathcal {O}^*(2^d)\).

In this subsection, we describe an FPT-algorithm for weakly \(\gamma \)-closed graphs, resulting in an \(\mathcal {O}^*((\gamma - 1)^{k})\)-time algorithm. Note that a maximal clique of a weakly \(\gamma \)-closed graph may be arbitrarily large. Thus, a simple brute-force search on maximal cliques may require \(\Omega (n^k)\) time even on graphs with constant weak closure. Moreover, we want to avoid enumerating all maximal cliques since this alone incurs a running time of \(\Omega (3^{\gamma /3})\) [20]. Instead, we will use Algorithm 2 for each vertex \(v_i\) in a fixed weak closure ordering \(\sigma \). The key idea is that we assume that \(v_i\) is the first vertex in the dominating clique with respect to \(\sigma \). As we shall see in the proof of Theorem 16 this guarantees that for each vertex w which is not adjacent to \(v_i\), we may branch into at most \(\gamma -1\) cases to determine a vertex that dominates w.

figure m

Theorem 16

Dominating Clique can be solved in \(\mathcal {O}^*((\gamma -1)^{k})\) time.

Proof

To solve an instance (Gk) of Dominating Clique, we first compute a weak closure ordering \(\sigma \). Afterwards, we invoke SolveDC on input \((G, k-1, \{v_i\})\) for each vertex \(v_i\in V\). In the call SolveDC\((G, k-1, \{v_i\})\), we assume that \(v_i\) is the first vertex in the dominating clique S with respect to the weak closure ordering \(\sigma \).

We first show that SolveDC(GkT) is correct in the following sense: it returns Yes if and only if there is a dominating clique S of size at most k which contains all vertices of T, and vertex \(v_i\) is the first vertex in S with respect to \(\sigma \) (where \(v_i\) is the minimal vertex of T with respect to \(\sigma \)). It is easy to see that the terminal condition in Line 2 is correct. Moreover, Line 3 (where we return Yes when \(V(G) = N[T]\)) is correct if T is a clique, we will argue below that this is always the case. Let \(w \notin N(v_i)\) be the vertex computed in Line 4. Since we want to compute a dominating clique S which contains T, where vertex \(v_i\) is the first vertex in S with respect to the weak closure ordering \(\sigma \) and since \(v_iw\notin E(G)\), any dominating set must contain at least one vertex u of \(N(w)\cap V(G_i)\). Moreover, since we are searching for a dominating clique, we have that u must also be a common neighbor of all vertices in T, that is, \(u\in (\bigcap _{x\in T}N(x))\). Thus, the branching into \((G, k - 1, T \cup \{ u \})\) in Lines 5 and 7 is correct. Since each vertex u chosen in Line 5 is a common neighbor of all vertices in T, we conclude that T is a clique and thus Line 3 returns Yes if and only if G contains a dominating clique of size at most k. Furthermore, each vertex u chosen in Line 5 is contained in \(G_i\). Hence \(v_i<_\sigma u\). In other words, vertex \(v_i\) is the smallest vertex in T with respect to \(\sigma \).

Let us analyze the time complexity of SolveDC. It is easy to see that Lines 2 to 4 can be performed in polynomial time. Consider the search tree where each node corresponds to an invocation of SolveDC. We show that each node in the search tree has at most \(\gamma -1\) children. To this end, we bound the size of \( \vert N(v_i)\cap N(w)\cap V(G_i) \vert \) which is an upper bound on the number of branches created in Line 5. If \(v_i<_\sigma w\), then \( \vert N(v_i)\cap N(w)\cap V(G_i) \vert \le \gamma -1\) by Definition 3. Otherwise, if \(w<_\sigma v_i\), then \(v_i\) and w have at most \(\gamma -1\) common neighbors in \(\{v'\mid w<_\sigma v'\}\) and thus also in \(V(G_i)\). Hence, each node has at most \(\gamma -1\) children. Moreover, the depth of the search tree is at most \(k-1\). Thus, we spend \(\mathcal {O}^*((\gamma - 1)^{k-1})\) time for each vertex \(v_i\in V(G)\) and the claimed running time bound follows. \(\square \)

In companion work [32], we showed by a reduction from \(\lambda \)-Hitting Set that Dominating Set does not admit kernels of size \(\mathcal {O}(k^{c-1-\epsilon })\) under some standard complexity-theoretic assumptions. The idea of this well-known reduction is to construct a split graph in which the universe is the clique and the sets of the set family are the vertices in the independent set. In other words, the split graph is obtained from the incidence graph of the set family by making the universe a clique. We thus directly obtain the following hardness results for Dominating Clique from this reduction.

Proposition 3

For \(c\ge 3\), Dominating Clique has no kernel of size \(\mathcal {O}(k^{c-1-\epsilon })\) unless coNP \(\subseteq \) NP/poly.

Proposition 4

Unless the ETH fails, there is no \(n^{o(k)}\)-time algorithm for Dominating Clique.

In view of Proposition 4, it is unlikely that the running time \(\mathcal {O}^*((\gamma - 1)^k)\) of Theorem 16 can be substantially improved: an algorithm running in time \(\mathcal {O}^*(\gamma ^{o(k)})\) or \(\mathcal {O}^*(c^{o(k)})\) would disprove the ETH. Furthermore, for \(\lambda =2\), when \(\lambda \)-Hitting Set is the Vertex Cover problem, the reduction shows NP-hardness for constant closure since the independent set vertices in the constructed instance have degree 2.

Proposition 5

Dominating Clique remains NP-hard even on 3-closed graphs.

Thus, both parameters \(\gamma \) and k are necessary in Theorem 16: Dominating Clique is W[2]-hard with respect to k even on graphs which do not contain a 4-claw as an induced subgraph [14] and NP-hard even for \(\gamma =3\) since \(\gamma \le c\) (Proposition 5).

6 Conclusion

We have provided further applications of the weak closure parameter \(\gamma \) which was introduced for clique enumeration [20]. Given the algorithmic usefulness of the class of weakly closed graphs, it seems important to further study its properties. For example, it would be nice to obtain a forbidden subgraph characterization. We note that the weakly-1-closed graphs are exactly the graphs that do not contain a \(C_4\) or a \(P_4\) as an induced subgraph. These graphs are also known as quasi-threshold graphs. Can we obtain a similar characterization for weakly 2-closed graphs?

Further FPT-algorithms for the parameter \(\gamma \) would also be very interesting from a theoretical and practical point of view. In particular, obtaining kernelization algorithms for the class of weakly closed graphs is unexplored for many problems. For example, Dominating Set has an FPT-algorithm for the parameter \(\gamma +k\) [38] but it remains open whether Dominating Set admits a polynomial kernel for k if \(\gamma \) is a constant. Only for special graph classes, kernels for \(\gamma +k\) are known: In companion work [31] we provided almost tight kernels of size \(k^{\mathcal {O}(\gamma )}\) for split graphs and of size \(k^{\mathcal {O}(\gamma ^2)}\) for graphs with constant clique size. In contrast, for the larger parameters degeneracy and closure almost tight upper and lower bounds are known: Dominating Set admits a kernel with \(\mathcal {O}(k^{(d+1)^2})\) vertices [42], and a kernel of size \(\mathcal {O}(k^{(d-3)(d-1)-\varepsilon })\) is unlikely [13]. Similarly, Dominating Set admits a kernel with \(k^{\mathcal {O}(c)}\) vertices [32] and a kernel of size \(\mathcal {O}(k^{c-1-\varepsilon })\) is unlikely [32]. Observe in this context that, for Independent Dominating Set, we showed that a kernel of size \(k^{g(\gamma )}\) is unlikely. Such a kernel may, however, still be achievable for Dominating Clique.

Also, some questions about clique relaxations in (weakly) closed graphs remain open: In s-Club we ask for a vertex set S of size at least k in a graph G which is an s-club. Recall that in an s-club S each pair of vertices in S has distance at most s in G[S] (see also Definition 6). We showed that 2-Club is NP-hard even in 4-closed graphs (Theorem 7). It is open, whether 2-Club is also NP-hard 2-closed or 3-closed graphs. Finally, the complexity of s-Club for \(s\ge 3\) on graphs with constant closure remains open.