Abstract
We study the problem of finding a temporal hybridization network containing at most k reticulations, for an input consisting of a set of phylogenetic trees. First, we introduce an FPT algorithm for the problem on an arbitrary set of m binary trees with n leaves each with a running time of \(O(5^k\cdot n\cdot m)\). We also present the concept of temporal distance, which is a measure for how close a treechild network is to being temporal. Then we introduce an algorithm for computing a treechild network with temporal distance at most d and at most k reticulations in \(O((8k)^d5^ k\cdot k\cdot n\cdot m)\) time. Lastly, we introduce an \(O(6^kk!\cdot k\cdot n^2)\) time algorithm for computing a temporal hybridization network for a set of two nonbinary trees. We also provide an implementation of all algorithms and an experimental analysis on their performance.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Phylogenetics is the study of the evolutionary history of biological species. Traditionally such a history is represented by a phylogenetic tree. However, hybridization and horizontal gene transfer, both socalled reticulation events, can lead to multiple seemingly conflicting trees representing the evolution of different parts of the genome [1, 2]. Directed acyclic networks can be used to combine these trees into a more complete representation of the history [3]. Reticulations are represented by vertices with indegree greater than one.
Therefore, an important problem is how to construct such a network based on a set of input trees that are known to represent the evolutionary history for different parts of the genome. The network should display all of these input trees. In general there are many solutions to this problem, but in accordance with the parsimony principle we are especially interested in the most simple solutions to the problem. These are the solutions with a minimal number of reticulations. Finding a network for which the number of reticulations, also called the hybridization number, is minimal now becomes an optimization problem. This problem is NPcomplete, even for only two binary input trees [4]. The problem is fixed parameter tractable for an arbitrary set of nonbinary input trees if either the number of trees or the outdegree in the trees is bounded by a constant [5]. For a set of two binary input trees an FPT algorithm with a reasonable running time exists [6]. For more than two input trees theoretical FPT algorithms and practical heuristic algorithms exist, but no FPT algorithm with a reasonable running time is known. That is why we are interested in slightly modifying the problem to make it easier to solve.
One way to do this is by restricting the solution space to the class of treechild networks, in which each nonleaf vertex has at least one outgoing arc that does not enter a reticulation [7]. The minimum hybridization number over all treechild networks that display the input trees is called the treechild hybridization number. These networks can be characterized by socalled cherry picking sequences [8]. This characterization can be used to create a fixed parameter tractable algorithm for this restricted version of the problem for any number of binary input trees with time complexity \(O((8k)^k\cdot poly(n, m))\) where k is the treechild hybridization number, n is the size of leaves and m is the number of input trees [9].
The solution space can be reduced even further [10], leading to the problem of finding the temporal hybridization number. The extra constraints enforce that each species can be placed at a certain point in time such that evolution events take a positive amount of time and that reticulation events can only happen between species that live at the same time. For the problem of computing the temporal hybridization number a cherry picking characterization exists too and it can be used to develop a fixed parameter tractable algorithm for problems with two binary input trees with time complexity \(O((7k)^k\cdot poly(n, m))\) where k is the temporal hybridization number, n is the number of leaves and m is the number of input trees [10]. In this paper we introduce a faster algorithm for solving this problem in \(O(5^k\cdot n \cdot m)\) time using the cherry picking characterization. Moreover, this algorithm works for any number of binary input trees.
A disadvantage of the temporal restrictions is that in some cases no solution satisfying the restrictions exists. In fact determining whether such a solution exists is an NPhard problem [11, 12]. Because of this our algorithm will not find a solution network for all problem instances. However we show that it is possible to find a network with a minimum number of nontemporal arcs, thereby finding a network that is ‘as temporal as possible’. For that reason we also introduce an algorithm that also works for nontemporal instances. This algorithm is a combination of the algorithm for treechild networks and the one for temporal networks introduced here.
In practical data sets, the trees for parts of the genome are often nonbinary. This can be either due to simultaneous divergence events or, more commonly, due to uncertainty in the order of divergence events [13]. This means that many realworld datasets contain nonbinary trees, so it is very useful to have algorithms that allow for nonbinary input trees. While the general hybridization number problem is known to be FPT when either the number of trees or the outdegree of the trees is bounded by a constant [5], an FPT algorithm with a reasonable running time (\(O(6^kk! \cdot poly(n))\)) is only known for an input of two trees [14]. Until recently no such algorithm was known for the temporal hybridization number problem however. In this paper the first FPT algorithm for constructing optimal temporal networks based on two nonbinary input trees with running time \(O(6^kk!\cdot k\cdot n^2)\) is introduced.
We implemented and tested all new algorithms [15].
The structure of the paper is as follows. First we introduce some common theory and notation in Sect. 2. In Sect. 3 we present a new algorithm for the temporal hybridization number of binary trees, prove its correctness and analyse the running time. In Sect. 4 we combine the algorithm from Sect. 3 with the algorithm from [9] to obtain an algorithm for constructing treechild networks with a minimum number of nontemporal arcs. In Sect. 5 we present the algorithm for the temporal hybridization number for two nonbinary trees. In Sect. 6 we conduct an experimental analysis of the algorithms.
2 Preliminaries
2.1 Trees
A rooted binary phylogenetic Xtree \(\mathcal {T}\) is a rooted binary tree for which the leaf set is equal to X with \(X=n\). Because we will mostly use rooted binary phylogenetic trees in this paper we will just refer to them as trees. Only in Sect. 5 trees that are not necessarily binary are mentioned, but we will explicitly call them nonbinary trees.
Each of the leaves of a tree is an element of X. We will also refer to the set of leaves in \(\mathcal {T}\) as \(\mathcal {L}(\mathcal {T})\). For a tree \(\mathcal {T}\) and a set of leaves A with the notation \(\mathcal {T}{\setminus } A\) we refer to the tree obtained by removing all leaves that are in A from \(\mathcal {T}\) and repeatedly contracting all vertices with both in and outdegree one. Observe that \(\left( \mathcal {T}{\setminus } \{x\}\right) {\setminus } \{y\} = \mathcal {T}{\setminus } \{x,y\} = \left( \mathcal {T}{\setminus } \{y\}\right) {\setminus } \{x\}\). We will often use T to refer to a set of m trees \(\mathcal {T}_1,\ldots , \mathcal {T}_m\). We will write \(T{\setminus } A\) for \(\{\mathcal {T}_1{\setminus } A,\ldots , \mathcal {T}_m{\setminus } A \}\) and \(\mathcal {L}(T)=\cup _{i=1}^m\mathcal {L}(\mathcal {T}_i)\).
2.2 Temporal Networks
A network on X is a rooted acyclic directed graph satisfying:

1.
The root \(\rho \) has indegree 0 and an outdegree not equal to 1.

2.
The leaves are the nodes with outdegree zero. The set of leaves is X.

3.
The remaining vertices are tree vertices or hybridization vertices

(a)
A tree vertex has indegree 1 and outdegree at least 2.

(b)
A hybridization vertex (also called reticulation) has outdegree 1 and indegree at least 2.

(a)
We will call the arcs ending in a hybridization vertex hybridization arcs. All other arcs are tree arcs. A network is a treechild network if every tree vertex has at least one outgoing tree arc.
We say that a network \(\mathcal {N}\) on X displays a set of trees T on \(X'\) with \(X'\subseteq X\) if every tree in T can be obtained by removing edges and vertices and contracting vertices with both indegree 1 and outdegree 1. For a set of leaves A we define \(\mathcal {N}{\setminus } A\) to be the network obtained from \(\mathcal {N}\) by removing all leaves in A and afterwards removing all nodes with outdegree zero and contracting all nodes with both in and outdegree one.
For a treechild network \(\mathcal {N}\), the hybridization number \(r(\mathcal {N})\) is defined as
where \(d^(v)\) is the indegree of a vertex v and \(\rho \) is the root of \(\mathcal {N}\).
A treechild network \(\mathcal {N}\) with set of vertices V is temporal if there exists a map \(t:V\rightarrow \mathbb {R}^+\), called a temporal labelling, such that for all \(u,v\in V\) we have \(t(u)=t(v)\) when (u, v) is a hybridization arc and \(t(u)<t(v)\) when (u, v) is a tree arc. In Fig. 2 both a temporal and a nontemporal network are shown.
For a set of trees T we define the minimum temporalhybridization number as
This definition leads to the following decision problem.
Temporal hybridization
Instance: A set of trees T and an integer k
Question: Is \(h_t(T)\le k\)?
Note that there are sets of trees such that no temporal network exists that displays them. In Fig. 3 an example is given. For such a set T we have \(h_t(T)=\infty \).
2.3 Cherry Picking Sequences
Temporal networks can now be characterized by socalled cherrypicking sequences [10]. A cherry is the set of children of a tree vertex that only has leaves as children. So for binary trees a cherry is a pair of leaves. We will write \((a,b)\in \mathcal {T}\) if \(\{a,b\}\) is a cherry of \(\mathcal {T}\) and \((a,b)\in T\) if there is a \(\mathcal {T}\in T\) with \((a,b)\in \mathcal {T}\). First we introduce some notation to make it easier to speak about cherries.
Definition 2.1
For a set of binary trees T on with the same leaf set define H(T) to be the set of leaves that is in a cherry in every tree.
If two leaves are in a cherry together we call them neighbors. We also introduce notation to speak about the neighbors of a given leaf:
Definition 2.2
Define \(N_\mathcal {T}(x) =\{y\in \mathcal {X}: (y,x)\in \mathcal {T} \}\). For a set of trees T define \(N_T(x)=\cup _{\mathcal {T}\in T}N_\mathcal {T}(x)\).
Definition 2.3
For a set of binary trees T containing a leaf x define \(w_T(x)=N_T(x) 1\). We will also call this the weight of x in T.
Using this theory, we can now give the definition of cherry picking sequences.
Definition 2.4
A sequence of leaves \(s=(s_1,s_2,\ldots , s_n)\) is a cherry picking sequence (CPS) for a set of binary trees T with the same leaf set if it contains all leaves of T exactly once and if for all \(i\in [n1]\) we have \(s_i \in H(T{\setminus } \{s_1, \ldots , s_{i1} \})\). The weight \(w_T(s_1,\ldots s_n)\) of the sequence is defined as \(w_T(s)=\sum _{i=1}^{n1}w_{T{\setminus } \{s_1, \ldots , s_{i1} \}} (s_{i})\).
Example 2.5
For the two trees in Fig. 1, \((\varvec{b},e,\varvec{c},d,a)\) is a minimum weight cherrypicking sequence of weight 2. Leaves b and c (indicated in bold) have weight 1 and the rest of the leaves have weight 0 in the sequence.
For a cherry picking sequence s with \(s_i=x\) we say that x is picked in s at index i.
Theorem 2.6
([10, Theorem 1, Theorem 2]) Let T be a set of trees on \(\mathcal {X}\). There exists a temporal network \(\mathcal {N}\) that displays T with \(h_t(\mathcal {N})=k\) if and only if there exists a cherrypicking sequence s for T with \(w_T(s)=k\).
This has been proven in [10, Theorem 1, Theorem 2]. The proof works by constructing a cherry picking sequence from a temporal network and vice versa. Here, we only repeat the construction to aid the reader, and refer to [10] for the proof of correctness.
The construction of cherry picking sequence s from a temporal network \(\mathcal {N}\) with temporal labeling t works in the following way: For \(i=1\) choose \(s_i\) to be a leaf x of \(\mathcal {N}\) such that \(t(p_x)\) is maximal where \(p_x\) is the parent of x in \(\mathcal {N}\). Then increase i by one and again choose \(s_i\) to be a leaf x of \(\mathcal {N}{\setminus } \{s_1, \ldots , s_{i1} \}\) that maximizes \(t(p_x)\) where \(p_x\) is the parent of x in \(\mathcal {N}{\setminus } \{s_1, \ldots , s_{i1} \}\). In [10, Theorem 1, Theorem 2] it is shown that now s is a cherry picking sequence with \(w_T(s)=r(\mathcal {N})\).
The construction of a temporal network \(\mathcal {N}\) from a cherry picking s is somewhat more technical: for cherry picking sequence \(s_1,\ldots , s_t\), define \(\mathcal {N}_{n}\) to be the tree, only consisting of a root and leaf \(s_n\) Now obtain \(\mathcal {N}_{i}\) from \(\mathcal {N}_{i+1}\) by adding node \(s_i\) and a new node \(p_{s_i}\), adding edge \((p_{s_i},s_i)\) subdividing \((p_x,x)\) for every \(x\in N_{T{\setminus } \{s_1, \ldots , s_{i1} \}}(s_i)\) with node \(q_x\) and adding an edge \((q_x,p_{s_i})\) and finally suppressing all nodes with in and outdegree one. Then \(\mathcal {N}=\mathcal {N}_1\) displays T and \(r(\mathcal {N})=w_T(s)\).
The theorem implies that the weight of a minimum weight CPS is equal to the temporal hybridization number of the trees. Because finding an optimal temporal reticulation network for a set of trees is an NPhard problem [11], this implies that finding a minimum weight CPS is an NPhard problem.
Definition 2.7
We call two sets of trees T and \(T'\) equivalent if there exists a bijection from \(\mathcal {L}(T)\) to \(\mathcal {L}(T')\) such that applying it to the leaves of T maps T to \(T'\). We call them equivalent because they have the same structure and consequently the same (temporal) hybridization number, however the biological interpretation can be different.
3 Algorithm for Constructing Temporal Networks from Binary Trees
Finding a cherry picking sequence comes down to deciding in which order to pick the leaves. Our algorithm relies on the observation that this order does not always matter. Intuitively the observation is that the order of two leaves in a cherry picking sequence only matters if they appear in a cherry together somewhere during the execution of the sequence. Therefore the algorithm keeps track of the pairs of leaves for which the order of picking matters. We will make this more precise in the remainder of this section. The algorithm now works by branching on the choice of which element of a pair to pick first. These choices are stored in a socalled constraint set. Each call to the algorithm branches into subcalls with more constraints added to the constraint set. As soon as it is known that a certain leaf has to be picked before all of its neighbors and is in a cherry in all of the trees, the leaf can be picked.
Definition 3.1
Let \(C\subseteq \mathcal {L}(T) \times \mathcal {L}(T)\). We call C a constraint set on T if every pair \((a,b)\in C\) is a cherry in T. A cherry picking sequence \(s=(s_1,\ldots , s_k)\) of T satisfies C if for all \((a,b)\in C\), we have \(s_i=a\) and \((a,b)\in T'\) and \(w_{T'}(a)>0\) with \(T'=T{\setminus } \{s_1,\ldots , s_{i1} \}\) for some i.
Intuitively, a cherry picking sequence satisfies a constraint set if for every pair (a, b) in the set a is picked with positive weight and (a, b) is a cherry just before picking a. This implies that a occurs in the cherry picking sequence before b.
We now prove a series of results about what sets of constraints are valid, which will then be used to guide our algorithm.
Observation 3.2
Let s be a cherry picking sequence for T and \(w_T(x) > 0\) and \(a,b\in N_T(x)\). Then s satisfies one of the following constraint sets:
\(\{(a,x)\}, \{(b,x)\}, \{(x,a),(x,b)\}\).
Proof
Let i be the lowest index such that \(s_i \in \{x,a,b\}\). If \(s_i=x\), then \((x,a)\in T{\setminus } \{s_1,\ldots , s_{i1} \}\) and \((x,b)\in T{\setminus } \{s_1,\ldots , s_{i1} \}\), so s satisfies \(\{(x,a),(x,b)\}\). If \(s_i=a\), then there is a \(\mathcal {T}\in T{\setminus } \{s_1,\ldots , s_{i1} \}\) with \((x,b)\in \mathcal {T}\), so \((a,x)\notin \mathcal {T}\), which implies that \(w_{T{\setminus } \{s_1,\ldots , s_{i1} \}}(s_i)>0\), so s satisfies \(\{(a,x)\}\). Similarly if \(s_i=b\) then s satisfies \(\{(b,x)\}\). \(\square \)
Example 3.3
The trees in Fig. 1a, b contain the cherries (a, b) and (d, b). So by Observation 3.2 every cherry picking sequence for these trees satisfies one of the constraint sets \(\{(a,b)\}, \{(d,b)\},\) \(\{(b,a),(b,d)\}\). For example, \((\mathbf{b},d,\mathbf{c},e,a)\) is a cherry picking sequence of weight 2 for these trees. This sequence satisfies the constraint set \(\{(b,a),(b,d)\}\). See Figure 5.
This observation implies that the problem can be reduced to three subproblems, corresponding to either appending \(\{(a,x)\}\), \(\{(b,x)\}\) or \(\{(x,a),(x,b)\}\) to C. As we will see, this is used by the algorithm. It is possible to implement an algorithm using only this rule, but the running time of the algorithm can be improved by using a second rule that branches into only two subproblems when it is applicable. The rule relies on the following observation. Here we will write \(\pi _i(C)=\{c_i:(c_1,c_2)\in C \}\).
Observation 3.4
If C is satisfied by s then for all \(x\in \pi _1(C)\) and \(y\in N_T(x)\) we have that either \(C\cup \{(y,x)\}\) or \(C\cup \{ (x,y)\}\) is also satisfied by s.
Proof
If \(x\in \pi _1(C)\) then C contains a pair (x, a). If \(a=y\) it is trivial that s satisfies \(C\cup \{ (x,y)\}=C\). Otherwise Observation 3.2 implies that s satisfies one of the constraint sets \(\{(a,x)\}, \{(y,x)\}, \{(x,a),(x,y)\}\). Because s satisfies \(\{(x,a)\}\), s can not satisfy \(\{(a,x)\}\). So s will satisfy either \(\{(y,x)\}\) or \(\{(x,a),(x,y)\}\). \(\square \)
Using this observation we can let the algorithm branch into two paths by either adding (x, y) or (y, x) to the constraint set C if \(x\in \pi _1(C)\).
Example 3.5
Consider again the situation in Example 3.3. Suppose we guess that the solution satisfies the constraint set \(\{(d,b)\}\). Then we have \(d\in \pi _1(C)\). Hence, we are in the situation of Observation 3.4 and we can conclude that either (d, e) or (e, d) can be added to the constraint set C. See Fig. 6.
We define G(T, C) to be the set of cherries for which there is no constraint in C, so \(G(T,C)=\{(x,y):(x,y) \in T \wedge (x,y), (y,x) \notin C \}\). Observe that \((x,y)\in G(T,C)\) is equivalent with \((y,x) \in G(T,C)\).
Before proving the next result about constraints, we need the following lemma. It states that if we have a set of trees, a leaf that is in a cherry in all of the trees and a corresponding cherry picking sequence then the following holds: for every element in a cherry picking sequence, we can either move it to the front of the sequence without affecting the weight of the sequence or there is a neighbor of this element that occurs earlier in the sequence.
Lemma 3.6
Let \((s_1,s_2,\ldots )\) be a cherry picking sequence for a set of trees T that satisfies constraint set C. Let \(x\in H(T)\). Then at least one of the following statements is true:

(1)
There exists an i such that \(s_i=x \) and \(s'=(s_i,s_1,\ldots ,s_{i1},s_{i+1},\ldots )\) is a cherry picking sequence for T satisfying C and \(w(s)=w(s')\).

(2)
If \(s_i=x\) then there exists a j such that \(s_j \in N_T(x)\) and \(j<i\).
Proof
Let r be the smallest number such that \(s_r\in N_T(x) \cup \{x\}\). In case \(s_r\ne x\) it follows directly that condition (2) holds for \(j=r\). For \(s_r=x\) we will prove that condition (1) holds with \(i=r\). The key idea is that, because \(s_i\) is not in a cherry with any of \(s_1,\ldots , s_{i1}\), removing \(s_i\) first will not have any effect on the cherries involving \(s_1,\ldots , s_{i1}\).
More formally, take an arbitrary tree \(\mathcal {T}\in T\). Now take arbitrary j, k with \(s'_j=s_k\). Now we claim that for an arbitrary z we have \((s'_j,z) \in \mathcal {T}{\setminus }\{s'_1,\ldots , s'_{j1}\}\) if and only if \((s_k,z) \in \mathcal {T}{\setminus }\{s_1,\ldots , s_{k1}\}\).
For \(s'_j=s'_1=s_i=s_k\) this is true because none of the elements \(s_1,\ldots , s_{i1}\) are in \(N_T(s_i)\) so for each z we have \((s'_1,z)\in \mathcal {T}\) if and only if \((s_i,z)\in \mathcal {T}{\setminus }\{s_1,\ldots ,s_{i1}\}\).
For k with \(k<i\) we have \(s'_{j+1}=s_j\). Because \(s_i\notin N_T(s_j)\) we have that \((s_j,z) \in \mathcal {T}{\setminus } \{s'_1,\ldots , s'_j\}=\{s_1,\ldots , s_{j1},s_i\}\) if and only if \((s_j,z) \in \mathcal {T}{\setminus } \{s_1,\ldots , s_{j1}\}\).
For \(k>i\) we have \(j=k\) and also \(\mathcal {T}{\setminus } \{s'_1, \ldots s'_{j1}\}=\mathcal {T}{\setminus } \{s_1, \ldots s_{j1}\}\) because \(\{s_1, \ldots s_{j1}\}=\{s'_1, \ldots s'_{j1}\}\). It directly follows that \((s'_j,z)\in \mathcal {T}{\setminus }\{s'_1, \ldots s'_{j1}\}\)
if and only if \((s_j,z)\in \mathcal {T}{\setminus }\{s_1, \ldots s_{j1}\}\).
Now because we know that for each k we have \(s_k\in H(T{\setminus }\{s_1,\ldots , s_{k1}\})\) and \(s_k=s'_j\) is in exactly the same cherries in \(T{\setminus }\{s_1,\ldots , s_{k1}\}\) as in \(T{\setminus }\{s'_1,\ldots , s'_{j1}\}\), we know that \(s'_j\in H(T{\setminus }\{s'_1,\ldots , s'_{j1}\})\), that \(w_{T{\setminus }\{s'_1,\ldots , s'_{j1}\}}(s'_j)=w_{T{\setminus }\{s_1,\ldots , s_{k1}\}}(s_k)\) and that \(s'\) satisfies C. This implies that \(s'\) is a CPS with \(w_T(s)=w_T(s')\). \(\square \)
As soon as we know that a leaf in H(T) has to be picked before all its neighbors we can pick it, as stated by the following lemma.
Lemma 3.7
Suppose \(x\in H(T)\) and constraint set C is satisfied by cherry picking sequence s of T, with \(\{(x,n):n\in N_T(x) \}\subseteq C\). Then there is a cherry picking sequence \(s'\) with \(s'_1 = x\) and \(w(s')=w(s)\).
Proof
This follows from Lemma 3.6, because statement (2) can not be true because for every j with \(s_j\in N_T(x)\) we have \((x, s_j)\in C\) and therefore \(i < j\) for \(s_i=x\). So statement (1) has to hold which yields a sequence \(s'\) with \(w(s)=w(s')\) and \(s'_1=x\). \(\square \)
The following lemma shows that we can also safely remove all leaves that are in a cherry with the same leaf in every tree.
Lemma 3.8
Let s be a cherry picking sequence for T satisfying constraint set C with \(x\notin \pi _1(C)\) and \(x\notin \pi _2(C)\). If \(x\in H(T)\) and \(w_T(x)=0\), then there is a cherry picking sequence \(s'\) with \(s'_1 = x\) and \(w(s')=w(s)\) satisfying C.
Proof
Because \(w_T(x)=0\) we have \(N_{T}(x)=\{y\}\). Then from Lemma 3.6 it follows that a sequence \(s'\) exists such that either \(s''=(x)s'\) or \(s''=(y)s'\) is a cherry picking sequence for T and \(w_T(s'')=w(s)\) and \(s''\) satisfies C. However, because the position of x and y in the trees are equivalent (i.e. swapping x and y does not change T) both are true. \(\square \)
We are almost ready to describe our algorithm. There is one final piece to introduce first: the measure P(C). This is a measure on a set of constraints C, which will be used to provide a termination condition for our algorithm. We show below that P(C) provides a lower bound on the weight of any cherry picking sequence satisfying C, and so if during any recursive call to the algorithm P(C) is greater than the desired weight, we may stop that call.
Definition 3.9
Let \(\psi = \frac{\log (2)}{\log (5)} \simeq 0.4307\). Let \(P(C) = \psi \cdot C + (12\psi ) \pi _1(C)\).
Lemma 3.10
If cherry picking sequence s for T satisfies C, then \(w_T(s)\ge P(C)\).
Proof
For \(x=s_i\) with \(i<n\) we prove that for \(C_x:=\{(a,b):(a,b)\in C \wedge a=x \}\) we have \(w_{T{\setminus } \{s_1, \ldots , s_{i1} \}}(x)\ge P(C_x)\). If \(C_x=0\), then \(P(C_x)=0\) and the inequality is trivial. If \(C_x=1\), then there is some \((x,b)\in C\), which implies that \(w_{T{\setminus } \{s_1, \ldots , s_{i1} \}}(x)>0\), so \(w_{T{\setminus } \{s_1, \ldots , s_{i1} \}}(x)\ge \pi _1(C_x)=1\ge P(C)\). Otherwise if \(C_x\ge 2\), then \(w_{T{\setminus } \{s_1, \ldots , s_{i1} \}}(x)=N_T(x)1\ge C_x1= \psi \cdot C_x1 + (1\psi )C_x \ge \psi \cdot C_x1 + 2(1\psi )= \psi \cdot C_x+(12\psi )=P(C_x)\). Now the result follows because \(w_T(s)=\sum _{i=1}^{n1}w_{T{\setminus } \{s_1,\ldots , s_{i1}\}}(s_i)\ge \sum _{i=1}^{n1}P(C_{s_i})=P(C)\). \(\square \)
We now present our algorithm, which we split into two parts. The main algorithm is CherryPicking, a recursive algorithm which takes as input parameters a set of trees T, a desired weight k and a set of constraints C, and returns a nonempty set of cherry picking sequences for T of weight at most k satisfying C, if they exist.
The second part is the procedure Pick. In this procedure zeroweight cherries and cherries for which all neighbors are contained in the constraint set are greedily removed from the trees.
3.1 Proof of Correctness
In this section a proof of correctness will be given. First some properties of the auxiliary procedure Pick are proven.
Observation 3.11
Suppose Pick\((T',k', C')\) returns (T, k, C, p).

1.
There are no \(x\in H(T)\) with \(w_T(x)=0\).

2.
There are no \(x\in H(T)\) with \(\{(x_i,n) : n \in N_{T^{(i1)}}(x_i)\}\subseteq C\).
Lemma 3.12
(Correctness of Pick) Suppose Pick\((T',k', C')\) returns (T, k, C, p).

1.
If a cherry picking sequence s of weight at most k for T that satisfies C exists then a cherry picking sequence \(s'\) of weight at most \(k'\) for \(T'\) that satisfies \(C'\) exists.

2.
If s is a cherry picking sequence of weight at most k for T that satisfies C then ps is a cherry picking sequence for \(T'\) of weight at most \(k'\) and satisfying \(C'\).
Proof
We will prove the first claim for \((T,k,C,p)=(T^{(i)}, k_i, C_i, p^{(i)})\) for all i defined in Pick. We will prove this with induction on i. For \(i=1\) this is obvious because \(T^{(1)}=T\), \(p^{(1)}=()\), \(C_1= C\) and \(k_1=k\).
Now assume the claim is true for \(i=i'\). Now there are two cases to consider:

If we have \(\{(x_{i'},n):n\in N_T(x_{i'}) \}\subseteq C_{i'}\) we know from Lemma 3.7 that if a cherry picking sequence s satisfying \(C_i\) exists then also a cherry picking sequence \((x)s'\) that satisfies \(C'\) exists with \(w(p(x)s')=w(ps)\). Note that this implies that \(s'\) is a cherry picking sequence for \(T^{(i+1)}=T'{\setminus } \{x\}\), that \(C_{i+1}={c\in C': x \notin \{c_1, c_2\}}\) is satisfied by \(s_{i+1}\) and that \(w(s_{i+1})=w(s_i)w_{T^{(i)}}(x_i)=k_iw_{T^{(i)}}(x)\). So this proves the statement for \(i=i'+1\).

Otherwise we have \(w_{T^{(i')}}(x)=0\) and \(x\notin \pi _1 (C)\) and \(x\notin \pi _2(C)\). Then the statement for \(i=i'+1\) follows directly from Lemma 3.8.
Let j be the maximal value such that \(x_j\) is defined in a given invocation of Pick. We will prove the second claim for \((T,k,C,p)=(T^{(i)}, k_{i}, C_{i}, p^{(i)})\) for all \(i=0,\ldots , j\) with induction on i. For \(i=0\) this is trivial. Now assume the claim is true for \(i=i'\) and assume s is a cherry picking sequence for \(T^{(i'+1)}\) of weight at most \(k_{i'+1}\) that satisfies \(C_{i'+1}\). Then if \(x_{i'}\) is defined, it will be in \(H(T^{(i')})\), so \(s'=(x_{i'})s\) is a cherry picking sequence for \(T^{(i')}\). Because \(w_{T^{i'}}(x_{i'})=k_{i'}k_{i'+1}\), \(s'\) will have weight at most \(k_{i'}\). We can write \(C_{i'}=C_x\cup C_{x}\) where \(C_x = \{(a,b):(a,b)\in C_{i'} \wedge a=x \}\) and \(C_{x}=C_{i'}{\setminus } C_x\). Note that s satisfies \(C_{i'+1}=C_{x}\), so \(s'=(x_{i'})s\) also satisfies \(C_{i'+1}\). Because for every \((a,b)\in C_x\), also \((a,b)\in T^{i'}\), \(s'\) also satisfies \(C_{x}\), so \(s'\) satisfies \(C_{i'}\). Now it follows from the induction hypothesis that \(p^{i'+1}s=p^{i'}s'\) is a cherry picking sequence for \(T'\) of weight at most \(k'\) and satisfying \(C'\). \(\square \)
Note that on line 19 of Algorithm 1 an element \(b\ne a\) with \((x,b) \in G(T', C')\) is chosen. The following lemma states that such an element does indeed exist.
Lemma 3.13
When the algorithm executes line 19 there exist an element \(b\ne a\) with \((x,b) \in G(T', C')\).
Proof
Because \(w_{T'}(x)>0\), there is at least a \(b\ne a\) such that \(b\in N_{T'}(x){\setminus } \{x\}\). Because \(x \notin \pi _2(C')\) we have \((b, x)\notin C'\). If \((x,b)\in C'\) then \(x\in \pi _1(C')\), but then x satisfies the ifstatement on line 15 and it would not have gotten to this line. Therefore \((x,b)\notin C'\) and so \((x,b)\in G(T',C')\). \(\square \)
The proof of correctness of Algorithm 1 will be given in two parts. First, in Lemma 3.14 we show that for any feasible problem instance the algorithm will return a sequence. Second, in Lemma 3.15 we show that every sequence that the algorithm returns is a valid cherry picking sequence for the problem instance.
Lemma 3.14
When a cherry picking sequence of weight at most k that satisfies C exists, then a call to CherryPicking(T, k, C) from Algorithm 1 returns a nonempty set.
Proof
Let W(k, u) be the claim that if a cherry picking sequence s of weight at most k exists that satisfies constraint set C with \(n^2C\le u\), then calling CherryPicking(T, k, C) will return a nonempty set. We will prove this claim with induction on k and \(n^2C\).
For the base case \(k=0\) if a cherry picking sequence of weight k exists, by Observation 3.11.1 we will have \(\mathcal {L}(T') = 1\). In this case a sequence is returned on line 7.
Note that we can never have a constraint set C with \(C>n^2\) because \(C\subseteq \mathcal {L}(T)^2\). Therefore \(W(k,1)\) is true for all k.
Now suppose \(W(k, n^2C)\) is true for all cases where \(0\le k< k_b\) and all cases where \(k=k_b\) and \(n^2C \le u\). We consider the case where a cherry picking sequence s of weight at most \(k=k_b+1\) exists for T that satisfies C and \(n^2C\le u+1\). Lemma 3.10 implies that \(kP(C)\ge 0\), so the condition of the ifstatement on line 2 will not be satisfied.
From Lemma 3.12 it follows that a CPS \(s'\) of weight at most \(k'\) exists for \(T'\) that satisfies \(C'\). From the way the Pick works it follows that either \(k'<k\) or \(n^2C'= n^2C\). If \(\mathcal {L}(T')=1\) then \(\{()\}\) is returned and we have proven \(W(k_b+1, u+1)\) to be true for this case. Because \(s'\) satisfies \(C'\), we know that \(\pi _1(C) \subseteq \mathcal {L}(T')\). We know there is a \(y\in N_{T'}(s'_1)\) with \((s'_1,y)\notin C'\), because otherwise \(s'_1\) would be picked by Pick. Also \(s'\) satisfies \(C'\cup \{(s'_1,y)\}\), which implies that \(k\ge P(C'\cup \{(s'_1,y)\})>P(C')\), so the condition of the ifstatement on line 10 will not be satisfied.
Note that we have \((s'_1, x) \in G(T',C')\), \(w_{T'}(s'_1)>0\) and \(s'_1\notin \pi _2(C')\).
This implies that either the body of the ifstatement on line 15 or the body of the elseifstatement on line 18 will be executed.
Suppose the former is true. By Observation 3.4 we know that s satisfies \(C'\cup \{(x,y)\}\) or \(C'\cup \{(y,x)\}\). Because \((x,y)\in G(T',C')\) we know \(C'\cup \{x,y\}=C'\cup \{y,x\}=C'+1\) and therefore \(n^2C'\cup \{x,y\}=n^2C'\cup \{y,x\} \le u\). So by our induction hypothesis we know that at least one of the two subcalls will return a sequence, so the main call to the function will also return a sequence.
If instead the body of the elseifstatement on line 18 is executed we know by Observation 3.2 that at least one of the constraint sets \(C'_1=C\cup \{(a,x)\}\), \(C'_2=C\cup \{(b,x)\}\) and \(C'_3=C\cup \{(x,a),(x,b)\}\) is satisfied by s. Note that \(C'_3\ge C'_2=C'_1\ge C' +1\), so \(n^2C'_3\le n^2C'_2=n^2C'_1\le u\). By the induction hypothesis it now follows that at least one of the three subcalls will return a sequence, so the main call to the function will also return a sequence. So for both cases we have proven \(W(k_b+1, u+1)\) to be true. \(\square \)
Lemma 3.15
Every element in the set returned by CherryPicking(T, k, C) from Algorithm 1 is a cherry picking sequence for T of weight at most k that satisfies C.
Proof
Consider a certain call to CherryPicking(T, k, C). Assume that the lemma holds for all subcalls to CherryPicking. We claim that during the execution every element that is in R is a partial cherry picking sequence for \(T'\) of weight at most \(k'\) that satisfies \(C'\). This is true because R starts as an empty set, so the claim is still true at that point. At each point in the function where sequences are added to R, these sequences are elements returned by CherryPicking(\(T',k', C''\)) with \(C'\subseteq C''\). By our assumption we know that all of these elements are cherry picking sequences for \(T'\) of weight at most \(k'\) and satisfy \(C''\). The latter implies that every element also satisfies \(C'\) because \(C'\subseteq C''\). The procedure now returns \(\{pr:r\in R \}\) and from Lemma 3.12 it follows that all elements of this set are cherry picking sequences for T of weight at most k and satisfying C. \(\square \)
3.2 Runtime Analysis
The key idea behind our runtime analysis is that at each recursive call in Algorithm 3, the measure \(kP(C)\) is decreased by a certain amount, and this leads to a bound on the number of times Algorithm 1 is called. It is straightforward to get a bound of \(O(9^k)\). Indeed, it can be shown that for \(k<C/2\) no feasible solution exists, and so the algorithm could stop whenever \(2k  C < 0\). One call to the algorithm results in at most 3 subcalls, and in each subcall C increases by at least one. Then the total number of subcalls to Algorithm 1 would be bounded by \(O(3^{2k}) = O(9^k)\). By more careful analysis, and using the lower bound of P(C) on the weight of a sequence satisfying C, we are able to improve this bound to \(O(5^k)\).
We will now state some lemmas that are needed for the runtime analysis of the algorithm. We first show that the measure \(k  P(C)\) will never increase at any point in the algorithm. The only time this may happen is during Pick, as the values of k and C are not otherwise changed, except at the point of a recursive call where constraints are added to C (which cannot increase P(C)). Thus we first show that Pick cannot cause \(k  P(C)\) to increase.
Lemma 3.16
Let \((s,T',k',C')=\texttt {Pick}(T,k,C)\) from Algorithm 1. Then \(k'P(C')\le kP(C)\).
Proof
We will prove with induction that for the variables \(k_i\) and \(C_i\) defined in the function body, we have \(k_iP(C_i) \le kP(C)\) for all i, from which the result follows. Note that for \(i=0\) this is trivial. Now suppose the inequality holds for i. If \(w_{T^{(i)}}(x_{i+1})=0\), then we have \(C_{i+1}=C_i\), so:
Otherwise we must have, \(\{(x_{i+1},n) : n \in N_{T^{(i)}}(x_{i+1})\} \subseteq C_i\), so:
The next lemma will be used later to show that a recursive call to CherryPicking always increases \(kP(C)\) by a certain amount.
Lemma 3.17
For a and b on line 19 of Algorithm 1 it holds that \(a\notin \pi _1(C')\) and \(b\notin \pi _1(C')\).
Proof
Suppose \(a\in \pi _1(C')\). Then \((a,z)\in C'\) for some \(z\in N_{T'}(x)\). If \(w_{T'}(a)>0\) then a satisfies the conditions in the ifstatement on line 15, so line 19 would not be executed. If \(w_{T'}(a)=0\) then we must have \(N_{T'}(a){\setminus } \{a\} = 1\), so \(N_{T'}(a){\setminus } \{a\} = \{x\}\), which implies that \(z=x\). But \((a,x)\notin C'\) because \((x,a)\in G(T',C')\), which contradicts that \((a,z)\in C'\). So \(a\notin \pi _1(C')\). Because of symmetry, the same argument holds for b. \(\square \)
We now give the main runtime proof.
Lemma 3.18
CherryPicking from Algorithm 1 has a time complexity of \(O(5^k\cdot nm)\).
Proof
The nonrecursive part of CherryPicking(T,k,C) can be implemented to run in \(O(n\cdot m)\) time by constructing \(H(T^{(i)})\) from \(H(T^{(i1)})\) in each step. To prove the lemma, we will bound the number of calls that are made to CherryPicking.
Consider the tree of calls to CherryPicking that are made in a single run of CherryPicking(T,k,C). Each node in this tree corresponds to a call to CherryPicking and the children of this node correspond to its recursive calls. Let t(k, C) be the number of leaves of this tree. Observe that every internal node has at least two children. This implies that the number of nodes in the tree is upper bounded by 2t(k, C).
We will now show using induction that \(t(k, C)\le 5^{kP(C)+1}\), thereby proving the lemma. For \(1\le kP(C)\le 0\) the claim follows from the fact that the function will return on either line 3 or line 11 and therefore will not do any recursive calls.
Now assume the claim holds for \(1\le kP(C)\le w\). Consider an instance with \(kP(C)\le w+\psi \). Note that \(k'P(C')\le kP(C)\) (Lemma 3.16). If the function CherryPicking does any recursive calls then it either executes the body of the ifclause on line 15, or the body of the elseif clause on line 18.
If the former is true, then the function does 2 recursive calls. The number of leaves in the calltree of CherryPicking(T, k, C) will now be the sum of the number of leaves in the calltrees of the recursive calls. Each recursive call to the function CherryPicking(\(T'\), \(k'\), \(C''\)) is done with a constraint set \(C''\) for which \(C''=C'+1\). Therefore for both subproblems \(P(C'')\ge P(C') + \psi \) and also \(k'P(C'')\le k'P(C')  \psi \le kP(C)  \psi \le w\). By our induction hypothesis we have \(t(k', C'')\le 5^{k'P(C'')+1}\le 5^{kP(C)\psi +1}\) Hence:
If instead the body of the elseif statement on line 18 is executed then 3 recursive subcalls are made. Consider the first subcall \(\texttt {CherryPicking}(T',k',C'')\). We have \(C''=C'\cup \{(a,x)\}\). Because \((x,a)\in G(T',C')\) we have \((a,x)\notin C'\). Therefore \(C''=C'+1\). By Lemma 3.17 we know that \(a\notin \pi _1(C')\), but we have \(a\in \pi _1(C')\), so \(\pi _1(C'')=\pi _1(C')+1\). Therefore \(P(C'')=P(C')+1\psi \), so \(k'P(C'')=k'P(C')1+\psi \le k  P(C) 1 + \psi < kP(C)\psi \le w\). By our induction hypothesis we now know that \(t(k',C'')\) is bounded by \( 5^{k'P(C'')+1} \le 5^{kP(C)\psi }\). By symmetry the same holds for the second subcall.
For the third subcall \(\texttt {CherryPicking}(T',k',C'')\), because \((x,a),(x,b) \in G(T',C')\) we have \(C'' = C'+2\), and because \(x \notin \pi _1(C')\) we have \(\pi _1(C'') = \pi _1(C') + 1\). So we know that \(P(C'')=P(C') + 2\psi + (12\psi ) = P(C')+1\) and \(k'P(C'') +1 \le kP(C)\). Therefore \(t(k',C'')\le 5^{kP(C)}\).
Summing the leaves of these subtrees, we see:
This proves the induction claim for \(kP(C)\le w+\psi \). \(\square \)
Theorem 3.19
CherryPicking(T, k, C) from Algorithm 1 returns a cherry picking sequence of weight at most k that satisfies C if and only if such a sequence exists. The algorithm terminates in \(O(5^k\cdot n\cdot m)\) time.
Proof
This follows directly from Lemmas 3.15, 3.14 and 3.18. \(\square \)
4 Constructing Nontemporal TreeChild Networks from Binary Trees
For every set of trees there exists a treechild network that displays the trees. However there are sets of trees for which no temporal network displaying the trees exist, so we can not always find such a network. As shown in Fig. 7, approximately 5 percent of the instances used in [9] do not admit a temporal solution.
In this section we introduce theory that makes it possible to quantify how close a network is to being temporal. We can then pose the problem of finding the ‘most’ temporal network that displays a set of trees.
Definition 4.1
For a treechild network with vertices V we call a function \(t: V\rightarrow \mathbb {R}^+\) a semitemporal labeling if:

1.
For every tree arc (u, v) we have \(t(u)<t(v)\).

2.
For every hybridization vertex v we have \(t(v)=\min \{t(u): (u,v)\in E\}\).
Note that every network has a semitemporal labeling.
Definition 4.2
For a treechild network \(\mathcal {N}\) with a semitemporal labeling t, define \(d(\mathcal {N}, t)\) to be the number of hybridization arcs (u, v) with \(t(u)\ne t(v)\). We call these arcs nontemporal arcs.
Definition 4.3
For a treechild network \(\mathcal {N}\) define
Call this number the temporal distance of \(\mathcal {N}\). Note that this number is finite for every network, because there always exist semitemporal labelings.
The temporal distance is a way to quantify how close a network is to being temporal. The networks with temporal distance zero are the temporal networks. We can now state a more general version of the decision problem.
Semitemporal hybridization
Instance: A set of m trees T with n leaves and integers k, p.
Question: Does there exist a treechild network \(\mathcal {N}\) with \(r(\mathcal {N})\le k\) and \(d(\mathcal {N})\le p\)?
There are other, possibly more biologically meaningful ways to define such a temporal distance. The reason for defining the temporal distance in this particular way is that an algorithm for solving the corresponding decision problem exists. For further research it could be interesting to explore if other definitions of temporal distance are more useful and whether the corresponding decision problems could be solved using similar techniques.
Van Iersel et al. presented an algorithm to solve the following decision problem in \(O((8k)^k\cdot \text {poly}(m,n))\) time.
Treechild hybridization
Instance: A set of m trees T with n leaves and integer k.
Question: Does there exist a treechild network \(\mathcal {N}\) with \(r(\mathcal {N})\le k\)?
Notice that for \(p=k\) Semitemporal hybridization is equivalent to Treechild hybridization and for \(p=0\) it is equivalent to Temporal hybridization. The algorithm for Treechild hybridization uses a characterization by Linz and Semple [8] using treechild sequences, that we will describe in the next section. We describe a new algorithm that can be used to decide Semitemporal hybridization. This algorithm is a combination of the algorithms for Treechild hybridization and Temporal hybridization.
4.1 TreeChild Sequences
First we will define the generalized cherry picking sequence (generalized CPS), which is called a cherry picking sequence in [9]. We call it generalized cherry picking sequence because it is a generalization of the cherry picking sequence we defined in Definition 2.4.
Definition 4.4
A generalized CPS on X is a sequence
with \(\{x_1, x_2, \ldots , x_t,y_1,\ldots , y_r \}\subseteq X\). A generalized CPS is full if \(t>r\) and \(\{x_1,\ldots , x_t\}=X\).
For a tree \(\mathcal {T}\) on \(X'\subseteq X\) the sequence s defines a sequence of trees \((\mathcal {T}^{(0)}, \ldots , \mathcal {T}^{(r)})\) as follows:

\(\mathcal {T}^{(0)}=\mathcal {T}\).

If \((x_j,y_j)\in \mathcal {T}^{(j1)}\), then \(\mathcal {T}^{(j)}=\mathcal {T}^{(j1)} {\setminus } \{x_j\}\). Otherwise \(\mathcal {T}^{(j)}=\mathcal {T}^{(j1)}\).
We will refer to \(\mathcal {T}^{(r)}\) as \(\mathcal {T}(s)\), the tree obtained by applying sequence s to \(\mathcal {T}\).
A full generalized CPS on X is a generalized CPS for a tree \(\mathcal {T}\) if the tree \(\mathcal {T}(s)\) contains just one leaf and that leaf is in \(\{x_{r+1},\ldots ,x_{t} \}\). If such a sequence is a generalized CPS for all trees \(\mathcal {T}\in T\), then we say it is a generalized CPS for T. The weight of the sequence is then defined to be \(w_T(s)=sX\).
A generalized CPS is a treechild sequence if \(s\le r+1\) and \(y_j\ne x_i\) for all \(1\le i<j\le s\). If for such a treechild sequence \(s=r\), then s is also called a treechild sequence prefix.
It has been proven that a treechild network displaying a set of trees T with \(r(\mathcal {N})=k\) exists if and only if a treechild sequence s with \(w(s)=k\) exists [8]. The network can be efficiently computed from the corresponding sequence. The algorithm presented by Van Iersel et al. works by searching for such a sequence.
We will show that it is possible to combine their algorithm with the algorithm presented in Sect. 4. This yields an algorithm that decides Semitemporal hybridization in \(O(5^{k}(8k)^p\cdot k\cdot n\cdot m)\) time.
Definition 4.5
Let \(s=((x_1,y_1),\ldots ,(x_t,))\) be a full generalized CPS. An element \((x_i,y_i)\) is a nontemporal element when there are \(j,k\in [t]\) with \(i<j<k\le t\) and \(x_j\ne x_i\) and \(x_k=x_i\).
Definition 4.6
For a sequence s we define d(s) to be the number of nontemporal elements in s.
Lemma 4.7
Let s be a full treechild sequence s for T. Then there exists a network \(\mathcal {N}\) with semitemporal labeling t such that \(r(\mathcal {N})\le w_T(s)\) and \(d(\mathcal {N},t)\le d(s)\).
The full proof of Lemma 4.7 is given in the appendix. We construct a treechild network \(\mathcal {N}\) from s in a similar way to [8, Proof of Theorem 2.2], working backwards through the sequence. At each stage when a pair (x, y) is processed, we adjust the network to ensure there is an arc from the parent of y to the parent of x. Our contribution is to also maintain a semitemporal labeling t on \(\mathcal {N}\). This can be done in such a way that for each pair (x, y), at most one new nontemporal arc is created, and only if (x, y) is a nontemporal element of s. This ensures that \(d(\mathcal {N},t)\le d(s)\).
Lemma 4.8
For a treechild network \(\mathcal {N}\) there exists a full treechild sequence s with \(d(s)\le d(\mathcal {N})\) and \(w_T(s)\le r(\mathcal {N})\).
The full proof of Lemma 4.8 is given in the appendix. We construct the sequence in a similar way to [8, Lemma 3.4]. The key idea is that at any point the network will contain some pair of leaves x, y that either form a cherry (where x and y share a parent) or a reticulated cherry (where the parent of x is a reticulation, with an incoming edge from the parent of y). We process such a pair by appending (x, y) to s, deleting an edge from \(\mathcal {N}\), and simplifying the resulting network. By being careful about the order in which we process reticulated cherries, we can ensure that we only add a nontemporal element to s when we delete a nontemporal arc from \(\mathcal {N}\). This ensures that \(d(s) \le d(\mathcal {N},t)\).
Observation 4.9
A treechild sequence s can not contain both (a, b) and (b, a).
Observation 4.10
If a treechild sequence s has a subsequence \(s'\) that is a generalized cherry picking sequence for T, then s is also a generalized cherry picking sequence for T.
Lemma 4.11
If \(s=((x_1,y_1),\ldots ,(x_{r+1},))\) is a generalized CPS for \(\mathcal {T}\) and there is a z such that \(y_i\ne z\) for all i. Then \((\mathcal {T}{\setminus } \{z\})(s)=\mathcal {T}(s)\) and therefore s is also a generalized CPS for \(\mathcal {T}{\setminus } \{z\}\).
Proof
Suppose this is not true. Because \(\mathcal {T}(s)\) consists of a tree with only one leaf \(x_{r+1}\), this implies that \(\mathcal {L}((\mathcal {T}{\setminus } \{z\})(s))\not \subseteq \mathcal {L}(\mathcal {T}(s))\). Let i be the smallest index for which we have that \(\mathcal {L}((\mathcal {T}{\setminus } \{z\})((x_1,y_1),\ldots ,(x_i,y_i))) \not \subseteq \mathcal {L}(\mathcal {T}((x_1,y_1),\ldots ,(x_i,y_i)){\setminus } \{z\})\).
This implies that \(x_i \in \mathcal {L}((\mathcal {T}{\setminus } \{z\})((x_1,y_1),\ldots ,(x_i,y_i)))\) but \(x_i\notin \mathcal {L}(\mathcal {T}((x_1,y_1),\ldots ,(x_i,y_i)){\setminus } \{z\})\), so \((x_i,y_i)\notin (\mathcal {T}{\setminus } \{z\})((x_1,y_1),\ldots ,(x_{i1},y_{i1}))\), but \((x_i,y_i)\in \mathcal {T}((x_1,y_1),\ldots ,(x_{i1},y_{i1})){\setminus }\{z\}\). Let p be the lowest vertex that is an ancestor of both \(x_i\) and \(y_i\) in the tree \((\mathcal {T}{\setminus }~\{z\})((x_1,y_1),\ldots ,(x_{i1},y_{i1}))\). Because \(x_i\) and \(y_i\) do not form a cherry in this tree, there is another leaf q that is reachable from p. Because \(q\in \mathcal {L}(\mathcal {T}((x_1,y_1),\ldots ,(x_{i1},y_{i1})){\setminus } \{z\})\), q is also reachable from the lowest common ancestor \(p'\) in \(\mathcal {T}((x_1,y_1),\ldots ,(x_{i1},y_{i1})){\setminus } \{z\}\), contradicting the fact that \((x_i,y_i)\) is a cherry in this tree. \(\square \)
4.2 Constraint Sets
The new algorithm also uses constraint sets. However, because the algorithm searches for a generalized cherry picking sequence, we need to define what it means for such a sequence to satisfy a constraint set.
Definition 4.12
A generalized cherry picking sequence \(s=((x_1,y_1),\ldots , (x_k,y_k))\) for T satisfies constraint set C if for every \((a,b)\in C\) there is an i with \((x_i,y_i)=(a,b)\) and there is a tree \(\mathcal {T}\in T\) for which \((a,b)\notin \mathcal {T}(s_1,\ldots ,s_{i1})\).
In Definition 2.1 the function H(T) was defined for sets of binary trees with the same leaves. After applying a treechild sequence not all trees will necessarily have the same leaves. Because of this, we generalize the definition of H(T) to sets of binary trees.
Definition 4.13
For a set of binary trees T, let
Lemma 4.14
If \(s=((x_1,y_1),\ldots ,(x_{r+1},))\) is a treechild sequence for T and \((a,b)\in T\), then there is an i such that \((x_i,y_i)=(a,b)\) or \((x_i,y_i)=(b,a)\).
Proof
Let \(T\in T\) be a tree in T containing cherry (a, b). Because s fully reduces T, \(\mathcal {T}(s)\) consists of only the leaf \(x_{r+1}\). So a or b has to be removed from \(\mathcal {T}\) by applying s. Without loss of generality we can assume a is removed first. This can only happen if there is an i with \((x_i, y_i)=(a,b)\). \(\square \)
Now we prove that if there are two cherries (a, z) and (b, z) in T, then we can branch on three possible additions to the constraint set, just like we did for cherry picking sequences.
Lemma 4.15
Let s be a treechild sequence for T and \(a,b\in N_T(z)\) with \(a\ne b\). Then s satisfies one of the following constraint sets:
\(\{(a,z)\}, \{(b,z)\}, \{(z,a),(z,b)\}\).
Proof
From Lemma 4.14 it follows that either (a, z) or (z, a) is in s and that either (b, z) or (z, b) is in s. Now let \(s_i=(x_i,y_i)\) be the element of these that appears first in s. Now we have three cases:

1.
If \(x_i=a\), then \(s_i=(a,z)\). Let \(\mathcal {T}\in T\) be the tree in which (b, z) is a cherry. Now \((b,z)\in \mathcal {T}(s_1,\ldots , s_{i1})\), so \((a,z)\in \mathcal {T}(s_1,\ldots , s_{i1})\). Because \((s_{i+1},\ldots , s_{r+1})\) is a treechild sequence for \(\mathcal {T}(s_1,\ldots , s_i)\), this implies that there is some \(j>i\) with \(x_j=a\). Consequently \(\{(a,z)\}\) is satisfied by s.

2.
If \(x_i=b\), then the same argument as in (1) can be applied to show that \(\{(b,z)\}\) is satisfied by s.

3.
If \(x_i=z\), then we either have \(y_i=a\) or \(y_i=b\). Without loss of generality we can assume \(y_i=a\). We still have \((b,z)\in T(s_1,\ldots , s_{i1})\), which implies that there is some \(j>i\) with \((x_j,y_j)=(b,z)\) or \((x_j,y_j)=(z,b)\). Because \(j>i\) and s is treechild, we know that \(y_j\ne z\). So \((x_j,y_j)=(z,b)\), and consequently \(\{(z,a),(z,b)\}\) is satisfied by s.
\(\square \)
We also prove that if \(a\in \pi _1(C)\) and \((a,b)\in T\), then we only need to do two recursive calls.
Lemma 4.16
Let s be a treechild sequence for T that satisfies constraint set C and \(a,b\in N_T(z)\) with \((z,b)\in C\). Then s satisfies one of the following constraint sets:
\(\{(a,z)\}, \{(z,a)\}\).
Proof
From Lemma 4.15 it follows that s satisfies one of the constraint sets \(\{(a,z)\}\), \(\{(b,z)\}\) and \(\{(z,a),(z,b)\}\). However, because s satisfies C and \((z,b)\in C\), from Observation 4.9 it follows that (b, z) does not appear in s. Therefore s has to satisfy either \(\{(a,z)\}\) or \(\{(z,a),(z,b)\}\). If s satisfies \(\{(z,a),(z,b)\}\), then it also satisfies \(\{(z,a)\}\). \(\square \)
Next, we prove an analogue to Lemma 3.10.
Lemma 4.17
If a treechild sequence \(s=((x_1,y_1),\ldots ,(x_r,x_y),(x_{r+1},))\) for T satisfies constraint set C, then \(w_T(s)\ge P(C)\).
Proof
For \(z\in \mathcal {L}(T){\setminus } \{x_{r+1}\}\), let \(C_z:=\{(a,b):(a,b)\in C \wedge a=z \}\) and let \(S_z:=\{(x_i,y_i):i\le r \wedge x_i=z \}\). We show that we have \(S_z1\ge P(C_x)\). If \(C_z=0\), then \(P(C_z)=0\) and the inequality is trivial. If \(C_z=1\), then from the definition of constraint sets it follows that \(S_z\ge 2\), so \(S_z1\ge 1\ge P(C_z)\). Otherwise if \(C_z\ge 2\), then because \(C_z\subseteq S_z\), \(S_z1\ge C_z1= \psi \cdot C_z1 + (1\psi )C_z \ge C_z1 + 2(1\psi )=C_z+(12\psi )=P(C_z)\). Now the result follows because \(w_T(s)=s\mathcal {L}(T)=\sum _{z\in \mathcal {L}(T){\setminus } \{x_{r+1}\}}(S_z1)\ge \sum _{z\in \mathcal {L}(T){\setminus } \{x_{r+1}\}}P(C_z)=P(C)\). \(\square \)
Next we prove that if a leaf z is in H(T) and appears in s with all of its neighbors, then we can move all elements containing z to the start of the sequence.
Lemma 4.18
If \(s=((x_1,y_1),\ldots ,(x_{r+1},))\) is a treechild sequence for T, \(z\in H(T)\) and I is a set of indices such that \(\{y_i: i\in I \}=N_T(z)\) and \(x_i=z\) for all \(i\in I\). Then the sequence \(s'\) obtained by first adding the elements from s with an index in I and then adding elements (x, y) of s for which \(x\ne z\) is a treechild sequence for T. We have \(d(s')\le d(s)\).
Proof
We can write \(s'=((x'_1,y'_1),\ldots ,(x_{r+1},))=s^as^b\) where \(s^a\) consists of the elements \(\{s_i:i\in I\}\) and \(s^b\) is s with the elements at indices in I removed. First we prove that \(s'\) is a treechild sequence. Suppose that \(s'\) is not a treechild sequence. Then there are i, j with \(i<j\) such that \(x'_i = y'_j\). Note that we can not have that \(y'_j=z\), because of how we constructed \(s'\). This implies that both indices i and j are in \(s^b\), implying that \(s^b\) is not treechild. But because \(s^b\) is a subsequence of s this implies that s is not treechild, which contradicts the conditions from the lemma. So \(s'\) is treechild.
We now prove that \(s'\) fully reduces T. Because \(T(s^a)=T{\setminus } \{z\}\) from Lemma 4.11 it follows that \(s^as\) is a generalized CPS for T. Because \(z\notin \mathcal {L}(T(s^a))\), \(T(s^as)=T(s^as^b)\). So \(s'\) is a generalized CPS for T.
Finally since for every nontemporal element in \(s'\) the corresponding element in s is also nontemporal, we conclude that \(d(s')\le d(s)\). \(\square \)
4.3 Trivial Cherries
We will call a pair (a, b) a trivial cherry if there is a \(\mathcal {T}\in T\) with \(a\in \mathcal {L}(\mathcal {T})\) and for every tree \(\mathcal {T}\in T\) that contains a, we have \((a,b)\in \mathcal {T}\). They are called trivial cherries because they can be picked without limiting the possibilities for the rest of the sequence, as stated in the following lemma.
Lemma 4.19
If \(s=((x_1,y_1),\ldots ,(x_{r+1},))\) is a treechild sequence for T of minimum length and (a, b) is a trivial cherry in T, then there is an i such that \((x_i,y_i)=(a,b)\) or \((x_i,y_i)=(b,a)\). Also, there exists a treechild sequence \(s'\) for T with \(s=s'\), \(d(s')\le d(s)\) and \(s'_1=(a,b)\).
Proof
This follows from Lemma 4.18. \(\square \)
The following lemma was proven in [9, Lemma 11].
Lemma 4.20
Let \(s^as^b\) be a treechild sequence for T with weight k. If \(T(s^a)\) contains no trivial cherries, then the number of unique cherries is at most 4k.
Lemma 4.21
If \(((x_1,y_1),\ldots , (x_2,y_2),(x_{r+1},), ,(x_{t},))\) is a full tree childsequence of minimal length for T satisfying C and \(H(T){\setminus } \pi _2(C)=\emptyset \), then \((x_1,y_1)\) is a nontemporal element.
Proof
First observe that \(x_1\notin \pi _2(C)\) because the sequence satisfies C. Suppose \((x_1,y_1)\) is a temporal element. This implies that there is an i such that for all \(j<i\) we have \(x_j=x_1\) and \(x_k\ne x_1\) for all \(k\ge i\). This implies that for every \(\mathcal {T}\in T\) there is a \(j<i\) such that \(x_1\) is not in \(\mathcal {T}((x_j,y_j))\). Consequently \((x_j,y_j)\) is a cherry in \(\mathcal {T}\). Because this holds for every tree \(\mathcal {T}\in T\) we must have \(x_1\in H(T){\setminus } \pi _2(C)\), contradicting the assumption that \(H(T){\setminus } \pi _2(C)=\emptyset \). \(\square \)
4.4 The Algorithm
We now present our algorithm for Semitemporal hybridization. As with Treechild hybridization, we split the algorithm into two parts: SemiTemporalCherryPicking(Algorithm 3) is the main recursive procedure, and Pick(Algorithm 4) is the auxiliary procedure.
The key idea is that we try to follow the procedure for temporal sequences as much as possible. Algorithm 3 only differs from Algorithm 1 in the case where neither of the recursion conditions of Algorithm 1 apply, but there are still cherries to be processed. In this case, we can show that there are no trivial cherries, and hence Lemma 4.20 applies. Then we may assume there are at most \(4k^*\) unique cherries, where \(k^*\) is the original value of k that we started with. In this case, we branch on adding (x, y) or (y, x) to the sequence, for any x and y that form a cherry. Any such pair will necessarily be a nontemporal element, and so we decrease p by 1 in this case.
Lemma 4.22
(Correctness of Pick) Suppose Pick\((T',k', C')\) in Algorithm 4 returns (T, k, C, p). Then a treechild sequence s of weight at most k for T, that satisfies C, exists if and only if a treechild sequence \(s'\) of weight at most \(k'\) for \(T'\), that satisfies \(C'\), exists. In this case ps is a treechild sequence for \(T'\) of weight at most \(k'\) and satisfying \(C'\).
The proof for this lemma is the same as for Lemma 3.12, but uses Lemma 4.18
Lemma 4.23
Let \(s^\star \) be a treechild sequence prefix, \(T^\star \) a set of trees with the same leaves and define \(T:=T^\star (s^\star )\). Suppose \(k,p\in \mathbf {N}\) and \(C\in \mathcal {L}(T)^2\). When a generalized cherry picking sequence s exists and such that \(s^ \star s\) is a treechild sequence for \(T^\star \), that satisfies C with \(w_{T^\star }(s^\star s)\le k^\star \), and such that \(d(s)\le p\), SemiTemporalCherryPicking\((T, k, k^\star , p, C)\) from Algorithm 3 returns a nonempty set.
A full proof of this lemma is given in the appendix.
Lemma 4.24
Let \(s^\star \) be a treechild sequence prefix, \(T^\star \) a set of trees with the same leaves and let \(T:=T^\star (s^\star )\). Let \(k,p\in \mathbf {N}\) and \(C\in \mathcal {L}(T)^2\). If a call to SemiTemporalCherryPicking\((T, k, k^\star , p, C)\) returns a set S, then for every \(s\in S\), the sequence \(s'=s^\star  s\) is a treechild sequence for \(T^\star \) with \(d(s)\le p\) and \(w(s)\le k\).
The proof of this lemma is similar to the proof of Lemma 3.14 using Lemma 4.22.
Lemma 4.25
Algorithm 3 has a running time of \(O(5^k\cdot (8k)^p\cdot k \cdot n\cdot m)\).
Proof
This can be proven by combining the proofs from Lemmas 3.18 and 4.20. \(\square \)
Theorem 4.26
SemiTemporalCherryPicking\((T, k, k, p, \emptyset )\) from Algorithm 3 returns a nonempty set of treechild cherry picking sequences for T, of weight at most k, with at most p nontemporal elements, if and only if such a sequence exists. The algorithm terminates in \(O(5^k\cdot (8k)^p\cdot k \cdot n\cdot m)\) time.
Proof
This follows directly from Lemmas 4.24, 4.23 and 4.25. \(\square \)
5 Constructing Temporal Networks from Two Nonbinary Trees
The algorithms described in the previous sections only work when all input trees are binary. In this section we introduce the first algorithm for constructing a minimum temporal hybridization number for a set of two nonbinary input trees. The algorithm is based on [14] and has time complexity \(O(6^kk!\cdot k \cdot n^2)\).
We say that a binary tree \(\mathcal {T}'\) is a refinement of a nonbinary tree \(\mathcal {T}\) when \(\mathcal {T}\) can be obtained from \(\mathcal {T}'\) by contracting some of the edges. Now we say that a network \(\mathcal {N}\) displays a nonbinary tree \(\mathcal {T}\) if there exists a binary refinement \(\mathcal {T}'\) of \(\mathcal {T}\) such that \(\mathcal {N}\) displays \(T'\). Now the hybridization number \(h_t(T)\) can be defined for a set of nonbinary trees T like in the binary case.
Definition 5.1
For a set of nonbinary trees we let the set of neighbors \(N_T(x)\) be defined as \(N_T(x):=\{y\in \mathcal {L}(T){\setminus } \{x\}: \exists \mathcal {T} \in T: \{x,y\} \text { is a subset of some cherry in }\mathcal {T} \}\).
Definition 5.2
A set \(S\subseteq N_T(x)\) is a neighbor cover for x in T if \(S\cap N_\mathcal {T}(x) \ne \emptyset \) for all \(\mathcal {T}\in T\).
Definition 5.3
For a set of nonbinary trees T, define \(w_T(x)\) as the minimum size of a neighbor cover of x in T minus 1.
Note that computing the minimum size of a neighbor cover comes down to finding a minimum hitting set, which is an NPhard problem in general. However if T is constant, the problem can be solved in polynomial time. Note that for binary trees this definition is equivalent to the definition given in Definition 2.3.
Next Definition 2.1 is generalized to nonbinary trees.
Definition 5.4
For a set of nonbinary trees T with the same leaf set define \(H(T) =\{x\in \mathcal {L}(T): \forall \mathcal {T}\in T : N_\mathcal {T}(x)\ne \emptyset \}\).
The nonbinary analogue of Definition 2.4 is given by the following lemma.
Definition 5.5
For a set of nonbinary trees T with \(n=\mathcal {L}(T)\), let \(s=(s_1,\ldots , s_{n1})\) be a sequence of leaves. Let \(T_0=T\) and \(T_i=T_{i1}{\setminus } \{s_1, \ldots , s_i\}\). The sequence s is a cherry picking sequence if for all i, \(s_i\in H(T{\setminus }\{s_1, \ldots , s_{i1}\})\). Define the weight of the sequence as \(w_T(s)=\sum _{i=1}^{n1} w_{T_{i1}}(s_i)\).
Lemma 5.6
A temporal network \(\mathcal {N}\) that displays a set of nonbinary trees T with reticulation number \(r(\mathcal {N})=k\) exists if and only if a cherry picking sequence of weight at most k exists.
Proof
Note that this is a generalization of Lemma 2.6 to the case of nonbinary input trees and the proof is essentially the same. A cherry picking sequence with weight k can be constructed from a temporal network with reticulation number k in the same way as in the proof of Lemma 2.6.
The construction of a temporal network \(\mathcal {N}\) from a cherry picking s is also very similar to the binary case: for cherry picking sequence \(s_1,\ldots , s_t\), define \(\mathcal {N}_{t+1}\) to be the network, only consisting of a root, the only leaf of \(T{\setminus } \{s_1, \ldots , s_t \}\) and an edge between the two. For each i let \(S_i\) be a minimal neighbor cover of \(s_i\) in \(T{\setminus } \{s_{1}, \ldots , s_{i1} \}\). Now obtain \(\mathcal {N}_{i}\) from \(\mathcal {N}_{i+1}\) by adding node \(s_i\), subdividing \((p_x,x)\) for every \(x\in S_i\) with node \(q_x\) and adding an edge \((q_x,s_i)\) and finally suppressing all nodes with in and outdegree one. It can be shown that \(r(\mathcal {N})=w_T(s)\). \(\square \)
Lemma 5.7
If s is a cherry picking sequence for T and for \(x\in H(T)\) we have \(w_T(x)=0\) then there is a cherry picking sequence \(s'\) for T with \(w_T(s')=w_T(s)\) and \(s'_1=x\).
Proof
We have \(N_T(x)=\{y\}\). Now let z be the element of \(\{x,y\}\) that appears in s first with \(s_i=z\). Now \(s'=(s_i,s_1,\ldots , s_{i1},s_{i+1},\ldots )\) is a cherry picking sequence for T with \(w_T(s')=w_T(s)\). If \(z=x\), then this proves the lemma. Otherwise we note that by swapping x and y in T, the trees stay the same. So we can also swap x and y in \(s'\) without affecting the weight. Now \(s'=x\), which proves the lemma. \(\square \)
The algorithm relies on some theory from [14], that we will introduce first.
For a vertex v of \(\mathcal {T}\) we say that all vertices reachable by v form a pendant subtree. For a pendant subtree S we define \(\mathcal {L}(S)\) to be the set of the leaves of S. Now we define
We call this the set of clusters of \(\mathcal {T}\). Then we define \(Cl(T)=\bigcup _{\mathcal {T}\in T}Cl(\mathcal {T})\). Call a cluster C with \(C=1\) trivial. Now we call a nontrivial cluster \(C\in Cl(T)\) a minimal cluster if there is no \(C'\in Cl(T)\) with \(C'\) nontrivial and \(C'\subsetneq C\).
In a cherry picking sequence s we say that at index i the cherry \((s_i,y)\) is reduced if there is a \(\mathcal {T}\in T\) such that \(N_{\mathcal {T}{\setminus } \{s_1,\ldots , s_{i1}\}}(s_i)=\{y\}\).
Lemma 5.8
Let T be a set of trees with \(T=2\) such that T contains no leaf x with \(w_T(x)=0\). Let s be a cherry picking sequence for T. Then there is a minimal cluster C in T and a cherry picking sequence \(s'=(s'_1,\ldots )\) for T with \(s'_i\in C\) for \(i =1,\ldots , C 1\) and \(w_T(s')\le w_T(s)\).
Proof
Let p be the first index at which a cherry is reduced in s. Let (a, b) be one of the cherries that is reduced at index p. Now there will be a cherry in T that contains both a and b. Let C be one of the minimum clusters that is contained in this cherry. Let x be the element of C that occurs last in s. Then let \(c_1,\ldots , c_t\) be the elements from \(C{\setminus } \{x\}\) ordered by their index in s. We claim that for any permutation \(\sigma \) of [t] we have \(s'=(c_{\sigma (1)},\ldots ,c_{\sigma (t)})(s{\setminus } (C{\setminus } \{x\}))\) is a cherry picking sequence for T and \(w_T(s')\le w_T(s)\).
Let i be the index of the last element of \(C{\setminus } \{x\}\) in s. Suppose that \(s'\) is not a CPS for T. Let j be the smallest index for which \(s'_j\notin H(T{\setminus } \{s'_1, \ldots , s'_{j1} \})\).
Let \(\mathcal {T}\in T\) be such that \(s'_j\) is not in a cherry in \(\mathcal {T}{\setminus } \{s'_1, \ldots , s'_{j1}\}\). Choose k such that \(s_k=s'_j\). Now there are three cases:

Suppose \(j> i\), then \(k=j\) and \(\{s_1,\ldots , s_{k1} \}=\{s'_1,\ldots , s'_{j1} \}\). This implies that \(s'_j\in H(T{\setminus } \{s'_1,\ldots , s'_{j1}\})\), which contradicts our assumption.

Otherwise, suppose \(s'_j\in \{c_1,\ldots , c_t\}\). Then \(j\le t\). Now \(s_k\) has to be in a cherry in \(\mathcal {T}{\setminus } \{s_1,\ldots , s_{k1}\}\). Because no cherries are reduced before index i in s this means that \(s'_j\) is in a cherry in \(\mathcal {T}\). Because no cherries are reduced in \(s'\) before index t, this implies that the same cherry is still in \(\mathcal {T}{\setminus } \{s'_1,\ldots , s'_{j1} \}\), which contradicts our assumption.

Otherwise we must have \(j\le i\). Because no cherries are reduced before index i in s this means that \(s'_j\) is in a cherry Q in \(\mathcal {T}\). If this cherry contains a leaf y with \(s'_w=y\) for \(w>j\), then \(s'_j\) is still in a cherry in \(\mathcal {T}{\setminus } \{s'_1,\ldots , s'_{j1} \}\), contradicting our assumption, so this can not be true. However, that implies that the neighbors of \(s_k\) in \(\mathcal {T}{\setminus } \{s_1, \ldots , s_{k1} \}\) are all elements of \(\{c_1, \ldots , c_t \}\). Let v be the second largest number such that \(c_v\) is one of these neighbors. Let q be the index of \(c_v\) in s. Now cherry Q will be reduced by s at index \(\max (q, j)< i\), which contradicts the fact that C is contained in a cherry of T that is reduced first by s.
To prove that \(w_T(s')\le w_T(s)\), we will prove that for \(s_j=s'_k\) we have
Note that for \(j\ge i\) this is trivial, so assume \(j<i\). If \(s_j\in C{\setminus } \{x\}\), then \(w_{T{\setminus } \{s_1, \ldots , s_{j1} \}}(s_j)\ge w_{T}(s_j)\), because no cherries are reduced before i, which implies that no new elements are added to cherries before i. For the same reason we must have \(s_j\in H(T)\). Because there are no \(x\in H(T)\) with \(w_T(x)=0\). Because \(T=2\), we have \(w_T(x)\le 1\) for all x, hence \(w_{T}(s_j)=1\). So \(w_{T{\setminus } \{s'_1, \ldots , s'_{k1} \}}(s'_k)\le w_{T{\setminus } \{s_1, \ldots , s_{j1} \}}(s_j)=1\). \(\square \)
5.1 Bounding the Number of Minimal Clusters
By Lemma 5.8, in the construction of a cherry picking sequence, we can restrict ourselves to only appending elements from minimal clusters. We use the following theory from [14] to bound the number of minimal clusters.
Definition 5.9
Define the relation \(x\xrightarrow []{T} y\) for leaves x and y of T if every nontrivial cluster \(C\in Cl(T)\) also contains y.
Observation 5.10
([14, Observation 2]) If T contains no zeroweight leaves, the relation \(\xrightarrow []{T}\) defines a partial ordering on \(\mathcal {L}(T)\).
Now call \(x\in \mathcal {L}(T)\) a terminal if there is no \(y\ne x\) with \(x\xrightarrow []{T} y\). Now we will first show that all minimal clusters contain a terminal. Then a bound on the number of terminals gives a bound on the number of minimal clusters.
Lemma 5.11
If T contains no zeroweight leaves, every minimal cluster contains a terminal.
Proof
Let C be a minimal cluster of T. Let x be an element of C that is maximal in C with respect to the partial ordering ‘\(\xrightarrow []{T}\)’ (if we say that \(x\xrightarrow []{T}y\) means that y is ‘greater than or equal to’ x). Now suppose that x is not a terminal. Then there is an y such that \(x\xrightarrow []{T}y\). However then \(y\in C\), but this contradicts the fact that x is a maximal element in C with respect to ‘\(\xrightarrow []{T}\)’. Because this is a contradiction, x has to be a terminal. \(\square \)
Lemma 5.12
Let T be a set of trees with \(h_t(T)\ge 1\) containing no zeroweight leaves. Let \(\mathcal {N}\) be a network that displays T. Then T contains at most \(2r(\mathcal {N})\) terminals that are not directly below a reticulation node.
Proof
We reformulate the proof from [14, Lemma 3]. We use the fact that for each terminal one of the following conditions holds: the parent \(p_x\) of x in N is a reticulation (condition 1) or a reticulation is reachable in a directed treepath from the parent \(p_x\) of x (condition 2). This is always true because if neither of the conditions holds then another leaf y is reachable from \(p_x\), implying that \(x\xrightarrow []{T}y\), which contradicts that x is a terminal.
Let R be the set of reticulation nodes in \(\mathcal {N}\) and let W be the set of terminals in T that are not directly beneath a reticulation. We describe a mapping \(F:W\rightarrow R\) such that each reticulation r is mapped to at most \(d^(r)\) times. Note that for each \(x\in W\) condition 2 holds. For these elements let \(F(x)=y\) where y is a reticulation reachable from p(x) by a treepath. Note that there can not be a path from p(x) to y containing only tree arcs when \(x\ne y\) are both in H(T) because then \(x\rightarrow y\) which contradicts that x is a terminal. It follows that each reticulation r can be mapped to at most \(d^(r)\) times: at most once per incoming edge. Then for the set of terminals \(\Omega \) we have \(\Omega  \le \sum _{r\in R} d^(r) \le \sum _{r\in R} (1+(d^(r)1)) \le R + k \le 2k\). \(\square \)
Lemma 5.13
Let T be a set of nonbinary trees such that \(h_t(T)\ge 1\). Suppose that T contains no zeroweight leaves. Then any set S of terminals in T with \(S\ge 2h_t(T)+1\) contains at least one element \(x\in H(T)\) such that there is a cherry picking sequence s for T with \(w_T(s)=h_t(T)\) and \(s_1=x\).
Proof
Let \(\mathcal {N}\) be a temporal network that displays T such that \(r(\mathcal {N})=h_t(T)\) with corresponding cherry picking sequence s. From the Lemma 5.12 it follows that at most \(r(\mathcal {N})\) terminals exist in T that are not directly below a reticulation. So there is an \(x\in S\) that is directly below a reticulation.
Now let \(T'\) be the set of all binary trees displayed by \(\mathcal {N}\). Note that s is a cherry picking sequence for \(T'\). Let i be such that \(s_i=x\). Because x is directly below a reticulation in \(\mathcal {N}\), for all \(j<i\) we have \(s_j\notin N_{T'}(x)\), which implies by Lemma 3.6 that \(s'=(s_i,s_1,\ldots , s_{i1},s_{ i+1},\ldots )\) is a cherry picking sequence for \(T'\) with \(w_{T'}(s')=w_{T'}(s)=r(\mathcal {N})=h_t(T)\). Now \(w_{T}(s')\le w_{T'}(s')=h_t(T)\), so \(w_{T}(s')=h_t(T)\). \(\square \)
5.2 RunTime Analysis
Lemma 5.14
The running time of \(\texttt {CherryPicking}(T,k)\) from Algorithm 5 is \(O(6^kk! \cdot k\cdot n^2)\) if T is a set consisting of two nonbinary trees.
Proof
Let f(n) be an upper bound for the running time of the nonrecursive part of the function. We claim that the maximum running time t(n, k) for running the algorithm on trees with n leaves and parameter k is bounded by \(6^{k}k! kf(n)\).
For \(k=0\) it is clear that this claim holds. Now we will prove that it holds for any call, by assuming that the bound holds for all subcalls.
If \(S>2k\), then the algorithm branches into \(2k+1\) subcalls. The total running time can then be bounded by
If the condition of the ifstatement on line 23 is true, then for that q the function does 3 subcalls with k reduced by one. So the recursive part of the total running time for this q is bounded by
If the condition on line 23 holds then there is at most one \(d\in D\) with \(d\le 2\). Using this information we can bound the total running time of the subcalls that are done for q in the else clause by
Note that (2) follows from the fact that \(x\mapsto x 6^{kx+1}\) is a decreasing function for \(x\in [1,\infty )\). So for each q the running time of the subcalls is bounded by \((k1)! (k1)f(n)2^{k1}3^{k}\). Now the total running time is bounded by
Because the nonrecursive part of the function can be implemented to run in \(O(n^2)\) time the total running time of the function is \(O(6^{k}k! \cdot k\cdot n^2)\). \(\square \)
Lemma 5.15
Let T be a set of nonbinary trees. If \(h_t(T)\le k\), then CherryPicking(T, k) from Algorithm 5 returns a cherry picking sequence for T of weight at most k.
Proof
First we will prove with induction on k that if \(h_t(T)\le k\) then a sequence is returned.
For \(k=0\) it is true because if \(h_t(T)=0\), as long as \(\mathcal {L}(T)>1\) then \(H(T)>0\) and all elements of H(T) will have zero weight, so they are removed on line 4. After that \(\mathcal {L}(T)=1\) so an empty sequence will be returned, which proves that the claim is true for \(k=0\).
Now assume that the claim holds for for \(k<k'\) and assume that \(h_t(T)\le k'\). Now we will prove that a sequence is returned by CherryPicking(T, k) in this case. After removing an element x with weight zero on line 4 we still have \(h_t(T)\le k'\) (Lemma 5.7). If \(\mathcal {L}(T)=1\), an empty sequence is returned. If this is not the case then \(0<h_t(T)\le k\), so the else if is not executed.
If \(S>2k\) then from Lemma 5.13 it follows that for \(S'\subseteq S\) with \(S'=2k+1\) there is at least one \(x\in S'\) such that \(h_t(T{\setminus } \{x\})\le k'1\). Now from the induction hypothesis it follows that CherryPicking\((T{\setminus } \{x\},k')\) returns at least one sequence, which implies that R is not empty. Because of that the main call will return at least one sequence, which proves that the claim holds for \(k=k'\).
The only thing left to prove is that every returned sequence is a cherry picking sequence for T. This follows from the fact that only elements from H(T) are appended to s and that R consists of cherry picking sequences for \(T{\setminus } \{s_1,\ldots ,s_t \}\). \(\square \)
6 Experimental Results
We developed implementations of Algorithms 1, 5 and 3, which are freely available [15]. To analyse the performance of the algorithms we made use of dataset generated in [9] for experiments with an algorithm for construction of treechild networks with a minimal hybridization number.
6.1 Algorithm 1
In Fig. 8 the running time of Algorithm 1 on the dataset from [9] is shown. The results are consistent with the bound on the running time that was proven in Sect. 3. Also, the algorithm is able to compute solutions for relatively high values of k, indicating that the algorithm performs well in practice.
The authors of [9] also provide an implementation of their algorithm for treechild algorithms. The implementation contains several optimizations to improve the running time. One of them is an operation called cluster reduction [16]. The implementation is also multithreaded. In Fig. 9 we provide a comparison of the running times of the treechild algorithm with Algorithm 1. In this comparison we let both implementations use a single thread, because our implementation of the algorithm for computing the hybridization number does not support multithreading. The implementation could however be modified to solve different subproblems in different threads which will probably also result in a significant speedup. For Algorithm 1 we see that the difference in time complexity between the \(O((8k)^k)\) algorithm and the \(O(5^k)\) algorithm is also observable in practice.
6.2 Algorithm 5
We used the software from [9] to generate random binary problem instances and afterwards randomly contracted edges in the trees to obtain nonbinary problem instances. We used this dataset to test the running time of Algorithm 5. The results are shown in Fig. 10. We see that the algorithm is usable in practice and has a reasonable running time.
6.3 Algorithm 3
Algorithm 3 was tested on all nontemporal instances in the dataset from [9]. In Fig. 11 the running time of Algorithm 3 is compared to that of the algorithm from [9]. The data show that the algorithm from [9] is often faster than Algorithm 3. However, there are also instances for which Algorithm 3 is much faster. Hence, in practice it can be worthwile to run this algorithm on instances that cannot be solved by the algorithm from [9] in a reasonable time. It should also be noted that we only tested the algorithms on a relatively small dataset.
7 Discussion
Algorithm 1, the algorithm for constructing minimum temporal hybridization networks, has a significantly better running time than the algorithms that were known before. The results from the implementation show that the algorithm also works well in practice. However this implementation could still be improved, for example by making use of parallelization.
While we also present an algorithm that finds optimal temporal networks for nonbinary trees, the running time of this algorithm is significantly worse and, moreover, it only works for pairs of trees. An open question is whether this could be improved to a running time of \(O(c^k\cdot poly(n))\) for some \(c\in \mathbb {R}\), perhaps using techniques similar to our approach for binary trees. Another important open problem is whether Temporal Hybridization is FPT for a set of more than two nonbinary input trees.
In Sect. 4 a metric is provided to quantify how close a hybridization network is to being temporal. However, other, possibly more biologically meaningful, metrics could also be used for this purpose. An open problem is whether an FPT algorithm exists that solves the decision problem associated with these metrics.
References
Mallet, J., Besansky, N., Hahn, M.W.: How reticulated are species? BioEssays 38(2), 140–149 (2016). https://doi.org/10.1002/bies.201500149
Soucy, S.M., Huang, J., Gogarten, J.P.: Horizontal gene transfer: building the web of life. Nat Rev Genet 16(8), 472–482 (2015). https://doi.org/10.1038/nrg3962
Bapteste, E., van Iersel, L., Janke, A., Kelchner, S., Kelk, S., McInerney, J.O., Morrison, D.A., Nakhleh, L., Steel, M., Stougie, L., Whitfield, J.: Networks: expanding evolutionary thinking. Trends Genet. 29(8), 439–441 (2013). https://doi.org/10.1016/j.tig.2013.05.007
Bordewich, M., Semple, C.: Computing the minimum number of hybridization events for a consistent evolutionary history. Discrete Appl. Math. 155(8), 914–928 (2007). https://doi.org/10.1016/j.dam.2006.08.008
van Iersel, L., Kelk, S., Scornavacca, C.: Kernelizations for the hybridization number problem on multiple nonbinary trees. J. Comput. Syst. Sci. 82(6), 1075–1089 (2016). https://doi.org/10.1016/j.jcss.2016.03.006
Bordewich, M., Semple, C.: Computing the hybridization number of two phylogenetic trees is fixedparameter tractable. IEEE/ACM Trans. Comput. Biol. Bioinformatics 4(3), 458–466 (2007). https://doi.org/10.1109/tcbb.2007.1019
Cardona, G., Rossello, F., Valiente, G.: Comparison of treechild phylogenetic networks. arXiv:0708.3499 [cs, qbio] (2007). http://arxiv.org/abs/0708.3499. ArXiv: 0708.3499
Linz, S., Semple, C.: Attaching leaves and picking cherries to characterise the hybridisation number for a set of phylogenies. Adv. Appl. Math. 105, 102–129 (2019). https://doi.org/10.1016/j.aam.2019.01.004
van Iersel, L., Janssen, R., Jones, M., Murakami, Y., Zeh, N.: A practical fixedparameter algorithm for constructing treechild networks from multiple binary trees. arXiv:1907.08474 [cs, math, qbio] (2019). http://arxiv.org/abs/1907.08474. ArXiv: 1907.08474
Humphries, P.J., Linz, S., Semple, C.: Cherry picking: a characterization of the temporal hybridization number for a set of phylogenies. Bull. Math. Biol. 75(10), 1879–1890 (2013). https://doi.org/10.1007/s115380139874x
Humphries, P.J., Linz, S., Semple, C.: On the complexity of computing the temporal hybridization number for two phylogenies. Discrete Appl. Math. 161(7–8), 871–880 (2013). https://doi.org/10.1016/j.dam.2012.11.022
Döcker, J., van Iersel, L., Kelk, S., Linz, S.: Deciding the existence of a cherrypicking sequence is hard on two trees. Discrete Appl. Math. 260, 131–143 (2019). https://doi.org/10.1016/j.dam.2019.01.031
Linz, S., Semple, C.: Hybridization in nonbinary trees. IEEE/ACM Trans. Comput. Biol. Bioinformatics 6(1), 30–45 (2009). https://doi.org/10.1109/TCBB.2008.86
Piovesan, T., Kelk, S.M.: A simple fixed parameter tractable algorithm for computing the hybridization number of two (not necessarily binary) trees. IEEE/ACM Trans. Comput. Biol. Bioinformatics 10(1), 18–25 (2013). https://doi.org/10.1109/TCBB.2012.134
Borst, S.: Temporal hybridization number algorithm implementations (2020). https://doi.org/10.5281/zenodo.3601812. https://github.com/mathcals/temporal_hybridization_number
Linz, S., Semple, C.: A cluster reduction for computing the subtree distance between phylogenies. Ann. Combin. 15(3), 465–484 (2011). https://doi.org/10.1007/s0002601101083
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Leo van Iersel and Mark Jones were partly supported by the Netherlands Organization for Scientific Research (NWO), Vidi Grant 639.072.602 and Mark Jones also by the gravitation Grant NETWORKS from NWO.
Omitted Proofs
Omitted Proofs
Lemma 4.7. Let s be a full treechild sequence s for T. Then there exists a network \(\mathcal {N}\) with semitemporal labeling t such that \(r(\mathcal {N})\le w_T(s)\) and \(d(\mathcal {N},t)\le d(s)\).
Proof
This can be proven by constructing a treechild network from the treechild sequence as described in [8, Proof of Theorem 2.2]. We will show that a semitemporal labeling satisfying our constraints exists for the resulting network. We will write
Now we merge all consecutive elements \((x_{i},y_{i}), (x_{i+1},y_{i+1}),\ldots ,(x_{i+j},y_{i+j})\) for which \(x_{i}=x_{i+1}=\cdots =x_{i+j}\) into one element \((x_i, \{y_{i},y_{i+1},\ldots , y_{i+j} \})\) and call the resulting sequence \(s'\). Call an element of this sequence temporal if all corresponding elements in s are temporal. Call it nontemporal if all corresponding elements in s are nontemporal. Observe that it can not happen that some of the corresponding elements are temporal while some are nontemporal. The following algorithm now constructs a suitable network and temporal labeling:

1.
Let \(\mathcal {N}_{r+1}\) be the network consisting of root \(\rho \), vertex \(x_{r+1}\) and edge \((\rho , x_{r+1})\). Set \(i:=r\). Define \(t_{r+1}:\mathcal {L}(T)\rightarrow \{\mathcal {\infty }\}\cup \mathbb {N}\). Set \(t(\rho ):=0\) and \(t_{r+1}(x_{r+1}):=1\) and for all other \(z\in \mathcal {L}(x)\) set \(t_{r+1}(z)=\infty \).

2.
If \(i=0\), contract all edges with in and outdegree 1 in \(\mathcal {N}_{1}\) and return the resulting network together with \(t_1\).

3.
Set \(t_{i}:=t_{i+1}\).

4.
For the element \(s'_i=(x, Y)\) do the following:

(a)
If \(s'_i\) is a temporal element then \(x\notin \mathcal {L}(\mathcal {N}_{{i+1}})\). In this case let \(\mathcal {N}_i\) be the network obtained from \(\mathcal {N}_{i+1}\) by adding vertex x, vertex \(p_x\), edge \((p_x,x)\), subdividing edge \((p_y,y)\) by vertex \(v_y\) and adding edge \((v_y,p_x)\) for all \(y\in Y\). Set \(t_i(p_x):=\infty \).

(b)
Otherwise \(s'_i\) is a nontemporal element and \(x\in \mathcal {L}(\mathcal {N}_{{i+1}})\). In this case let \(\mathcal {N}_i\) be the network obtained from \(\mathcal {N}_{i+1}\) by subdividing \((p_y, y)\) for all \(y\in Y\) with a new vertex \(v_y\) and adding the edge \((v_y,p_x)\).

(a)

5.
Set \(\tau = \max \{\max _{y\in Y}t_{i}(p_y),t_i(p_x)1\}\). For all \(y\in Y\) set \(t_i(v_y):=\tau + 1\) and \(t_i(y):= \tau + 2\). If \(s_i'\) is a temporal element set \(t_i(p_x):=\tau +1\) and \(t_i(x):=\tau +2\).

6.
Decrease i by one. Go to step 2.
Note that the construction of the network is equivalent to the one described in [8, Proof of Theorem 2.2], where it is also proven that the resulting network is a treechild network that is fully reduced by s. The only thing we have to prove is that t is a semitemporal labeling of \(\mathcal {N}\) with \(d(\mathcal {N}, t)\le d(s)\).
We will prove with induction on i that \(t_i\) is a semitemporal labeling for \(\mathcal {N}_i\). For \(N_n\) it is clear that this is true. Consider an arbitrary edge (u, v) in \(\mathcal {N}_i\). If the edge was also in \(\mathcal {N}_{i+1}\), then \(t_{i+1}(u)=t_{i}(u)\) and \(t_{i+1}(v)=t_{i}(v)\), so the edge satisfies the conditions for being semitemporal.
Now we will go through all newly introduced edges in \(\mathcal {N}_i\) and show that they satisfy the conditions for being semitemporal.

In Item 4a edges \((p_y,v_y)\), \((v_y, y)\), and \((v_y, p_x)\) are created for all \(y\in Y\) and \((p_x,x)\) is created. Because \(t_i(v_y) =\tau +1>t_i(p_y)\) and \(t_i(y)=\tau +2 > \tau +1=t_i(v_y)\) the first two edges are semitemporal. Because in this case \(s_i'\) is a temporal element \(t_i(p_x):=\tau +1\) and \(t_i(x):=\tau +2\) will be set in step 5, so \((p_x,x)\) is semitemporal. Consequently \(t_i(v_y)=\tau +1 =t_i(p_x)\), so \((v_y, x)\) is also semitemporal.

In Item 4b edges \((p_y, v_y)\), \((v_y,y)\), \((v_y,p_x)\) for all \(y\in Y\).
Note that before these edges are added we already have \(t_i(w)=t_i(p_x)\) for some parent x of \(p_x\). From step 5 it follows that \(t_i(v_y) =\tau +1>t_i(p_y)\), that \(p(y)=\tau +2 > \tau +1\) and that \(t(p_x)\le \tau +1=t(v_y)\). Therefore all of the created edges are semitemporal. We also have \(t_i(w)=t_i(p_x) < t_i(x)\), so these edges remain semitemporal.
Note that the only place where nontemporal reticulation edges can be introduced is in Item 4b in the creation of edges \((v_y,p_x)\) for all \(y\in Y\). This only happens for nontemporal items \(s'_i\) and for each of this item at most Y nontemporal reticulation edges are created, so \(d(\mathcal {N}_i, t_i) \le d(\mathcal {N}_{i+1}, t_{i+1}) + Y\). Because a nontemporal element (x, Y) in \(s'\) corresponds to Y nontemporal elements in s, this implies that \(d(\mathcal {N},t) \le d(s)\). \(\square \)
Lemma 4.8. For a treechild network \(\mathcal {N}\) there exists a full treechild sequence s with \(d(s)\le d(\mathcal {N})\) and \(w_T(s)\le r(\mathcal {N})\).
Proof
We provide a way of constructing a treechild sequence s from a treechild network \(\mathcal {N}\) with semitemporal labeling t such that \(d(s)=d(\mathcal {N})\). We do this by modifying the proof from [8, Lemma 3.4]. Let \(\rho \) denote the root of \(\mathcal {N}\) and let \(v_1,\ldots , v_r\) denote the reticulations in the network. Let \(\ell _\rho ,\ell _1,\ldots , \ell _r\) denote the leaves at the end of the paths \(P_\rho , P_1,\ldots , P_r\) starting at \(v_1,\ldots , v_r\) respectively and consisting of only tree arcs.
We will call a set \(\{x, y\}\) with parents \(p_x\) and \(p_y\) in a given network a cherry if \(p_x=p_y\). We will call it a reticulated cherry if \(p_x\) and \(p_y\) are joined by a reticulation edge \((p_y, p_x)\). In this case we call x the reticulation leaf of the cherry. We call such a reticulated cherry temporal if \(t(p_y)=t(p_x)\), otherwise we call it nontemporal.
Start off with an empty sequence \(\sigma _0\). Set \(\mathcal {N}_0:=\mathcal {N}\) and \(i:=1\).

1.
If \(\mathcal {N}_{i1}\) consists of a single vertex x then set \(\sigma _i:=\sigma _{i1} ((x,))\) and return \(\sigma _i\).

2.
If there is a cherry \(\{x, y\}\) in \(\mathcal {N}_{i1}\), then

(a)
If one of \(\{x,y\}\), say x, is an element of \(\{\ell _1, \ldots , \ell _r \}\) and \(v_j\) is not a reticulation in \(\mathcal {N}_{i1}\) set \(x_i:=x\) and \(y_i:=y\).

(b)
Otherwise let \(\{x_i, y_i\}:=\{x,y\}\) such that \(x_i\notin \{\ell _p, \ell _1,\ldots , \ell _r \}\).

(c)
Set \(\sigma _i=((x_i,y_i))  \sigma _{i1}\). Let \(\mathcal {N}_i\) be the treechild network obtained from \(\mathcal {N}_{i1}\) by deleting \(x_i\).

(d)
Go to step 5.

(a)

3.
Else, if there is a nontemporal reticulated cherry \(\{x, y\}\) in \(\mathcal {N}_{i1}\) with x the reticulation leaf then set \(\sigma _i= \sigma _{i1}((x_i,y_i))\). Let \(\mathcal {N}_i\) be the treechild network obtained from \(\mathcal {N}_{i1}\) by deleting the edge \((y_i,x_i)\) and suppressing vertices of both indegree and outdegree one.

4.
Else, there has to be a temporal reticulated cherry \(\{x, y\}\) in \(\mathcal {N}_{i1}\) with x the reticulation leaf. Let \(q_1,\ldots ,q_t\) be the set of leaves that x is in a reticulation cherry with in \(\mathcal {N}_{i1}\). Set \(\sigma _i=\sigma _{i1}  ((x,q_1),\ldots , (x,q_t))\). Let \(\mathcal {N}_i\) be the treechild network obtained from \(\mathcal {N}_{i1}\) by deleting vertex x and suppressing vertices of both indegree and outdegree one.

5.
Increase i and go to step 1.
The proof that this yields a full treechild sequence s for \(\mathcal {N}\) with \(w_T(s)\le r(\mathcal {N})\) can be found in [8, Lemma 3.4], so we will omit it here. Note that nontemporal elements can only be added to s in step 3 and each time this happens a nontemporal arc is removed from the network. Consequently the resulting treechild sequence can not contain more nontemporal elements than the number of nontemporal arcs in \(\mathcal {N}\). It follows that \(d(s)\le d(\mathcal {N})\). \(\square \)
Lemma 4.23. Let \(s^\star \) be a treechild sequence prefix, \(T^\star \) a set of trees with the same leaves and define \(T:=T^\star (s^\star )\). Suppose \(k,p\in \mathbf {N}\) and \(C\in \mathcal {L}(T)^2\). When a generalized cherry picking sequence s exists and such that \(s^ \star s\) is a treechild sequence for \(T^\star \), that satisfies C with \(w_{T^\star }(s^\star s)\le k^\star \), and such that \(d(s)\le p\), SemiTemporalCherryPicking\((T, k, k^\star , p, C)\) from Algorithm 3 returns a nonempty set.
Proof
Let W(k, u) be the claim that if a treechild sequence s for T of weight at most k exists that satisfies constraint set C with \(n^2C\le u\) and \(d(s)\le p\), such that \(s^\star s\) is a treechild sequence of weight at most \(k^\star \), then the algorithm will return a nonempty set. We will prove this claim with induction on k and \(n^2C\).
For the base case \(k=0\), if a generalized cherry picking sequence of weight k exists we must have that all cherries in T are trivial cherries. Therefore \(\mathcal {L}(T')=1\), and a nonempty set is returned.
Note that we can never have a constraint set C with \(C>n^2\) because \(C\subseteq \mathcal {L}(T)^2\). Therefore \(W(k,1)\) is true for all k.
Now suppose \(W(k, n^2C)\) is true for all cases where \(0\le k< k_b\) and all cases where \(k=k_b\) and \(n^2C \le u\). We consider the case where a sequence s with \(d(s)\le p\) of weight at most \(k=k_b+1\) exists for T that satisfies C and \(n^2C\le u_b+1\) such that \(s^\star s\) is a treechild sequence for \(T^\star \) with \(w_{T^\star }(s^\star s)\le k^\star \). Now we will prove that a nonempty set is returned by the algorithm.
Lemma 4.17 implies that \(kP(C)\ge 0\), so the ifstatement on line 2 will not be satisfied. From Lemma 4.22 it follows that a treechild cherry picking sequence \(s'\) for \(T'\) of weight at most \(k'\) exists for \(T'\) that satisfies \(C'\). From the way Pick works it follows that either \(k'<k\) or \(n^2C'= n^2C\). If \(\mathcal {L}(T')=1\) then \(\{()\}\) is returned and we have proven \(W(k_b+1, u+1)\) to be true for this case. Otherwise \(s'\) is not empty, so \(k'P(C')\ge w_T(s')>0\). Because \(s'\) satisfies \(C'\), \(\pi _1(C')\subseteq \mathcal {L}(T')\). So the condition on line 8 is not satisfied.
Now we are left with three cases:

1.
If there is a pair \( (x, y) \in G(T',C')\) with \(w_T(x)>0 \wedge x\in \pi _1(C')\), then from Lemma 4.16 it follows that s satisfies either \(C'\cup \{(x,y)\}\) or \(C'\cup \{(y,x)\}\). From our induction hypothesis it now follows that either SemiTemporalCherryPicking(\(T'\), \(k'\), p, \(C'\cup \{ (x,y ) \}\)) or SemiTemporalCherryPicking(\(T'\), \(k'\), p, \(C'\cup \{ (y,x ) \}\)) will return a nonempty set. Therefore R will not be empty, so a nonempty set will be returned.

2.
Otherwise, if there is a pair \( (x,a) \in G(T',C')\) with \(w_{T'}(x)>0 \wedge x\notin \pi _2(C')\), there is a \(b\ne a\) with \((x,b)\in G(T',C')\), for the same reasons as in Lemma 3.13 for the temporal case. Now from Lemma 4.15 it follows that s satisfies \(C'\cup \{(a,x)\}\), \(C'\cup \{(b,x)\}\) or \(C'\cup \{(x,a),(x,b)\}\). From our induction hypothesis it now follows that the corresponding subcall will return a nonempty set. Therefore R will not be empty, so a nonempty set will be returned.

3.
Because the conditions in both the if and the elseif statement are not satisfied it follows that \(H(T){\setminus } \pi _2(C)\) is empty. Indeed, any \(x \in H(T)\) must have \(w_{T'}(x) > 0\), as otherwise it would have been removed by Pick, and for any \(x \in H(T){\setminus }\pi _2(C)\) there exists at least one y with \((x,y) \in G(T',C)\), as otherwise \(\{(x,n) : n \in N_{T'}(x) \} \subseteq C'\) and again x would be removed by Pick. Then either case 1 (if \(x\in \pi _1(C)\)) or case 2 (otherwise) would apply.
Now from Lemma 4.21 it follows that \(s_1\) has to be a nontemporal element. Observe that for \(s_1'=(x,y)\) we must have \(x\notin \pi _2(C)\), because otherwise \(s'\) has to contains some element (z, x), but such an element can not appear after an element (x, y), because the sequence is a treechild sequence. Also y has to be in all trees in \(T'\), because otherwise s contains an element (y, z), which contradicts the assumption that \(ss'\) is treechild. So now we have shown that \(s_1'\in P\). Each element of P is a cherry in \(T'\). Lemma 4.20 implies that there are at most \(4k^\star \) unique cherries in \(T'\). Therefore it follows that \(P\le 8k^\star \). Because \(s_1'\in P\), there R is not empty because the result of SemiTemporalCherryPicking(\(T'(s_1'), k'1,p1,C''\)) is added to R, which by our induction hypothesis is a nonempty set.\(\square \)
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Borst, S., van Iersel, L., Jones, M. et al. New FPT Algorithms for Finding the Temporal Hybridization Number for Sets of Phylogenetic Trees. Algorithmica 84, 2050–2087 (2022). https://doi.org/10.1007/s00453022009468
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00453022009468