Skip to main content

Complexity of Secure Sets

  • Conference paper
  • First Online:
Graph-Theoretic Concepts in Computer Science (WG 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9224))

Included in the following conference series:

Abstract

A secure set S in a graph is defined as a set of vertices such that for any \(X\subseteq S\) the majority of vertices in the neighborhood of X belongs to S. It is known that deciding whether a set S is secure in a graph is \(\text {co-}\hbox {NP}\)-complete. However, it is still open how this result contributes to the actual complexity of deciding whether, for a given graph G and integer k, a non-empty secure set for G of size at most k exists. While membership in the class \(\Sigma ^{\mathrm{P}}_{2}\) is rather easy to see for this existence problem, showing \(\Sigma ^{\mathrm{P}}_{2}\)-hardness is quite involved. In this paper, we provide such a hardness result, hence classifying the secure set existence problem as \(\Sigma ^{\mathrm{P}}_{2}\)-complete. We do so by first showing hardness for a variantof the problem, which we then reduce step-by-step to secure set existence. In total, we obtain eight new completeness results for different variants of the secure set existence problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abseher, M., Bliem, B., Charwat, G., Dusberger, F., Woltran, S.: Computing secure sets in graphs using answer set programming. In: Proceedings of ASPOCP 2014 (2014)

    Google Scholar 

  2. Brewka, G., Eiter, T., Truszczyński, M.: Answer set programming at a glance. Commun. ACM 54(12), 92–103 (2011)

    Article  Google Scholar 

  3. Brigham, R.C., Dutton, R.D., Hedetniemi, S.T.: Security in graphs. Discrete Appl. Math. 155(13), 1708–1714 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  4. de Haan, R., Szeider, S.: The parameterized complexity of reasoning problems beyond NP. In: Proceedings of KR 2014, pp. 82–91 (2014)

    Google Scholar 

  5. Enciso, R.I., Dutton, R.D.: Parameterized complexity of secure sets. Congr. Numer. 189, 161–168 (2008)

    MathSciNet  MATH  Google Scholar 

  6. Ho, Y.Y.: Global secure sets of trees and grid-like graphs. Ph.D. thesis, University of Central Florida, Orlando, USA (2011)

    Google Scholar 

  7. Marx, D.: Complexity of clique coloring and related problems. Theor. Comput. Sci. 412(29), 3487–3500 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  8. Szeider, S.: Generalizations of matched CNF formulas. Ann. Math. Artif. Intell. 43(1), 223–238 (2005)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the Austrian Science Fund (FWF) projects P25607 and Y698. We would like to thank the reviewers for their valuable comments and Herbert Fleischner for drawing our attention to the problem of secure sets.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernhard Bliem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bliem, B., Woltran, S. (2016). Complexity of Secure Sets. In: Mayr, E. (eds) Graph-Theoretic Concepts in Computer Science. WG 2015. Lecture Notes in Computer Science(), vol 9224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53174-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-53174-7_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-53173-0

  • Online ISBN: 978-3-662-53174-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics