1. Introduction
The dominating set problem is often regarded as one of the most important
-complete problems in computational complexity. A dominating set in a graph is a set of vertices such that every vertex in the graph is either in the set or adjacent to a vertex in it. The dominating set problem is, given a graph
and a number
, to decide the minimum dominating set of
G has a size of at most
k. This problem is tightly connected to the set cover problem, which was firstly shown to be
-complete in Karp’s famous
-completeness paper [
1]. Unless
, we do not expect to solve this problem and its optimization variant in polynomial time. Furthermore, the set cover conjecture asserts that for every fixed
, no algorithm can solve the set cover problem in time
, even if set sizes are bounded by
[
2,
3]. One way to handle
-hard problems is to use approximation algorithms. One key measurement of an approximation algorithm for the dominating set problem is its approximation ratio, i.e., the ratio between the size of the solution output by the algorithm and the size of the minimum dominating set. It is known that greedy algorithms can achieve an approximation ratio of ≈
[
4,
5,
6,
7,
8]. Though this problem has a PTAS (polynomial-time approximation scheme, an algorithm which takes an instance of an optimization problem and a parameter
and, in polynomial time, approximate the problem with ratio
) applied to apex-minor-free graphs for contraction-bidimensional parameters [
9], after a long line of works [
10,
11,
12,
13,
14], the approximation ratio of this problem was matched by the lower bound by Dinur and Steurer [
15], who followed the construction presented in Feige’s work [
12], showing that for every
, we could not obtain a
-approximation for this problem unless
. Besides approximation, another widely-considered technique to circumvent the intractability of
-hard problems is parameterization. If we take the minimum solution size
k as a parameter, then the brute-force algorithm can solve the
k-
DominatingSet (
k-
DomSet) problem in
time. However, it is recently proved that, assuming
, for any computable function
f, there is no
-FPT-approximation algorithm, that is, there is no approximation algorithm running in FPT-time and with a ratio of
[
16,
17,
18].
Circuit complexity was thought to be a promising direction to solve
vs.
. Though it has been long known that some problems, like the parity problem, are not in
[
19,
20,
21], proving that non-uniform lower bounds for functions in nondeterministic complexity classes such as
,
, or
is a well-known challenge. After Williams’ proving that
does not have
-size
circuits (
composed with a layer of linear threshold gates at the bottom) [
22,
23], Murray and Williams showed that for every
, and
m there is an
e and a problem in
which does not have depth-d
-size
circuits with linear threshold gates at the bottom layer [
24].
Rossman showed that the
k-
Clique problem has no bounded-depth and unbounded fan-in circuits of size
[
25], which may be viewed as an
version of
. Chen and Flum [
26] showed that any FPT-approximation of the
k-
Clique problem is not in para-
. The parameterized circuit complexity class para-
introduced by Elberfeld, Stockhusen, and Tantau [
27] as the
analog of the class
, is the class of parameterized problems computed by constant-depth circuits of size
for some computable function
f. In the same paper, based on Rossman’s result, they also showed that the
k-
DomSet problem could not be computed in para-
. This brings us to the main question addressed in our work:
Is there a computable function f such that the -approximation of k-DomSet is in para-
? Furthermore, since we could enumerate every
k tuple of vertices by depth-3 circuits of size
using brute force, we might wonder whether it is possible to have a computable function
f such that the
-approximation of
k-
DomSet could be computed by constant-depth circuits of size
.
Our Work
In this paper, we show that for any computable function f, the -FPT-approximation of the k-DomSet problem is not in para-. Furthermore, under the hypothesis that constant-depth circuits of size could not compute 3-CNF-SAT (we call it -ETH, the constant-depth version of ETH—the exponential time hypothesis), there is no computable function f such that the -approximation of k-DomSet could be computed by constant-depth circuits of size . Theorems 1 and 2 are direct consequences of Theorems 3 and 4, respectively.
Theorem 1. Given a graph G with n vertices, there is no constant-depth circuits of size for any computable function f which distinguish between:
The size of the minimum dominating set is at most k,
The size of the minimum dominating set is greater than .
Note that this theorem implies the nonexistence of para- circuits which -approximates the k-DomSet problem for any computable function f. This is because if there is an -approximation para- circuit whose size is , we can construct a constant-depth para- circuit to distinguish the size of the minimum dominating set is at most k or greater than as follows. Compare and — if is smaller, we let be ; otherwise, since , we let be the circuit which, using brute force, computes the size of a minimum dominating set with the depth-3 circuit of size . Since , we have ; by simple calculations we know that for , which implies , that is, . Thus, we know , which means the circuit is still a para- circuit.
Hypothesis 1 (-ETH, the constant-depth version of ETH). There exists such that no constant-depth circuits of size can decide whether the 3-CNF-SAT instance φ is satisfiable, where n is the number of variables of φ.
Theorem 2. Assuming -ETH, given a graph G with n vertices, there is no constant-depth circuits of size for any computable function f which distinguish between:
The size of the minimum dominating set of G is at most k,
The size of the minimum dominating set of G is greater than .
Though -ETH seems much weaker than ETH (ETH implies the nonexistence of uniform circuits of size and any depth which could compute the 3-CNF-SAT problem), we show that the hypothesis is hard to settle by proving it implies , which, believed to be true, remains open for decades. Moreover, it is still unknown whether the weaker version, , holds or not.
Since our hard set cover instances can be easily reduced to the instances of the total dominating set problem, the connected dominating set problem and the independent dominating set problem, we can apply our inapproximability results to these variants of the dominating set problem. More discussion of the variants can be found in the work of Downey and Fellows [
28] and the work of Chlebík and Chlebíková [
29].
Compared with the conference version [
30] of this article, the proofs of Lemmas 1–7 are firstly given here; some results are slightly improved by more careful analyses.
2. Preliminaries
We denote by the set of nonnegative integers. For each , we define and for . For any set A and , we let be the set of subsets with exactly k elements of A. For a sequence of bits b, we let be the l-th bit of b.
For a graph G, the set of vertices of G is denoted by and the set of edges is denoted by ; for a vertex , we let be the neighbors of v. Since a graph G is represented using a binary string, we express the bit of the edge by . For a bipartite graph , we often tacitly represent G only using bits.
In this article, logarithms have base 2, and fractions and irrational numbers are rounded up if necessary.
2.1. Problem Definitions
The decision problems studied in this paper are listed below:
In the k-DominatingSet (k-DomSet) problem, our goal is to decide if there is a dominating set of size k in the given graph G.
In the k-SetCover problem, we are given a bipartite graph and the goal is to decide whether there is a subset X of S with cardinality k such that for each vertex v in U, there exists a vertex u in X that covers v, i.e., .
In the k-Clique problem, our goal is to determine if there is a clique of size k in the given graph G.
In the 3-CNF-SAT problem, we are given a propositional formula in which every clause contains at most 3 literals and the goal is to decide whether is satisfiable.
We say a set cover instance has set cover number m if the size of a minimum set such that X could cover U is m. Similarly, we say a graph G has dominating number m if the size of a minimum dominating set of G is m.
As we mentioned, the dominating set problem is tightly connected to the set cover problem. Given a
k-
DomSet instance
, we can construct a
k-
SetCover instance
with
,
and
; here, for each vertex
, we denote the corresponding vertices in
by
and
, respectively. It is quite clear that
G has dominating number
k if and only if
I has set cover number
k. Also, given a
k-
SetCover instance
, we can construct a
k-
DomSet instance
by letting
,
,
,
and
. It is trivial that
I has set cover number
k if and only if
G has dominating number
k. The reductions can also be found in the work of Chlebík and Chlebíková [
29].
It is notable that each hard instance with gap reduced from a Clique or 3-CNF-SAT instance satisfies that the size of the sets M is at most poly(N) where N is the size of the universe. Hence, it is safe to tacitly apply the inapproximability of k-SetCover to the k-DomSet problem.
2.2. Circuit Complexity
For , an -input, m-output Boolean circuit is a directed acyclic graph with vertices with no incoming edges and m vertices with no outgoing edges. All nonsource vertices are called gates and are labeled with one of either , or ¬. The size of , denoted by , is the number of vertices in it. The depth of is the length of the longest directed path from an input node to the output node. We often tacitly identify with the function it computes.
All the circuits considered in this paper are non-uniform and with unbounded fan-in ∧ and ∨ gates unless otherwise stated.
The classes of , para-, and are defined as follows:
is the class of problems which can be computed by constant-depth circuit families where every has size poly(n), and whose gates have unbounded fan-in.
Para- is the class of parameterized problems which can be computed by a circuit family satisfying that there exist and a computed function f such that for every , has depth d and size , and whose gates have unbounded fan-in.
is the class of problems which can be computed by a circuit family where has depth and size poly(n), and whose gates have a fan-in of 2.
2.3. Covering Arrays
A covering array
is an
array
A whose cells take values from a set
V of size
v and the set of rows of every
subarray of
A is the whole set
. The smallest number
N such that
exists is denoted by
. Covering arrays are discussed extensively since the 1990s, as they play an important role in the interaction testing of complex engineered systems. The recent discussion about the upper bounds of the size of covering arrays can be found as presented by Sarkar and Colbourn [
31].
In this article, we always assume
. It is noted that in Lin’s work [
18], a covering array
is also called an
-universal set.
3. Introducing Gap to the k-SetCover Problem
Theorem 1 and Theorem 2 show that the para-
circuits cannot approximate the
k-
DomSet problem with ratio
for any computable function
f. To achieve this, we need to introduce gaps for
k-
DomSet instances. In this section, we present the lemmas which allow us to introduce gaps to the
k-
SetCover problem, using
gap-gadgets as presented in Lin’s work [
18]. Lemma 1 gives an upper bound for
. The next two lemmas also follow the idea from Lin’s work [
18]. Lemma 2 allows us to construct gap gadgets with
and
. In Lemma 3, we present the construction which introduces gaps to set cover instances.
Definition 1. A -Gap-Gadget is a bipartite graph satisfying the following conditions.
- (G1)
A is partitioned into where for every .
- (G2)
B is partitioned into where for every .
- (G3)
For each , there exists such that is adjacent to for .
- (G4)
For any and , if has neighbors in X for , then .
Lemma 1. for .
Proof. We let
. Kleitman and Spencer showed that if
,
[
32]. Thus, we only need to show that
. Since
and
, we have
This implies . □
Lemma 2. There is a constant-depth circuit family which, for sufficiently large n and with and , given with for , outputs a -Gap-Gadget with , B = S. Furthermore, has size at most and could output whether a and b are adjacent using gates, for every .
Proof. Let . Note that , that is, ; by Lemma 1, we know that there exists a covering array CA(n log h; k, n, 2), denoted by .
We partition every row of into blocks so that each block has length , interpreted as an integer in . From the numbers of , we could obtain an matrix M by setting to be the c-th integer of the r-th row.
Claim. For any with , there exists such that .
This claim says that for any for , there is a row r such that the -th, ⋯, -th numbers of r are distinct. This is because we could choose the corresponding bits (since for each , the c-th number of a row is from the -th bit to the -th bit) of the row, with ; by the property of a CA(n log h; k, n, 2) covering array, there must be a row r such that for each , .
Now we construct a bipartite graph as follows.
with each ;
with for ;
, that is, for every and every , if then we add an edge between a and b.
We prove that T is a -Gap-Gadget. It is clear that (G1) and (G2) hold for T. For (G3), given any , we know that for each , , which is adjacent to .
If T does not satisfy (G4), then there exists with such that there is and has at least neighbors in X for each . Since , we know that there is a row such that . For this r, there exist some such that has at least 2 neighbors in . However, and means that . This implies , which is a contradiction.
The
outputs
T with
bits where whether
a and
b are connected is determined by
for every
. □
Given a set cover instance , we construct the gap gadget with . To use the gap gadget, we construct a new set cover instance with such that for every which covers , there exists witnessing that there is an which covers U and each vertex of which is adjacent to for some .
In the following lemma, we use the hypercube set system, which is firstly presented in Feige’s work [
12] and is also used in [
16,
17,
18]. The set
is considered to be all the functions from
Y to
X with
.
Lemma 3. There is a constant-depth circuit family which, for each , given a set cover instance where and for and a -Gap-Gadget constructed with S as Lemma 2 describes, outputs a set cover instance with and such that
If there exists which could cover U, then the set cover number of is at most k;
If the set cover number of I is larger than k, then the set cover number of is greater than h.
Furthermore, the circuit has size at most and could output whether s and f are connected with at most gates.
Proof. Let be the -Gap-Gadget with for . is defined as follows.
;
;
For every and for each , if there is an such that and .
If there exist that can cover U, then we show that for each , it is covered by some vertex in . Suppose . By (G3) we know that, for , there exists such that is adjacent to for . Since C covers U, there must be for some covers . That is, we have and , which means covers f.
If the set cover number of I is greater than k, we show that for every that covers , we must have .
Claim. For any that covers , there exist that for every .
Otherwise, there is some such that for any , we have , which means there is some not covered by since the covering number of I is greater than k. For such that for any , it is covered by S only if it is covered by some since u can only be covered by . However, for any , s is not a neighbor of a. That is, f is not adjacent to , either. Hence, f is not covered by X, which is a contradiction.
With the claim, we know that for any that covers , there exist that has neighbors in X for every . With (G4), we must have .
The
outputs
with
bits where whether there is an edge between
s and
f is determined by
for every
using at most
gates. □
4. Inapproximability of k-DominatingSet
In this section, we show the inapproximability of the dominating set problem by proving Theorems 3 and 4. To show Theorem 3, we have Lemmas 4 and 5. Lemma 4 follows the idea in recent papers [
17,
18], presenting the circuits that output a
-
SetCover instance given a
k-
Clique instance as input. With Lemma 4, Lemma 5 introduces circuits reducing
k-
Clique instances to set cover instances with gaps. To prove Theorem 4, Lemma 6 (firstly shown by Pătraşcu and Williams [
33]) is used to prove the inapproximability of set cover problem using constant-depth
circuits, assuming Hypothesis 1. At the end of this section, we show that Hypothesis 1 may be hard to settle by showing that it implies
, which has remained open for decades.
4.1. The Unconditional Inapproximability of k-DominatingSet
Now we give the circuits which reduce
k-
Clique instances to
-
SetCover instances, and introduce gaps to them. Finally we use Rossman’s result [
25], i.e., the unconditional lower bounds of the size of constant-depth circuits determining the
k-
Clique problem, to show the inapproximability of the
k-
DomSet problem.
Lemma 4. There is a circuit family which, given a k-Clique instance G with , outputs a set cover instance with and such that G contains a k-clique if and only if the set cover number of I is at most . Furthermore, has constant depth and size at most .
Proof. Firstly, we construct , a k-colored version of G as follows. Let each be a copy of V and for every , we call the corresponding vertex in by ; let with . Note that each is an independent set for and contains a k-clique if and only if G contains a k-clique.
Now we construct the the set cover instance according to in the following way. Given , we denote by b(v) the bit representation of v. Note that when i is fixed, every vertex in could be determined using bits.
;
with ;
For every , we connect every to each , with , such that .
Suppose that there is a k-clique in with vertices . We claim that covers U. This is because for any , we have and thus, it is covered by .
If there is covers U with cardinality at most , then we show that there is a k-clique in . Firstly, for . Otherwise, let and for any , is not covered by X.
Now we let X be the vertices for every . For each and distinct , we let and . We claim that . Otherwise, there must be a bit such that . Without loss of generality, we assume . Now we take such that and . Then is not covered by X, which is a contradiction.
Hence, for every , we could safely take the vertex such that is in the edge for arbitrary j as the i-th vertex of the k-clique.
The
outputs
with at most
bits where whether
and
is connected is determined by
for every
,
and every
. Hence,
is with each output gate of depth at most 3 and of size at most
. □
Lemma 5. There is a circuit family which, given a k-Clique instance G with , could output a set cover instance with and such that
If G contains a k-clique, then the set cover number of I is at most ;
If G contains no k-clique, then the set cover number of I is greater than .
Furthermore, has constant depth and size at most .
Proof. By Lemma 4, we can construct a -SetCover instance with and , using a constant-depth circuit of size at most . Let . By Lemma 2, we can construct a -Gap-Gadget T with given S, using a constant-depth circuit of size at most . By Lemma 3, we could have a constant-depth circuit of size at most which computes a set cover instance with , such that
If G contains a k-clique, then the set cover number of I is at most ;
If G contains no k-clique, then the set cover number of I is greater than .
Here, since , we can conclude that . □
Theorem 3. Given a set cover instance with , for , any constant-depth circuit of size cannot distinguish between
The set cover number of I is at most k, or
The set cover number of I is greater than .
Proof. Rossman showed that for every
, the
k-
Clique problem on
n-vertex graphs requires constant-depth circuits of size
[
25]. Now if there is a constant-depth circuit
of size
that could distinguish between the set cover number of
I where
is at most
k or greater than
, then by Lemma 5, given
and a graph
G with
, we can construct a set cover instance
I with vertex number at most
satisfying that if
G has a
k-clique then the set cover number of
I is at most
and otherwise it is greater than
—we could use
to decide whether the set cover number of
I is either
or
. The circuits are of size
when
, which contradicts the result shown by Rossman [
25]. □
Note that Theorem 3 implies Theorem 1 since for every set cover instance we can construct a dominating set instance simply by adding edges to S so that it becomes a clique. Then the dominating number of is the same as the set cover number of I.
4.2. The Inapproximability of k-DominatingSet Assuming -ETH
Next we show the -inapproximability of the set cover problem for constant-depth circuits of size for any computable function f, assuming -ETH. To achieve this, we use Lemma 6 to reduce 3-CNF-SAT formulas to set cover instances with gaps.
Lemma 6. There is a circuit family which for every , given a 3-CNF-SAT instance φ with n variables where n is much larger than k, outputs and a set cover instance satisfying
;
If φ is satisfiable, then the set cover number of I is at most k;
If φ is not satisfiable, then the set cover number of I is greater than ;
Furthermore, has constant depth and size at most .
Proof. Firstly, we construct a set cover instance whose set cover number is k if and only if is satisfiable, as follows.
Partition n variables into k parts and each part has variables. We let and for , each be the set of all the assignments of the variables from the i-th part. Thus, for each . Let be the clauses of and vertices . We define the edges connecting each with and every such that s satisfies C, for each .
It is clear that if is satisfied by assignment , then we know that there are such that we can combine to get the , satisfying . Now suppose can cover . Note that the set cover number of cannot be less than k because of the existence of . Since the different sets of variables are pairwise disjoint, we could simply combine the assignments , which together satisfy all the clauses, to have the assignment satisfying .
We have with and and let . By Lemma 2, there is a constant-depth circuit which can compute a -Gap-Gadget T with which has size . By Lemma 3, there is a constant-depth circuit that can construct a set cover instance which, given and T such that
If is satisfiable, then the set cover number of I is at most k;
If is unsatisfiable, then the set cover number of I is greater than h;
, .
Thus, . Furthermore, has size at most . □
Theorem 4. Assuming -ETH, there is such that, given a set cover instance with , any constant-depth Boolean circuit of size cannot distinguish between
The set cover number of I is at most k, or
The set cover number of I is greater than .
Proof. By -ETH, there exists such that no constant-depth circuits of size can decide whether the 3-CNF-SAT instance is satisfiable where n is the number of variables of . For every 3-CNF-SAT formula , there is a constant-depth circuit of size which, given , computes a set cover instance with for whose set cover number is either at most k or greater than by Lemma 6. Now take .
If a constant-depth circuit of size could distinguish between the set cover number of I being at most k or greater than where n is the vertex number of the given set cover instance I, then we could use to determine the set cover number of I is whether at most k, i.e., to decide if is satisfiable. The used circuits have size at most , which contradicts -ETH. □
Using the same trick for Theorem 1, we know that Theorem 4 implies Theorem 2.
4.3. The Difficulty of Proving -ETH
Though -ETH seems much weaker than ETH, we find that it is still very hard to settle by showing Theorem 5, i.e., -ETH implies . Firstly, we show the trade off between depth compression and size expansion when simulating circuits using constant-depth ones. Then we prove the Theorem 5 by showing that -ETH implies that 3-CNF-SAT .
Lemma 7. For every , i.e., there exists such that L could be computed by a family of circuits such that has size at most and depth at most , there exists such that there is a family of circuits which satisfies
Proof. We show that for every
,
could be simulated by a circuit
that has depth
d and size
. Suppose
has size
and depth
(otherwise, we could add dummy gates to
). For every gate
of depth
, let
be the Boolean function computed by
. Note that
has at most
input bits, denoted by
since
is of fan-in 2. Now we could replace
using brute force by
where
if
and
if
. That is,
could be simulated by a 2-depth circuit which has size at most
.
Assume for every
, every gate
of depth
could be replaced by a
-depth circuit
which has size
. Now we could simulate each gate
of depth
, whose output is determined by the gates
from the
-th layer, in the similar way. That is,
is replaced by
where
if
and
if
. Now,
has depth
and size at most
.
Thus, the output gate of could be simulated by a depth d circuit whose size is at most . □
Theorem 5. -ETH implies .
Proof. We show that -ETH implies 3-CNF-SAT. If there exists such that 3-CNF-SAT could be computed by a family of circuits satisfying has size at most and depth at most . By Lemma 7, 3-CNF-SAT could be computed by -depth, size circuits for sufficiently large n, which contradicts -ETH. □