<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fractional Hedonic Games With a Limited Number of Coalitions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Fu Li?</string-name>
          <email>fuli@utexas.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Texas at Austin</institution>
          ,
          <addr-line>Texas</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Recently, fractional hedonic games have received considerable attention. Such a game can be represented by directed weighted graph where the weight of edge (i; j) denotes the value player i has for player j. The utility of player i is the average value that player i assigns to the members of i's coalition. In this paper, we study a variant of this game where there is a speci c upper bound k on the number of coalitions that can be formed. We rst consider how to nd a coalition partition that maximizes the social welfare, i.e., the sum of the utilities. Computing social welfare maximizing partitions for these games of all agents on undirected unweighted graphs is known to be NP-hard. Here, we study the parameterized complexity in terms of k. For all xed k 2, we show that it remains NP-hard to nd a social welfare maximizing kpartition for undirected unweighted graphs. For undirected unweighted trees, we present an algorithm nding a social welfare maximizing kpartition in time O(nk). Moreover, we consider Nash stable outcomes. We show that for all k 2, if a fractional hedonic game on a directed unweighted graph with bounded maximum out-degree admits a Nash stable k-partition, then the stable partition is almost balanced. However, we prove that determining whether a fractional hedonic game admits a Nash stable k-partition is NP-complete for all k 2.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Community detection in social networks, or network partitioning, is an
important topic in social network analysis. A social network is classically represented
by a directed weighted graph over the agents, where a weighted link models the
relationship between two agents in the social network. Intuitively, communities
in a social network corresponds to groups of the vertices that are internally more
densely connected than with the rest of the vertices in the network. Partitioning
a social network into disjoint communities, or revealing the hidden community
structure, can o er insights regarding the organization of a social network and
can signi cantly simplify the network representation. Furthermore, in online
marketing, such as placing online ads or deploying viral marketing strategies,
? Copyright ' JJJJ for this paper by its authors. Use permitted under Creative</p>
      <p>Commons License Attribution 4.0 International (CC BY 4.0).
identifying communities in the social network often leads to more accurate
targeting and achieves better marketing results.</p>
      <p>
        A key challenge of community detection is to formally de ne what is a
community. Various attempts from various perspectives have emerged in the
literature (see [
        <xref ref-type="bibr" rid="ref15 ref20">15, 20</xref>
        ] for two recent surveys on this topic). Mainstream attempts
focus on optimizing a given metric that quantitatively measure the quality of a
community structure. However, optimization of a centralized and global metric
dictates the global network decomposition from a centralized viewpoint and
ignores the natural forces and dynamics underlying the formation of communities.
      </p>
      <p>
        The eld of game theory focuses on interactions between intelligent
individuals. Thus, it is natural to apply game theory to capture the dynamics behind
the formation of communities in social networks. In recent work, there has been
a considerable amount of research on using game-theoretic techniques to study
community detection in social networks. We refer to [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] for a recent survey
on this topic. Hedonic games are a notable type of game for studying coalition
formation (see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for a survey). A hedonic game is speci ed by a set of
players who have preferences over the set of all possible partitions of the players
into coalitions. The outcome of a hedonic game consists a partition of the
players into disjoint coalitions. Of particular relevance to the present paper is the
line of research initiated by Aziz et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] on using fractional hedonic games
to study community detection. Fractional hedonic games (FHGs), introduced
by Aziz et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], are a subclass of hedonic games that can be represented by
directed weighted graphs. In particular, an FHG is represented by a directed
weighted graph where the weight of edge (i; j) denotes the value player i has for
player j and the utility of a player i is the average value that player i ascribes
to the members of i's coalition. Outcomes that satisfy some notion of stability
or welfare are considered to be desirable community structures for a given FHG.
For example, consider FHGs represented by undirected unweighted graphs, i.e.,
undirected graphs where each edge has weight 0 or 1. This covers situations in
which players only distinguish between friends and non-friends and desire to be
in a coalition in which the fraction of friends is maximized. Aziz et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
consider the computational complexity of computing welfare maximizing partitions
for FHGs. Three di erent notions of social welfare are considered: (1) utilitarian
welfare (or social welfare): sum of utilities; (2) egalitarian welfare: the
minimum utility of any agent; and (3) Nash welfare: product of utilities. They show
that maximizing utilitarian, egalitarian, or Nash welfare is NP-hard even for the
FHGs represented by undirected unweighted graphs. On the positive side, they
present approximation algorithms which search for maximal matchings. These
algorithms are therefore limited as the maximum number of players in a coalition
is two, and it is usually unrealistic in practice to form many tiny coalitions. In
this paper, we focus on utilitarian welfare.
      </p>
      <p>Our results. We study a variant of FHGs where there is a speci c upper
bound k on the number of coalitions that can be formed. To motivate the study,
note that in many real-world scenarios, there are physical and organizational
restrictions that limit the number of possible coalitions. Consider a setting in
which each coalition requires a leader, and where only a small number of agents
are quali ed to act as a leader. Thus, any feasible partition cannot contain more
coalitions than the number of quali ed leaders.</p>
      <p>
        A central concern of coalition formation games is to de ne what constitutes
an acceptable or desired outcome. Within our setting, we consider two key
objectives. Our rst objective is to nd a partition maximizing the social welfare,
i.e., the sum of the utilities of all players. As mentioned before, computing
social welfare maximizing partitions (with no restriction number of coalitions) is
proved to be NP-hard by Aziz et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], even for FHGs represented by undirected
unweighted graphs. Here, we study the parameterized complexity of the problem
in terms of k. We refer to a partition with exactly k coalitions as a k-partition.
For all k 2, we establish the NP-hardness of nding a social welfare
maximizing k-partition on undirected unweighted graphs. For undirected unweighted
trees, we prove a structural property of social welfare maximizing k-partitions.
In particular, on undirected unweighted trees, we show that any coalition in a
social welfare maximizing k-partition is connected. By leveraging this property,
for n-node undirected unweighted trees, we present a simple algorithm nding a
social welfare maximizing k-partition in O(nk) time.
      </p>
      <p>A social welfare maximizing partition may not satisfy every player and hence
there may exist a player who could increase their utility by deviating to another
coalition. Our second objective is to consider Nash stable partitions, where no
player can improve their utility by unilaterally changing their coalition. We prove
that for all k 2, if a Nash stable k-partition exists in an FHG represented by
nnode directed unweighted graph with bounded maximum out-degree, then each
coalition in such a k-partition is of size (n). We then study the computational
complexity of nding a Nash stable k-partition. Unfortunately, for all k 2, we
prove that it is NP-complete to determine whether an FHG played on a directed
weighted graph with edge weights in f0; 1g admits a Nash stable k-partition.</p>
      <p>
        Related works. Aziz et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] studied the FHGs from a social welfare
perspective, Subsequently, Flammini et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] investigated how to form welfare
maximizing coalitions in FHGs in an online setting. Chen et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] proposed
several agent-based (simulation-based) methods for nding social welfare
maximizing partitions, and provided numerical results. Bilo et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] initiated the
study of Nash stable partitions in FHGs from a non-cooperative point of view.
They showed that a Nash stable partition is not guaranteed to exist in FHGs
played on undirected graphs with negative weights. However, they proved that
such a partition always exists when weights are non-negative. Furthermore, they
give bounds on the (Nash) price of anarchy and stability. In addition, they
established the NP-hardness of computing a Nash stable partition with maximum
social welfare. Further results on the price of stability for FHGs played on
undirected unweighted graphs have been presented in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Other stability concepts
in FHGs have also been studied [
        <xref ref-type="bibr" rid="ref1 ref10 ref11">1, 10, 11</xref>
        ].
      </p>
      <p>
        The restriction on the number of coalitions, which is the focus of the present
paper, has been mostly overlooked. Skibski et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] studied k-coalitional
cooperative games in the transferable utility setting, and developed an extension of
the Shapley value for this game. Sless et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] initiated the study of additively
separable hedonic games (ASHGs) in which exactly k coalitions must be formed.
Estivill-Castro et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] studied modi ed fractional hedonic games (MFHGs)
where k equal-size coalitions must be formed (a balanced k-partition). ASHGs
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and MFHGs [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] are two related classes of hedonic games that can also be
represented by graphs. Aziz et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] explained why e cient or stable outcomes of
FHGs provide better partitions than their counterparts for ASHGs and MFHGs,
respectively. Sless et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] considered social welfare maximizing partitions and
k-coalitions-core stable partitions, an adaptation of the notion of core stability
to their setting. They presented an e cient algorithm for nding social welfare
maximizing k-partitions in ASHGs played on undirected graphs when the
number of negative-weight edges is limited, and prove that for all k 1, it is NP-hard
to determine whether a given k-partition is k-coalitions-core and whether there
exists a k-coalitions-core stable k-partition in ASHGs. Estivill-Castro et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
considered Nash stability. They proved that for all k 2, nding a balanced
Nash stable k-partition is NP-hard in general undirected unweighted graphs,
but polynomially solvable in undirected unweighted trees. Further results on
Nash stable 2-partitions for MFHGs have been presented in [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>Paper organization. The remainder of the paper is organized as follows.
Section 2 presents formal de nitions. Sections 3 and 4 present our results for
social welfare maximizing k-partitions and Nash stable k-partitions, respectively.
Section 5 o ers some concluding remarks. Due to space restrictions, some of the
proofs are omitted. Complete proofs will be provided in the full version.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>For all positive integers n, let [n] = f1; 2; : : : ; ng. In an FHG, we are given a set
N = [n] of players. The objective of the game is to partition the players into
disjoint coalitions P = fP1; P2; : : :g. Let (N ) denote the set of all partitions
of players N , and for all integers k 1, let k(N ) denote the set of partitions
in (N ) with exactly k coalitions. We refer to each partition in k(N ) as a
k-partition.</p>
      <p>Each player i has a value function vi : N ! R that denotes how much player
i values each of the players in N . We assume that vi(i) = 0. Hence, every FHG
can be represented by a tuple of valuation functions v = (v1; : : : ; vn). We often
associate an FHG with a weighted directed graph. Given a tuple of valuation
functions v, let G = (N; E; v) denote the weighted directed graph where the
weight of the tuple (i; j) in N N is vi(j) and E contains all tuples of non-zero
weight. Let G(G) denote the fractional hedonic game associated with G. When
there is no ambiguity, we simply refer to the FHG G(G) as G.</p>
      <p>For convenience, for each player i, we extend the input domain of the value
function vi to N [ fP j P N ^ i 2 P g [ (N ). For any coalition P N that
contains player i, the utility vi(P ) of agent i is de ned as Pj2jPP jvi(j) : For any
partition P in (N ), let P(u) denote the coalition that contains player u, and
the utility vi(P) of player vi in the partition P is de ned as vi(P(i)).</p>
      <p>Given an FHG G(G) and a partition P, the social welfare SWG(P) of the
partition P is de ned as the sum of the utilities of all players, i.e., SWG(P) =
Pi2N vi(P). We often drop the subscript G when there is no ambiguity.</p>
      <p>Given a partition P in (N ), we say a player i is Nash stable for P if there
is no other coalition P 0 6= P(i) in P such that vi(P 0 [ f g
i ) &gt; vi(P). We say a
partition P in (N ) is Nash stable if all players are Nash stable for P.</p>
      <p>We use the following notations from graph theory. Let G = (N; E) be an
unweighted graph. Given a subset U of N , we denote by EG(U ) the set of edges
of G having both endpoints in U . Moreover, for two disjoint sets N1 and N2,
we denote by EG(N1; N2) the set of edges having exactly one endpoint in N1
and exactly one endpoint in N2. We drop the subscript G when there is no
ambiguity. For any graph G = (N; E) and any subset S of N , we let G[S] denote
the subgraph of graph G induced by S.</p>
      <p>We now state the two problems studied in this paper.
{ The social welfare maximizing k-partition problem: Given a fractional
hedonic game G(G) and an integer k, nd a k-partition P in k(N ) that
maximizes the social welfare SW (P).
{ The Nash stable k-partition problem: Given a fractional hedonic game G(G)
and an integer k, determine whether there is a k-partition P in k(N ) that
is Nash stable.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Social Welfare Maximizing k-Partition</title>
      <p>In this section, we focus on FHGs played on undirected unweighted graphs. We
remark that for an FHG played on an undirected unweighted graph G = (N; E),
the social welfare of any partition P in (N ) is SWG(P) = PP 2P 2jEjGP(jP )j .
In the following, for FHGs played on undirected unweighted graphs, Section 3.1
establishes the NP-hardness of the social welfare maximizing k-partition problem
for every xed k 2. For FHGs played on undirected unweighted trees, Section
3.2 presents an e cient algorithm that solves the social welfare maximizing
kpartition problem for all k 2.
3.1</p>
      <sec id="sec-3-1">
        <title>NP-Hardness Results</title>
        <p>In this section, we prove Theorem 1 below.</p>
        <p>Theorem 1. For FHGs played on unweighted undirected graphs, the social
welfare maximizing k-partition problem is NP-hard for every xed k 2.</p>
        <p>We separate our hardness proof into two parts: k 3 and k = 2.</p>
        <p>
          When k 3, we reduce from the k-colorable problem, which was proved to
be NP-complete by Leven and Galil [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] for all k 3. The k-colorable problem
is to determine whether a given undirected graph can be partitioned into k
independent sets. By considering complementary graphs, the NP-completeness
of the k-colorable problem implies the NP-completeness of determining whether
an undirected graph can be partitioned into k cliques. It is straightforward to
verify that the social welfare of a k-partition P for an undirected unweighted
graph is at most at most 2(n k). Moreover, if a k-partition P has social welfare
2(n k), then the k-partition P partitions G into k cliques. Therefore, if there
is an e cient algorithm that solves the social welfare maximizing k-partition
problem, then there is an e cient algorithm that solves the NP-complete problem
of determining whether an undirected graph can be partitioned into k cliques.
Thus, we deduce that the social welfare maximizing k-partition problem is
NPhard for k 3.
        </p>
        <p>
          It remains to prove the case when k = 2. We reduce from the max cut
problem, which was proved to be NP-complete by Karp [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Recall that for the
max cut problem, we are given an instance of an unweighted undirected graph
G and a positive integer r, and we wish to determine whether there exists a cut
(S1; S2) of G satisfying jE(S1; S2)j r. We remark that our reduction is similar
to a reduction given by Bonsma et al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Bonsma et al. use a reduction from
the max cut problem to prove that it is NP-hard to nd a cut (S1; S2) in an
undirected graph G such that jEG(S1;S2)j is minimized.
        </p>
        <p>jS1jjS2j</p>
        <p>Reduction. Let I = (G; r) denote an instance of the max cut problem,
where G = (V; E) denotes an undirected graph and r denotes a positive integer.
We construct an undirected unweighted graph G = (V ; E ) as an instance of
the social welfare maximizing 2-partition problem as follows. For convenience,
let n denote jV j and let m denote jEj.</p>
        <p>We begin by constructing an undirected graph G0 = (V 0; E0), and then let
G = (V 0; K0 n E0) be the complementary graph of G0, where K0 consists of all
2-element subsets of V 0. For each v in V , we have two sets Iv and Iv0 of vertices,
each of size M = 4m + 2. Thus, G0 has 2nM vertices and V 0 = Sv2V Iv [ Iv0.
For each v in V , we introduce edges connecting each vertex in Iv to each vertex
in I0 . Pick one distinguished vertex from each Iv to form a set A of n vertices,
v
and pick one distinguished vertex from each Iv0 to form a set A0 of n vertices.
We proceed to insert edges in A and A0 to create two copies of G. The resulting
graph is G0.</p>
        <p>To show that our reduction is correct, we rst prove two useful properties of
social welfare maximizing k-partitions. Then, we prove Lemma 1, which
establishes the correctness of our reduction.</p>
        <p>Proposition 1. Let H = (V; E) be an undirected graph, and let H be the
complementary graph of H. Let P be a 2-partition in (V ). Then SWH (P) =
jV j 2 SWH (P).</p>
        <p>
          Proof. Let n denote jV j. Note that SWH (P) = Pi2[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] 2EjHP(iPji) . Since H is the
complementary graph of H, for all subsets P of V , we have EH (P ) + EH (P ) =
jP j(jP j 1)=2. Therefore, we obtain
SWH (P) = X
jPij
        </p>
        <p>
          1
i2[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]
2EH (Pi)
jPij
= n 2
        </p>
        <p>
          X vH (Pi) = n 2 SWH (P):
i2[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]
Proposition 2. Let G = (V; E) be an undirected graph. Let G0 = (V 0; E0) be the
corresponding graph obtained by our reduction, where V 0 = Sv2V (Iv [ Iv0). Let P
in 2(V 0) be a social welfare minimizing 2-partition in G0. Then, for each node
v in V and each coalition P in P, either P \ (Iv [ Iv0) = Iv or P \ (Iv [ Iv0) = Iv0.
Proof. Assume for the sake of contradiction that there is a vertex v in V such
that the 2-partition P does not partition Iv [ Iv0 into the sets Iv; Iv0. Let P =
(P1; P2). Therefore, for each i in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], both Pi \ Iv and Pi \ Iv0 are non-empty. Let
a = jP1 \ Ivj 1 and a0 = jP1 \ Iv0j 1. Note that jE(P1 \ Iv; P1 \ Iv0)j = a a0,
and jE(P2 \ Iv; P2 \ Iv0)j = (M a)(M a0). Without loss of generality, assume
that jE(P1 \ Iv; P1 \ Iv0)j jE(P2 \ Iv; P2 \ Iv0)j, i.e., aa0 (M a)(M a0).
That is, a + a0 M , and hence aa0 a(M a) M 1, as a and a0 are positive
integers. Thus, we have jE(P1 \ Iv; P1 \ Iv0)j = aa0 M 1.
        </p>
        <p>Therefore, we obtain
SWG0 (P) =</p>
        <p>
          X 2E(Pi)
i2[
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] jPij
2E(P1)
jP1j
2jE(P1 \ Iv; P1 \ Iv0)j
jP1j
        </p>
        <p>M</p>
        <p>1
jP1j</p>
        <p>M
2nM
1
Lemma 1. Let G = (V; E) be an undirected graph and let (G; r) be an instance
of the max cut problem. Let G be the corresponding instance of the social welfare
maximizing 2-partition problem. Let n = jV j, m = jEj, and M = 4m + 2. Then
G has a cut of cardinality r if and only if G has a 2-partition with social welfare
at least 2nM 2 4mnM4r .</p>
        <p>Proof. Let G0 be the complementary graph of G . By Proposition 1, it su ces
to prove that G has a cut of cardinality r if and only if G0 has a 2-partition with
social welfare at most 4mnM4r . We consider two cases.</p>
        <p>Case 1: G has a cut (S1; S2) of cardinality r. For each i in f1; 2g, let Pi = fIv j
v 2 Sig and Pi0 = fIv0 j v 2 Sig. Consider the 2-partition P0 = (P1 [ P20; P10 [ P2).
It is straightforward to verify that jP1 [ P20j = jP10 [ P2j = nM . Moreover,
notice that jEG0 (P1 [ P20)j = jEG0 (P1)j + jEG0 (P20)j = jEG(S1)j + jEG(S2)j =
jEj jEG(S1; S2)j = m r. Similarly, we have jEG0 (P10 [ P2)j = m r. Thus,
SW (P0) = 2jEG0 (P1 [ P20)j + 2jEG0 (P10 [ P2)j = 4m
4r
:
(1)
jP1 [ P20j
jP10 [ P2j
nM
Therefore, G0 has a 2-partition with social welfare at most 4m 4r .</p>
        <p>Case 2: G0 has a 2-partition with social welfare at mostnM4m 4r . Consider
nM
a social welfare minimizing 2-partition P = (P1 ; P2 ) in G0. That is, we have
SWG0 (P ) 4mnM4r . By Proposition 2, we deduce that for each v in V , P
partitions Iv [ Iv0 into the two sets Iv and Iv0. Therefore, either Iv P1 and
Iv0 P2 , or Iv P2 and Iv0 P1 . For each i in f1; 2g, let Si = fv 2 V j Iv Pi g</p>
        <p>F. Li
and Si0 = fv 2 V j Iv0 Pi g. Clearly, S1 = S20, S2 = S10, and (S1; S10) = (S20; S2)
is a partition in 2(V ). Using a calculation similar to that used to derive Eq.(1),
that jEG(S1; S10)j
we have SWG0 (P ) = 4(m jEnGM(S1;S10)j) . Since SWG0 (P ) 4mnM4r , we deduce
r. Therefore, G has a cut of cardinality at least r.
tu
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Finding Social Welfare Maximizing k-Partitions for Trees</title>
        <p>In this section, we rst prove Lemma 2, which presents a useful structural
property of social welfare maximizing k-partitions on undirected unweighted trees.
Then, based on this property, we present a simple O(nk)-time algorithm for the
social welfare maximizing k-partitions problem on unweighted undirected trees.
Lemma 2. Let G = (N; E) be a tree and let k be a positive integer. Let P in
k(N ) be a social welfare maximizing k-partition with k coalitions P1 ; : : : ; Pk .
Then, for all coalitions Pi in P , G[Pi ] is connected.</p>
        <p>Proof. Note that a connected subgraph of a tree is a tree, and a disconnected
subgraph of a tree is a forest. Assume for the sake of contradiction that there
is a coalition Pi in P such that G[Pi ] is not connected, i.e., a forest. Suppose
that G[Pi ] has p connected components, where p 2. Let (T1; T2; : : : ; Tp) be
the partition of Pi such that G[T1]; : : : ; G[Tp] are all connected components in
G[Pi ]. Let tw = jTwj for each w in [p] and pi = jPi j. That is, pi = Pw2[p] tw.
Without loss of generality, assume that t1 t2 tp.</p>
        <p>Since G is a tree, we deduce that there is another coalition Pj in P with j 6= i
such that there is an edge between Pj and T1. Now we are ready to construct
a k-partition P0 in k(N ) with SW (P0) &gt; SW (P ), which contradicts the
assumption that P is a social welfare maximizing k-partition.</p>
        <p>We construct such a k-partition P0 with coalitions P10; : : : ; Pk0 as follows.
For each t in [n] n fi; jg, let Pt0 = Pt . Furthermore, let Pi0 = Pi n T1 and
Pj0 = Pj [ T1. Now we prove that SW (P0) &gt; SW (P ). For all coalitions S
of N , let d(S) = E(S)=jSj. Thus, SW (P0) = Pw2[k] 2d(P w0) and SW (P ) =
Pw2[k] 2d(Pw). Hence it su ces to prove that d(Pi0) + d(Pj0) &gt; d(Pi ) + d(Pj ).
To prove this, it is enough to prove that d(Pi0) d(Pi ) and d(Pj0) &gt; d(Pj ).</p>
        <p>First, we prove that d(Pi0) d(Pi ). Recall that the subgraph G[Pi ] contains
p trees G[T1]; : : : ; G[Tp], while the subgraph G[Pi0] contains trees G[T2]; : : : ; G[Tp].
Thus,
d(Pi0) =</p>
        <p>Ppw=2(tw</p>
        <p>Pp
w=2 tw
1)
= 1
p
pi
1
t1
; d(Pi ) =</p>
        <p>Ppw=1(tw</p>
        <p>Pp
w=1 tw
1)
= 1
p
pi
:
Now, to show that d(Pi0) d(Pi ), it su ces to show that ppi 1t1 p
p t1 pi. The last inequality follows by t1 t2 tp and pi = Ppwp=i 1, tiw.e..,</p>
        <p>Second, we prove that d(Pj0) &gt; d(Pj ). Let pj = jPj j and ej = jE(Pj )j. That
is, d(Pj ) = pejj . Since there is at least one edge connecting Pj and T1, we have
d(Pj0) = jE(Pj [ T1)j
pj + t1
jE(Pj )j + 1 + jE(T1)j = ej + t1</p>
        <p>:
pj + t1</p>
        <p>pj + t1
tu
Therefore, to prove d(Pj0) &gt; d(Pj ), it su ces to prove pejj++tt11 &gt; pejj , i.e., pj t1 &gt;
ej t1. This follows by the observation that any subgraph of a tree is either a
tree or a forest, that is, ej pj 1 &lt; pj .</p>
        <p>Theorem 2. For all positive integers k, the social welfare maximizing k-partition
problem can be solved in O(nk) time on undirected unweighted trees.
Proof. By Lemma 2, we deduce that any social welfare maximizing k-partition
on a tree is a partition into k subtrees. Notice that for trees, there is a one-to-one
correspondence between removing k 1 edges and partitioning into k subtrees.
Thus, in O(nk) time, one can simply enumerate each possible partition of k
subtrees in G and identify the optimal one in in O(nk) time.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Nash Stable k-Partition</title>
      <p>In this section, we consider Nash stable k-partitions for all k 2. Throughout
this section, we assume that k 2 unless stated otherwise. As an independent
result, Theorem 3 below shows that a Nash stable k-partition of an unweighted
directed graph with bounded out-degree is almost balanced. Then, we prove that
it is NP-complete to determine whether a directed weighted graph with edges
weights 1 admits a Nash stable k-partition. We remark that a directed graph
is strongly connected if there is a path in each direction between each pair of
vertices of the graph.</p>
      <p>Theorem 3. Let k 2 and 2 be two integers. Let G = (N; E) denote a
directed unweighted strongly connected graph with out-degree bounded by and
jN j k k+1. Assume that G(G) admits a Nash stable k-partition P in k(N ).
Then all coalitions in P have size at least k nk 1 .</p>
      <p>Proof. Let P1; : : : ; Pk denote the k coalitions in P with 0 &lt; jP1j jP2j jPkj.
It su ces to prove that jP1j k nk 1 . For any t in f0; 1; : : : ; k 1g, let Q(t)
dheonldostefotrhaenpyrtedinicaft0e; 1jP;:k: : t;jk 1kgn. tC. lWeaerlyu,sQe(inkduc1t)ioimnpolniest tthoaptrjoPv1ej thakt nQk (1t).</p>
      <p>For the base case, notice that 0 &lt; jP1j jP2j jPkj, and hence jPkj
k1 Pi2[k] jPij = nk . Therefore, Q(0) holds. For the induction step, let i in [k 1]
be given and suppose that Q(t) holds for each t in f0; : : : ; i 1g. Then, we
shall prove that Q(i) holds, i.e., jPk ij kn i . Since (P1; : : : ; Pk) belongs to
k(N ), we deduce that Sj2[k i] Pj ; Sj2[k]n[k i] Pj is a 2-partition in 2(N ).
Furthermore, since G is strongly connected, there is a directed edge (b; a) from
Sj2[k]n[k i] Pj to Sj2[k i] Pj . Let Pi0 ; Pj0 with i0 k i; j0 k i + 1 denote the
two coalitions that contain players a and b, respectively. Therefore, jPi0 j jPk ij
and k j0 i 1. By the induction hypothesis, we deduce that Q(k j0)
holds, i.e., jPj0 j k nk j0 k ni 1 . Below we prove that jPi0 j 1 jPj0 j. Since
jPi0 j jPk ij and jPj0 j k ni 1 , we deduce that jPk ij jPi0 j 1 jPj0 j
1 k ni 1 = kn i , as required.</p>
      <p>F. Li</p>
      <p>It remains to prove that jPi0 j 1 jPj0 j. Since P is Nash stable, we deduce
that each player is Nash stable. Since player b is Nash stable, we have
vb(Pi0 [ fbg)
vb(Pj0 ):
(2)
have jPj0 j jPi0 j jPi0 j +
n k k+1 that
Since (b; a) is a directed edge, we deduce that vb(a) = 1 and hence vb(Pi0 [fbg) =
Pw2PjPi0i[0 jf+bg1vb(w) jPvib0(ja+)1 = jPi01j+1 : Furthermore, since the out-degree of player
b is bounded by and a is an out-neighbor of b outside Pj0 , we deduce that b
has at most 1 out-neighbors in Pj0 , that is, Pw2Pj0 vb(w) 1. Thus,
vb(Pw) jPj01j . Using inequality (2), we have jPi01j+1 jPj01j . By rearranging, we
1. Furthermore, we deduce from Q(k j0) and
jPj0 j
k
n
k j0
k
k k+1
k j0 =
j0+1:
Notice that j0 k i + 1 2 as i k 1. Therefore, we have 3 j0+1
jPi0 j jPi0 j + 1. Now, we prove that jPi0 j . Assume for the sake of
contradiction that jPi0 j . Hence, we have jPi0 j jPi0 j + 1 2 + 1.
Since 2, we deduce that 2 + 1 &lt; 2 2 3, which contradicts
3 jPi0 j + 1. Hence jPi0 j .</p>
      <p>jPi0 j jPi0 j + 1 jPi0 j + 1 &lt;
jPi0 j</p>
      <p>Thus, jPj0 j
jPi0 j &gt; 1 jPj0 j.
4.1</p>
      <sec id="sec-4-1">
        <title>Hardness</title>
        <p>In this section, for each k 2, we establish the NP-completeness of determining
whether a directed weighted graph with edges weights 1 admits a Nash stable
k-partition. We give an NP-completeness proof rst for k = 2 and then for k 3.</p>
        <p>First, it is convenient for us to consider Nash stable partitions in FHGs
played on undirected unweighted graphs with each player aiming to minimize
the utility, rather than considering Nash stability in weighted directed graphs
with negative edge weights. Formally, we state the following observation.
Observation 4 Let H = (N; E; v) denote a directed weighted graph with edge
weight 1. Let H0 = (N; E) denote the directed unweighted graph that contains
the same vertices and edges as H. Let P denote a k-partition in k(N ) for all
k 1. Then, the k-partition P is Nash stable in G(H) if and only if P is Nash
stable in G(H0) with each player seeking to minimize, rather than maximize,
their utility.</p>
        <p>We now prove the following proposition, which will be used in our
NPcompleteness proofs for both k = 2 and k 3.</p>
        <p>
          Proposition 3. Let N denote the set of utility-minimizing players, and let k
2 be an integer. Let G(G) denote a fractional hedonic game, where G = (N; E) is
an unweighted directed graph. Let x in N denote a player such that x has exactly
k 1 out-neighbors y1; : : : ; yk 1 in G. Then, for all Nash stable k-partitions P
in k(N ), we have P(x) 6= P(yi) for each i in [k 1].
jPi0 j, i.e.,
tu
Proof. Assume for the sake of contradiction that there is an index i in [k 1]
such that P(x) = P(yi). That is, vx(P(x)) = vx(P(yi)) &gt; 0 since yi is in P(yi)
and yi is an out-neighbor of x. Since x has exactly k 1 out-neighbors, there
is a coalition P in the k-partition P such that P does not contain x and any
out-neighbors of x. Therefore, vx(P [ fxg) = 0 &lt; vx(P(x)). That is, the
utilityminimizing player x is not Nash stable for P, a contradiction. tu
Nash Stable 2-Partition For k = 2, we reduce from the balanced unfriendly
2-partition problem. A 2-partition of an undirected graph is called unfriendly if
each vertex has at least as many neighbors outside its part as within. Bazgan et
al. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] prove that the decision problem for balanced unfriendly 2-partitions is
NPcomplete. Our reduction borrows ideas from a known NP-completeness reduction
based on the same problem. Kun et al. [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] present an elegant reduction from
the balanced unfriendly 2-partition problem to show that determining whether a
directed graph has a stable coloring with two colors is NP-complete. They use a
gadget that forces any stable 2-coloring to be balanced. We adapt this gadget to
our setting to ensure that any Nash stable 2-partition is balanced. Due to space
limitations, the proof of Lemma 3 is deferred to the full version of the paper.
Lemma 3. For FHGs with utility-minimizing players and played on directed
unweighted graphs, the Nash stable 2-partition problem is NP-complete.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Nash Stable k-Partitions</title>
        <p>Lemma 4. For FHGs with utility-minimizing players and played on directed
unweighted graphs, the Nash stable k-partition problem is NP-complete for all
k 3.</p>
        <p>Proof. Clearly, this problem is in NP. For hardness, we reduce from the
NPcomplete problem stated in Lemma 3. Let G = (V; E) denote an instance of the
problem stated in Lemma 3, where G is a directed unweighted graph with an
isolated 2-cycle of vertices p1; p2. Let n denote jV j, and suppose that n 3. We
construct a directed unweighted graph G0 = (V 0; E0) as follows.</p>
        <p>The graph G0 has all vertices in V , and all edges in E. Note that p1; p2 are the
two vertices of the isolated 2-cycle in G. Add k 2 vertices, p3; : : : ; pk, and add
edges letting p1; p2; : : : ; pk form a clique, i.e., add directed edges (pi; pj ) for each
i 6= j in [k] unless fi; jg = f1; 2g. Let M = n2 2n + 2. For each j in f3; : : : ; kg,
add M dummy vertices dj;q for each q in [M ], and add edges connecting these
dummy vertices dj;q to all vertices pi for each i in [k] n fjg. That is, for each j in
f3; : : : ; kg, the vertices in the set fpj g [ fdj;q j q 2 [M ]g have the same k 1
outneighbors. Add edges connecting all vertices in V n fp1; p2g to dummy vertices
dj;q for all j in f3; : : : ; kg and all q in [M ]. In total, G0 has n + k 2 + (k 2)M
vertices. Claims 1 and 2 below imply that the lemma holds</p>
        <p>Claim 1: If G admits a Nash stable 2-partition P = (P1; P2) for
utilityminimizing players, then G0 admits a Nash stable k-partition for utility-minimizing
players.</p>
        <p>F. Li</p>
        <p>Let P0 denote the k-partition (Pi0)i2[k], where P10 = P1; P20 = P2; and Pi0 =
fpig [ fdi;q j q 2 [M ]g for each i in f3; : : : ; ng. Clearly, for each i in f3; : : : ; ng,
all players in Pi0 = fpig [ fdi;q j q 2 [M ]g have utility 0, and hence are Nash
stable. To prove that P0 is Nash stable, it remains to prove that all of the players
in P 0</p>
        <p>
          1 [ P20 are Nash stable. Assume for the sake of contradiction that there exists
an integer i in [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] such that the player p in Pi0 is not Nash stable. Thus, there is
a coalition Pj0 such that the utility player p is decreased after p deviates to P 0.
j
Since P10 = P1; P20 = P2, and the 2-partition (P1; P2) is Nash stable, we deduce
that j 6= 3 i. Therefore, j is in f3; : : : ; kg. Notice that for each q in [M ], the
player dj;q is an out-neighbor of p in P 0. Therefore, vp(Pj0 [ f g
        </p>
        <p>j p ) = M=(M + 2) =
1 2=(M + 2). Moreover, p has at most jPi0j 1 out-neighbors in Pi0 and has
utility at most 1 1=jPi0j 1 1=(n 1) as jPi0j = jPij = jV n P3 ij n 1.
Note that M = n2 2n + 2 = (n 1)2 + 1 &gt; 2n 2 as n 3. Therefore, we have
2=(M + 2) &lt; 1=n, i.e., vp(Pj0 [ fpg) = 1 2=(M + 2) &gt; 1 1=n vp(Pi0). Thus,
player p's utility does not decrease by letting p deviate to Pj0, a contradiction.
This completes the proof of Claim 1.</p>
        <p>Claim 2: If G0 admits a Nash stable k-partition P0 = (Pi0)i2[k] in k(V 0),
then G admits a Nash stable 2-partition.</p>
        <p>Notice that for each i in [k], the player pi has k 1 out-neighbors in fpj j
j 2 [k] n figg. Thus, we deduce by Proposition 3 that P0(pi) 6= P0(pj ) for all j in
[k] n fig. Therefore, the k vertices p1; : : : ; pk belong to distinct coalitions in the
k-partition. Without loss of generality, suppose that Pi0 contains pi for all i in
[k]. That is, P0(pi) = Pi0 for all i in [k]. It now su ces to prove that (P10; P20) is a
2-partition in 2(V ). After we prove this, the desired statement that G admits
the Nash stable 2-partition (P10; P20) directly follows, since the Nash stability of
(P10; P20) follows by the Nash stability of P0 = (Pi0)i2[k].</p>
        <p>
          To prove that (P10; P20) is in 2(V ), it su ces to prove that P10 [P20 = V . That
is, it is enough to prove that V 0 n V Si2f3;:::;kg Pi0 and V \ Si2f3;:::;kg Pi0 = ;.
We rst prove that V 0 n V Si2f3;:::;kg Pi0. Since pi belongs to Pi0 for each i in
[k] n [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], it remains to consider the dummy vertices. For each j in [k] n [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] and
q in [M ], the dummy vertex dj;q has k 1 out-neighbors in fpi j i 2 [k] n fjgg,
and hence we deduce by Proposition 3 that P0(dj;q) 6= P0(pi) = Pi0 for all i in
[k] n f g
        </p>
        <p>
          j . That is, we obtain that P0(dj;q) = Pj0 for all i in [k] n fjg. Therefore,
for all j in [k] n [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], we deduce that fpj g [ fdi;q j q 2 [M ]g Pj0. That is,
except for the n 2 vertices in V n fp1; p2g, the coalitions that contain the
remaining vertices in V 0 have been xed. Therefore, jP10j n 1; jP20j n 1,
and jPj0j 1 + M + n 2 = M + n 1 for all j in [k] n [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Then we prove that
V n fp1; p2g \ Si2f3;:::;kg Pi0 = ;. Assume by contradiction that there is a vertex
u in V n fp1; p2g such that u is not in P10 [ P20. Let j be an index in [k] n [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] such
that Pj0 = P0(u). Note that Pj0 has at least M out-neighbors of u, dj;q for each q
in [M ]. That is, vu(Pj0) jPMj0j M+Mn 1 = 1 Mn+n1 1 , where the last inequality
follows by jPj0j M + n 1. Moreover, vu(P10 [ fig) jPj1P0[10 [fifgijgj 1 nn 1 = 1 n1 ,
where the last inequality follows by jP1j n 1. Since M = n2 2n+2, it follows
that n1 = n(nn 11) &gt; n2n n1+1 = Mn+n1 1 , i.e., vu(P10 [ fig) &lt; vu(Pj0). That is, player
i.e., (P10; P20) 2
u deceases its utility by deviating to P10, contradicting the Nash stability of u.
Therefore, we conclude that V 0 n V Si2f3;:::;kg Pi0 and V \ Si2f3;:::;kg Pi0 = ;,
2(V ). This completes the proof of Claim 2.
        </p>
        <p>The theorem below summarizes the main result of this section.</p>
        <p>Theorem 5. For FHGs played on directed weighted graphs where all edges have
weight 1, the Nash stable k-partition problem is NP-complete for every xed
k 2.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Concluding Remarks</title>
      <p>Following the direction of using game-theoretic methods to study community
detection, we initiated the study of the fractional hedonic games by restricting
the number of coalitions. We considered this scenario from two aspects: social
welfare maximization and Nash stability. We applied parameterized complexity
theory to understand the computational barriers.</p>
      <p>
        For future work, given our NP-hardness results, we propose to design
approximation algorithms or heuristic algorithms. As a starting point, one could study
the approximation algorithms for nding social welfare maximizing k-partition in
FHGs played on undirected unweighted graphs. Note that for this problem, it is
easy to see that the classical algorithm nding a densest subgraph by Goldberg
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] provides a k-approximation algorithm. It is interesting to study whether
there is an e cient O(log k)-approximation algorithm. Furthermore, it is
interesting to study price of anarchy and price of stability for Nash stable partitions
in our model. In particular, study the performance in terms of k. Finally, we
conjecture that it is NP-hard to nd a Nash stable k-partition on undirected
unweighted graphs for all k 2, but this remains an open problem.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Aziz</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harrenstein</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olsen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peters</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Fractional hedonic games</article-title>
          .
          <source>ACM Trans. Economics and Computation</source>
          <volume>7</volume>
          (
          <issue>2</issue>
          ), 6:
          <issue>1</issue>
          {6:
          <issue>29</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Aziz</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seedig</surname>
            ,
            <given-names>H.G.</given-names>
          </string-name>
          :
          <article-title>Computing desirable partitions in additively separable hedonic games</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>195</volume>
          ,
          <fpage>316</fpage>
          {
          <fpage>334</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Aziz</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaspers</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gudmundsson</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mestre</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Taubig, H.:
          <article-title>Welfare maximization in fractional hedonic games</article-title>
          .
          <source>In: Proceedings of the 24th International Joint Conference on Arti cial Intelligence</source>
          . pp.
          <volume>461</volume>
          {
          <issue>467</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Aziz</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savani</surname>
          </string-name>
          , R.:
          <article-title>Hedonic games</article-title>
          . In: Brandt,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Conitzer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Endriss</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Lang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Procaccia</surname>
          </string-name>
          , A.D. (eds.) Handbook of Computational Social Choice, pp.
          <volume>356</volume>
          {
          <fpage>376</fpage>
          . Cambridge University Press (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bazgan</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chleb</surname>
            <given-names>kova</given-names>
          </string-name>
          , J.,
          <string-name>
            <surname>Dallard</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Graphs without a partition into two proportionally dense subgraphs</article-title>
          .
          <source>Information Processing Letters</source>
          <volume>155</volume>
          ,
          <issue>105877</issue>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bazgan</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chlebikova</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pontoizeau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Structural and algorithmic properties of 2-community structures</article-title>
          .
          <source>Algorithmica</source>
          <volume>80</volume>
          (
          <issue>6</issue>
          ),
          <year>1890</year>
          {
          <fpage>1908</fpage>
          <string-name>
            <surname>(2018) F</surname>
          </string-name>
          . Li
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bazgan</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tuza</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanderpooten</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Complexity and approximation of satisfactory partition problems</article-title>
          .
          <source>In: Proceedings of the 11th International Computing and Combinatorics Conference</source>
          . pp.
          <volume>829</volume>
          {
          <issue>838</issue>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Bilo</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fanelli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flammini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monaco</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moscardelli</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Nash stability in fractional hedonic games</article-title>
          .
          <source>In: Proceedings of the 10th International Workshop on Internet and Network Economics</source>
          . pp.
          <volume>486</volume>
          {
          <issue>491</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Bonsma</surname>
            ,
            <given-names>P.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Broersma</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pyatkin</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>The complexity of nding uniform sparsest cuts in various graph classes</article-title>
          .
          <source>Journal of Discrete Algorithms</source>
          <volume>14</volume>
          , 136{
          <fpage>149</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Brandl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strobel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fractional hedonic games: Individual and group stability</article-title>
          .
          <source>In: Proceedings of the 14th International Conference on Autonomous Agents and Multi-Agent Systems</source>
          . pp.
          <volume>1219</volume>
          {
          <issue>1227</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Carosi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monaco</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moscardelli</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Local core stability in simple symmetric fractional hedonic games</article-title>
          .
          <source>In: Proceedings of the 18th International Conference on Autonomous Agents and Multi-Agent Systems</source>
          . pp.
          <volume>574</volume>
          {
          <issue>582</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Liu,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Soo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.U.</given-names>
            ,
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.</surname>
          </string-name>
          :
          <article-title>Maximizing social welfare in fractional hedonic games using shapley value</article-title>
          .
          <source>In: Proceedings of the 4th IEEE International Conference on Agents</source>
          . pp.
          <volume>21</volume>
          {
          <issue>26</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Estivill-Castro</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>On connected two communities</article-title>
          .
          <source>In: Proceedings of the 36th Australasian Computer Science Conference</source>
          . pp.
          <volume>23</volume>
          {
          <issue>30</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Flammini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monaco</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moscardelli</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shalom</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaks</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Online coalition structure generation in graph games</article-title>
          .
          <source>In: Proceedings of the 17th International Conference on Autonomous Agents and Multi-Agent Systems</source>
          . pp.
          <volume>1353</volume>
          {
          <issue>1361</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Fortunato</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hric</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Community detection in networks: A user guide</article-title>
          .
          <source>Physics Reports</source>
          <volume>659</volume>
          ,
          <issue>1</issue>
          {
          <fpage>44</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Goldberg</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>Finding a maximum density subgraph</article-title>
          .
          <source>Tech. rep.</source>
          , University of California Berkeley (
          <year>1984</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Jonnalagadda</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuppusamy</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A survey on game theoretic models for community detection in social networks</article-title>
          .
          <source>Social Network Analysis and Mining</source>
          <volume>6</volume>
          (
          <issue>1</issue>
          ),
          <volume>1</volume>
          {
          <fpage>24</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kaklamanis</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kanellopoulos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papaioannou</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>The price of stability of simple symmetric fractional hedonic games</article-title>
          .
          <source>In: Proceedings of 9th International Symposium on Algorithmic Game Theory</source>
          . pp.
          <volume>220</volume>
          {
          <issue>232</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Karp</surname>
            ,
            <given-names>R.M.:</given-names>
          </string-name>
          <article-title>Reducibility among combinatorial problems</article-title>
          .
          <source>In: Proceedings of a Symposium on the Complexity of Computer Computations</source>
          . pp.
          <volume>85</volume>
          {
          <issue>103</issue>
          (
          <year>1972</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>B.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Niazi</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>Network community detection: A review and visual survey</article-title>
          .
          <source>arXiv:1708.00977</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kun</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Powers</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reyzin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Anti-coordination games and stable graph colorings</article-title>
          .
          <source>In: Proceedings of the 6th International Symposium on Algorithmic Game Theory</source>
          . pp.
          <volume>122</volume>
          {
          <issue>133</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Leven</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galil</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>NP-completeness of nding the chromatic index of regular graphs</article-title>
          .
          <source>Journal of Algorithms</source>
          <volume>4</volume>
          (
          <issue>1</issue>
          ),
          <volume>35</volume>
          {
          <fpage>44</fpage>
          (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Olsen</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A general view on computing communities</article-title>
          .
          <source>Mathematical Social Sciences</source>
          <volume>66</volume>
          (
          <issue>3</issue>
          ),
          <volume>331</volume>
          {
          <fpage>336</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Skibski</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matejczyk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michalak</surname>
            ,
            <given-names>T.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yokoo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>: kcoalitional cooperative games</article-title>
          .
          <source>In: Proceedings of the 15th International Conference on Autonomous Agents and Multi-Agent Systems</source>
          . pp.
          <volume>177</volume>
          {
          <issue>185</issue>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Sless</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hazon</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kraus</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          :
          <article-title>Forming k coalitions and facilitating relationships in social networks</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>259</volume>
          ,
          <fpage>217</fpage>
          {
          <fpage>245</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>