<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Stability of Special Graph Classes?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Robin Weishaupt</string-name>
          <email>robin.weishaupt@hhu.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jorg Rothe</string-name>
          <email>rothe@hhu.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institut fur Informatik, Heinrich-Heine-Universitat Dusseldorf</institution>
          ,
          <addr-line>Dusseldorf</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Frei et al. [6] showed that the problem to decide whether a graph is stable with respect to some graph parameter under adding or removing either edges or vertices is 2P-complete. They studied the common graph parameters (independence number), (vertex cover number), ! (clique number), and (chromatic number) for certain variants of the stability problem. We follow their approach and provide a large number of polynomial-time algorithms solving these problems for special graph classes, namely for trees, forests, bipartite graphs, and cographs.</p>
      </abstract>
      <kwd-group>
        <kwd>Computational Complexity</kwd>
        <kwd>Graph Theory</kwd>
        <kwd>Stability</kwd>
        <kwd>Robustness</kwd>
        <kwd>Colorability</kwd>
        <kwd>Vertex Cover</kwd>
        <kwd>Independent Set</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] comprehensively studied the problem of how stable certain
central graph parameters are when a given graph is slightly modi ed, i.e., under
operations such as adding or deleting either edges or vertices. Given a graph
parameter (like, e.g., the independence number or the chromatic number),
they formally introduced the problems -Stability, -VertexStability,
Unfrozenness, and -VertexUnfrozenness and showed that they are,
typically, 2P-complete, that is, they are complete for the complexity class known as
\parallel access to NP," which was introduced by Papadimitriou and Zachos [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]
and intensely studied by, e.g., Wagner [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ], Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref10 ref8">8, 10</xref>
        ], and
Rothe et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]; see the survey by Hemaspaandra et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. 2P is contained in the
second level of the polynomial hierarchy and contains the problems that can be
solved in polynomial time by an algorithm that accesses its NP oracle in parallel
(i.e., it rst computes all its queries and then asks them all at once and accepts
its input depending on the answer vector). Alternatively, 2P = PNP[O(log n)] can
be viewed as the class of problems solvable in polynomial time via adaptively
accessing its NP oracle (i.e., computing the next query depending on the answer
to the previous query) logarithmically often (in the input size).
      </p>
      <p>
        Furthermore, Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] proved that some more speci c versions of these
problems, namely k- -Stability and k- -VertexStability, are NP-complete
? Copyright © 2021 for this paper by its authors. Use permitted under Creative
      </p>
      <p>
        Commons License Attribution 4.0 International (CC BY 4.0).
for k = 3 and DP-complete for k 4, respectively, where DP was introduced by
Papadimitriou and Yannakakis [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] as the class of problems that can be written
as the di erence of NP problems.
      </p>
      <p>
        Overall, the results of Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] indicate that these problems are rather
intractable and there exist no e cient algorithms solving them exactly.
Considering the vast number of real-world applications for these problems mentioned by
Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]|e.g., the design of infrastructure, coloring algorithms for biological
networks [
        <xref ref-type="bibr" rid="ref13 ref15">15, 13</xref>
        ] or for complex information, social, and economic networks [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
etc.|these results are rather disappointing and unsatisfying.
      </p>
      <p>
        This obstacle motivates us to study whether there are scenarios that allow for
e cient solutions to these problems which in general are intractable. Our work
is based on the assumption that most of the real-world applications of stability
of graph parameters do not use arbitrarily complex graphs but may often be
restricted to certain special graph classes. Consequently, our studies show that|
despite the completeness results by Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]|there are tractable solutions
to these problems when one limits the scope of the problem to a special graph
class. We study four di erent classes of special graphs: trees (T ), forests (F ),
bipartite graphs (B), and co-graphs (C). For each such class, we study twelve
di erent problems:
{ stability, vertex-stability, and unfrozenness
{ for the four graph parameters , , !, and .
      </p>
      <p>In total, we thus obtain the 48 P membership results shown in Table 1,
which gives the theorem, proposition, or corollary corresponding to each such P
result. These results can be useful for real-world applications when knowledge
about the stability, vertex-stability, or unfrozenness of a graph with respect to
a certain graph parameter is required and graphs with such a special structure
may typically occur in this application.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>
        We follow the notation of Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and brie y collect the relevant notions
here (referring to their paper [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for further discussion). Let G be the set of
all undirected, simple graphs without loops. For G 2 G, we denote by V (G)
its vertex set and by E(G) its edge set; by G its complementary graph with
V (G) = V (G) and E(G) = ffv; wg j v; w 2 V (G) ^ v 6= w ^ fv; wg 2= E(G)g. For
v 2 V (G), e 2 E(G), and e0 2 E(G), let G v, G e, and G + e0, respectively,
denote the graphs that result from G by deleting v, deleting e, and adding e0.
      </p>
      <sec id="sec-2-1">
        <title>A graph parameter is a map : G ! N. We focus on the prominent graph</title>
        <p>parameters (the size of a maximum independent set), (the size of a minimum
vertex cover), (the chromatic number, i.e., the minimum number of colors
needed to color the vertices of a graph so that no two adjacent vertices have the
same color), and ! (the size of a maximum clique).</p>
        <p>For a graph parameter , an edge e 2 E(G) is said to be -stable if (G) =
(G e), i.e., (G) remains unchanged after e is deleted from G. Otherwise (i.e.,
Stability VE CCoorr.. 33 TThhmm.. 77
Unfrozenness Prop. 1 Thm. 8</p>
        <p>B
Cor. 4
Cor. 4
Cor. 6
Cor. 4
Cor. 4
Thm. 12
Cor. 4
Cor. 4
Cor. 5
Cor. 4
Cor. 4
Thm. 11</p>
        <p>C
Cor. 10
Thm. 17
Cor. 12
Cor. 11
Cor. 8
Cor. 12
Thm. 19
Cor. 9
Cor. 13
Thm. 18
Thm. 16
Thm. 20
if (G) is changed by deleting e), e is said to be -critical. Stability and criticality
are de ned analogously for a vertex v 2 V (G) instead of an edge e 2 E(G).</p>
        <p>A graph is said to be -stable if all its edges are -stable. A graph whose
vertices (instead of edges) are all -stable is said to be -vertex-stable, and
criticality and -vertex-criticality are de ned analogously. Obviously, each edge
and each vertex is either stable or critical, yet a graph might be neither.</p>
        <p>Traditionally, the analogous terms for stability or vertex-stability when an
edge or a vertex is added rather than deleted are unfrozenness and
vertexunfrozenness : They too indicate that a graph parameter does not change by
this operation. And if, however, a graph parameter changes when an edge or
vertex is added (not deleted), the notions analogous to criticality and
vertexcriticality are simply termed frozenness and vertex-frozenness. Again, each edge
and each vertex is either unfrozen or frozen, but a graph might be neither.</p>
        <p>
          For a graph parameter , de ne -Stability to be the set of -stable graphs;
and analogously so for the sets -VertexStability, -VertexCriticality,
Unfrozenness, -Frozenness, and -VertexUnfrozenness. These are the
decision problems studied by Frei et al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] for general graphs in terms of their
computational complexity. We will study them restricted to the graph classes
mentioned in the introduction, formally de ned in the subsections of Section 4.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>A graph class J G is closed for (induced) subgraphs if for every G 2 J it</title>
        <p>holds that all (induced) subgraphs H of G satisfy H 2 J .</p>
        <p>
          The notation of perfect graphs was originally introduced by Berge [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] in 1963:
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>A graph G 2 G is called perfect if for all induced subgraphs H of G, we have</title>
        <p>(H) = !(H). Note that G is also an induced subgraph of itself.</p>
        <p>Let P be the class of problems solvable in (deterministic) polynomial time.
For more background on computational complexity (e.g., regarding the
complexity classes NP, DP, and 2P mentioned in the introduction; note that P NP</p>
      </sec>
      <sec id="sec-2-4">
        <title>DP 2P by de nition), we refer to the textbooks by Papadimitriou [16] and</title>
        <p>
          Rothe [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>
          For the sake of self-containment, we here state Gallai's theorem [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], which is
used to obtain several of our results.
        </p>
        <sec id="sec-2-4-1">
          <title>Theorem 1 (Gallai's theorem). For every graph G 2 G, it holds that</title>
          <p>jV (G)j =
(G) + (G):
3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>General Stability and Unfrozenness Results</title>
      <p>In this section, we provide general results that hold for speci c graph classes
satisfying special requirements. These results can be used to easily determine for
a given graph class whether some stability or unfrozenness results are tractable.
Theorem 2. Let J G be a graph class closed for induced subgraphs, and a
tractable graph parameter for J . Then -VertexStability 2 P for all G 2 J .</p>
      <sec id="sec-3-1">
        <title>Proof. Let G 2 J and compute (G). For all v 2 V (G), we have G v 2</title>
      </sec>
      <sec id="sec-3-2">
        <title>J , since J is closed for induced subgraphs. Hence, for all v 2 V (G), we can</title>
        <p>compute (G v) e ciently and compare it to (G). If there is no vertex such
that the values di er, G is -vertex-stable. This approach is computable in time
polynomial in jGj, so that -VertexStability 2 P for all G 2 J . q</p>
        <p>Since every graph class that is closed for subgraphs is also closed for induced
subgraphs, Corollary 1 is a simple consequence of the previous theorem.
Corollary 1. Let J G be a graph class closed under subgraphs and a
tractable graph parameter for J . Then -VertexStability 2 P for all G 2 J .</p>
        <p>
          The rst theorem made a statement related to vertex-stability about graph
classes closed for induced subgraphs. Theorem 3 is related to stability. Due to
space limitations, some proofs of our results (such as the one of Theorem 3) will
be tacitly omitted; they can be found in the technical report [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
Theorem 3. Let J G be a graph class closed under subgraphs and
tractable graph parameter for J . Then -Stability 2 P for all G 2 J .
a
        </p>
        <p>Some of the special graph classes we study in the next section are perfect,
which is why we now provide some results for perfect graph classes.
Theorem 4. Let G 2 G be a perfect graph. Then it holds that G is
!-vertexstable if and only if G is -vertex-stable.</p>
        <p>Based on this result, the next corollary follows immediately.</p>
        <p>Corollary 2. Let J G be a class of perfect graphs. Then, for all graphs in J ,
we have -VertexStability = !-VertexStability.</p>
        <p>While the above results are related to the concepts of stability and
vertexstability, the subsequent two results address the topic of unfrozenness.
Theorem 5. Let J G be a graph class closed under complements and
subgraphs. If or is tractable for J , then !-Unfrozenness 2 P for all G 2 J .</p>
        <p>Note that this theorem exploits a relation between - and -Stability and
!-Unfrozenness shown in [6, Proposition 5]. The next theorem follows by a
similar approach, but exploits a relation between !-Stability and - and
Unfrozenness.</p>
        <p>Theorem 6. Let J G be a graph class closed under complements and
subgraphs. If ! is tractable for J , then - and -Unfrozenness 2 P for all G 2 J .
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Tractability Results for Special Graph Classes</title>
      <p>
        Ahead of our results for the individual graph classes, we provide two observations
which we will use multiple times in upcoming proofs (presented here or in the
technical report [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]).1
Observation 1. -VertexStability
-Stability:
Observation 2. Let G 2 G be a graph. If an edge fu; vg 2 E(G) is -critical,
then u and v are -critical, too.
      </p>
      <p>
        With these two observations we can now inspect several graph classes. In the
following subsections we study the problems -Stability, -VertexStability,
and -Unfrozenness with 2 f ; ; !; g, restricted to special graph classes.
Frei et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] showed that for 2 f ; !; g we have -VertexUnfrozenness =
; as well as -VertexUnfrozenness = f(;; ;)g, where (;; ;) is the null graph,
i.e., the graph without vertices or edges (which we will not further consider in
this paper). This is why we do not study problems related to vertex-unfrozenness,
as all related questions are already answered.
      </p>
      <p>We start with investigating trees and forests.
4.1</p>
      <p>Trees and Forests</p>
      <sec id="sec-4-1">
        <title>We say G 2 G is a tree (i.e., G 2 T ) if G has no isolated vertices and no cycles</title>
        <p>
          of length greater than or equal to 3. Furthermore, G is a forest (i.e., G 2 F ) if
there exist trees G1; : : : ; Gn 2 T such that G = G1 [ [ Gn. For every tree
G 2 T , it holds that jE(G)j = jV (G)j 1 (see, e.g., Bollobas [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]). So, we have
!(G) = (G) = 2 if jV (G)j &gt; 1, and !(G) = (G) = 1 if jV (G)j = 1.
        </p>
        <p>
          Also, there exists a tractable algorithm to determine (G) for trees (for
example, as T B, we can simply use the algorithm for bipartite graphs from
Observation 4). Thus we can compute for trees using Gallai's theorem [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]
1 Note that the second observation is in line with Observation 2 of Frei et al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
(stated as Theorem 1), and all four graph parameters , , !, and are tractable
for trees.
        </p>
        <p>Now, let G 2 F with G = G1 [ [ Gn and Gi 2 T , 1 i n, be
a forest. It is easy to check that (G) = Pin=1 (Gi), (G) = Pin=1 (Gi),
!(G) = max1 i n !(Gi), and (G) = max1 i n (Gi). Furthermore, it is known
that the class of forests F is closed under subgraphs and induced subgraphs.
From these observations we have the following results.</p>
        <p>Theorem 7. Let 2 f ; ; !; g be a graph parameter. Then the problems
Stability and -VertexStability are in P for all forests.</p>
      </sec>
      <sec id="sec-4-2">
        <title>With T</title>
      </sec>
      <sec id="sec-4-3">
        <title>F the next corollary follows immediately.</title>
        <sec id="sec-4-3-1">
          <title>Corollary 3. For all G 2 T and</title>
          <p>and -VertexStability belong to P.</p>
          <p>2 f ; ; !; g, the problems -Stability</p>
          <p>
            We now focus on the unfrozenness problems. All trees and forests with fewer
than three vertices are trivial to handle (see the technical report [
            <xref ref-type="bibr" rid="ref23">23</xref>
            ] for details).
It remains to study trees and forests with at least three vertices.
Proposition 1. Every tree G 2 T with jV (G)j
3 is neither !- nor -unfrozen.
          </p>
          <p>Based on this result we can deduce whether forests are !- or -unfrozen. As
forests without edges are empty graphs, we study forests with at least one edge.</p>
          <p>Let Pi denote the path with i vertices.</p>
          <p>Theorem 8. If F 2 F contains P2 but no P3 as induced subgraphs, F is !- and
-unfrozen. If F contains P3 as an induced subgraph, F is not !- nor -unfrozen.</p>
          <p>- and -Unfrozenness are covered in Corollary 7 of the next subsection.
4.2</p>
          <p>Bipartite Graphs
G = (V1 [ V2; E) is a bipartite graph if V1 \ V2 = ; and E ffu; vg j u 2</p>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>V1 ^ v 2 V2g. Denote the set of all bipartite graphs by B. We begin with two</title>
        <p>simple observations.</p>
        <p>Observation 3. Let G 2 B be a bipartite graph. Then
E(G) = ;, and (G) = !(G) = 2 if E(G) 6= ;.
(G) = !(G) = 1 if</p>
        <p>
          Consequently, we can e ciently calculate and ! for all bipartite graphs.
The proof of the next observation (see [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]) provides a tractable method to
calculate and for bipartite graphs by making use of the approaches due to
Hopcroft and Karp [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] and K}onig [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>Observation 4. We can calculate (G) and (G) e ciently for G 2 B.</p>
      </sec>
      <sec id="sec-4-5">
        <title>Hence, we can e ciently calculate (G) for every G 2 B and 2 f ; ; !; g.</title>
        <p>Furthermore, as the class of bipartite graphs is closed under subgraphs and
induced subgraphs, the following corollary follows from Theorem 2.
Corollary 4. For every 2 f ; ; !; g, the problems -Stability and
VertexStability are in P for all bipartite graphs.</p>
        <p>
          Next, we discuss approaches for how to decide whether a bipartite graph
is stable. If a bipartite graph G has no edges, it is trivial to handle [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. For
bipartite graphs with one edge, we have the following simple result.
Proposition 2. Let G be a bipartite graph with jE(G)j = 1. Then G is neither
-stable nor -vertex-stable for 2 f ; ; !; g.
        </p>
        <p>We now provide results for bipartite graphs with more than one edge.
Proposition 3. Every bipartite graph G with jE(G)j
2 is -stable.</p>
        <p>Proof.
that (G</p>
      </sec>
      <sec id="sec-4-6">
        <title>Let e 2 E(G) be an arbitrary edge of G. Since E(G</title>
        <p>e) = 2 = (G) and, thus, G is -stable.
e) 6= ;, it holds
q</p>
        <p>Furthermore, we can characterize -vertex-stability.</p>
        <p>Theorem 9. Let G be a bipartite graph with jE(G)j 2. G is -vertex-stable if
and only if for all v 2 V (G) it holds that deg(v) &lt; jE(G)j.</p>
        <p>Proof. Assume G to be -vertex-stable. Furthermore, as we assume that
jE(G)j 2, it holds that (G) = 2. Then there cannot exist a vertex v 2 V (G)
with deg(v) = jE(G)j, as such a vertex would be -critical, since (G v) = 1
because of E(G v) = ;. For the opposite direction, assume that for all vertices
v 2 V (G) we have deg(v) &lt; jE(G)j. Hence, no matter what vertex v 2 V (G) we
remove from G, it always holds that E(G v) 6= ;, so (G v) = 2 = (G) and,
thus, G is -vertex-stable. q</p>
        <p>The proof of the following proposition is similar to that of Proposition 3.
Proposition 4. Every bipartite graph G with jE(G)j
2 is !-stable.</p>
      </sec>
      <sec id="sec-4-7">
        <title>Proof. For all e 2 E(G) we have !(G</title>
        <p>such that G is !-stable.
e) = 2 = !(G) as E(G
e) 6= ; holds,
q</p>
        <p>Lastly, we can also characterize !-vertex-stability.</p>
        <p>Theorem 10. Let G be a bipartite graph with jE(G)j 2. G is !-vertex-stable
if and only if for all v 2 V (G) it holds that deg(v) &lt; jE(G)j.</p>
      </sec>
      <sec id="sec-4-8">
        <title>Proof. Assume that G is !-vertex-stable. Consequently, for all v 2 V (G) it</title>
        <p>holds that !(G v) = 2 = !(G). If there is one v 2 V (G) with deg(v) = jE(G)j,
we have !(G v) = 1 as E(G v) = ;, a contradiction to G's !-vertex-stability.</p>
      </sec>
      <sec id="sec-4-9">
        <title>Contrarily, assume that for all v 2 V (G) it holds that deg(v) &lt; jE(G)j. Then, for</title>
        <p>all v 2 V (G), it follows that E(G v) 6= ;. Consequently, !(G) = 2 = !(G v)
and, hence, G is !-vertex-stable. q</p>
        <p>Besides these (vertex-)stability characterizations for bipartite graphs, we now
address unfrozenness for them.
Theorem 11. Let G be a bipartite graph. G is
possesses no P3 as an induced subgraph.
-unfrozen if and only if G
Proof. We prove both directions separately. First, assume G is -unfrozen but
contains P3 as an induced subgraph. Write V (P3) = fv1; v2; v3g and E(P3) =
ffv1; v2g; fv2; v3gg for the corresponding vertices and edges. Then e = fv1; v3g 2
E(G). However, adding e to G we obtain (G) = 2 &lt; 3 = (G+e), as P3+e forms
a 3-clique in G, a contradiction to the assumption that G is -unfrozen. Next,
assume that G possesses no P3 as an induced subgraph but is not -unfrozen.
Hence, there must exist e = fu; vg 2 E(G) such that (G + e) = 3 &gt; 2 = (G).
Denote the two disjoint vertex sets of G by V1 [ V2 = V (G). Obviously, u 2 V1
and v 2 V2 cannot be true, since then (G + e) = 2 would hold. Therefore,
without loss of generality, we assume u; v 2 V1. Adding e to G must create a
cycle of odd length in G, as cycles of even length as well as paths can be colored
with two colors. Consequently, G + e possesses Cn with n = 2k + 1 3, k 2 N,
as a subgraph. This implies that G must possess P3 as an induced subgraph,
again a contradiction. q</p>
        <p>Slightly modifying (the direction from right to left in) the previous proof
yields Corollary 5. This time, adding e to G must create a 3-clique in G.
Corollary 5. G 2 B is !-unfrozen if and only if G possesses no P3 as an
induced subgraph.</p>
        <p>
          Both results show that !- and -Unfrozenness belong to P for bipartite
graphs. For the proof of Theorem 12 (see [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]), which establishes the same result
for -Unfrozenness, we need the following lemma.
        </p>
        <p>Lemma 1. Let G be a bipartite graph and u 2 V (G). If (G u) = (G)
then there exists some vertex cover V 0 V (G) with u 2 V 0 and jV 0j = (G).
1,
Theorem 12. For every G 2 B, the problem
-Unfrozenness belongs to P.</p>
        <p>
          The proof of Theorem 12 allows for every nonedge of a bipartite graph to
decide if it is -unfrozen, so -Frozenness is in P for bipartite graphs. By
Gallai's theorem [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], -Unfrozenness is in P for bipartite graphs as well.
Corollary 6. For all G 2 B, -Unfrozenness and -Frozenness are in P.
        </p>
      </sec>
      <sec id="sec-4-10">
        <title>Finally, the next corollary follows by T</title>
        <p>F</p>
        <p>
          Corollary 7. The problems - and -Unfrozenness as well as the problem
-Frozenness belong to P for all trees and forests.
First of all, we recursively de ne co-graphs, following a slightly adjusted de
nition by Corneil et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>De nition 1 (co-graph). The graph G = (fvg; ;) is a co-graph. If G1 and G2
are co-graphs, then G1 [ G2 and G1 + G2 are co-graphs, too.</p>
      </sec>
      <sec id="sec-4-11">
        <title>We denote the set of all co-graphs by C and use the operators [ and + as is</title>
        <p>
          common (see, e.g., [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]). We will use the following result by Corneil et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
Theorem 13. Co-graphs are (i) closed under complements and (ii) closed under
induced subgraphs, but (iii) not closed under subgraphs in general. Furthermore,
G 2 G is a co-graph if and only if G possesses no P4 as an induced subgraph.
        </p>
      </sec>
      <sec id="sec-4-12">
        <title>Property (iii) is not proven in their work [4]. However, C4 2 C is an easy</title>
        <p>example since C4 is a co-graph (see Example 1 below), and removing one edge
yields P4. Since every co-graph can be constructed by [ and +, we can identify
a co-graph by its co-expression.</p>
        <p>Example 1 (co-expression). The co-expression X = (v1 [v3)+(v2 [v4) describes
the graph C4 = (fv1; v2; v3; v4g; ffv1; v2g; fv2; v3g; fv3; v4g; fv4; v1gg).</p>
        <p>
          Obviously, we can build a binary tree for every co-graph via its co-expression.
The tree's leaves correspond to the graph's vertices and the inner nodes of the
tree correspond to the expression's operations. For example, the tree in Figure 1
corresponds to the co-expression from Example 1 and, thus, describes a C4.
Such a tree is called a co-tree. To formulate our results regarding stability and
unfrozenness of co-graphs, we need the following result of Corneil et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
Theorem 14. For every graph G 2 G, we can decide in O(jV (G)j + jE(G)j)
time whether G is a co-graph and, if so, provide a corresponding co-tree.
        </p>
        <p>
          Combining the previous results with the next one by Corneil et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], we
can e ciently determine a co-graph's chromatic number.
        </p>
        <p>
          Theorem 15. Let G 2 G be a co-graph and T the corresponding co-tree. For a
node w from T , denote by G[w] the graph induced by the subtree of T with root w.
To every leave v of T we add as a label (G[v]) = 1. For every inner node w of
T we add, depending on the inner node's type, the following label: (1) If w is a
[-node with children v1 and v2, (G[w]) = maxf (G[v1]); (G[v2])g, and (2) if
w is a +-node with children v1 and v2, (G[w]) = (G[v1]) + (G[v2]). If r is
the root node of T , then it holds that (G[r]) = (G).
A result similar to the previous one for
was given by Corneil et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>Remark 1. We label all leaves of T with (G[v]) = 1. Each inner node w of T
with children v1 and v2 is labeled by (G[w]) = maxf (G[v1]); (G[v2])g if w
contains the +-operation, and by (G[w]) = (G[v1]) + (G[v2]) if w contains
the [-operation. For the root r of T , it then holds that (G[r]) = (G).</p>
        <p>By the previous remark we can e ciently calculate
on these results, we can state the following theorems.
for co-graphs. Based
Theorem 16. For every G 2 C, the problem
-VertexStability is in P.</p>
        <p>With a similar proof as for the previous theorem, we obtain the next result.
Theorem 17. For every G 2 C, the problem
-VertexStability is in P.</p>
        <p>
          We can use the same proof as for Theorem 17 to obtain the next corollary.
However, this time we additionally use Gallai's theorem [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] to calculate out of
for G and all induced subgraphs with one vertex removed.
        </p>
        <p>Corollary 8. For every co-graph, the problem
-VertexStability is in P.</p>
        <p>
          Now, the subsequent corollary follows with Proposition 5(5) by Frei et al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]
because -VertexStability = fG j G 2 !-VertexStabilityg is true and
co-graphs are closed under complements.
        </p>
        <p>Corollary 9. For all G 2 C, the problem !-VertexStability is in P.</p>
        <p>Next, let us study the edge-related stability problems for co-graphs. To obtain
our results, we need the following two auxiliary propositions.</p>
        <p>Proposition 5. Let G 2 C with jV (G)j &gt; 1 and let u 2 V (G) be -critical
for G. There exist two co-graphs G1; G2 such that G = G1 [ G2 or G = G1 + G2.
Assuming, without loss of generality, that u 2 V (G1), u is -critical for G1.
Proposition 6. Let G 2 C and e = fu; vg 2 E(G). If u and v are -critical
for G, then e is -critical for G as well.</p>
        <p>Proof. Let G 2 C be a co-graph and e = fu; vg 2 E(G) an edge with two
-critical vertices u; v 2 V (G). First, we study the case that G = G1 + G2 as well
as u 2 V (G1) and v 2 V (G2) holds. Afterwards, we explain how to generalize
the proof.</p>
        <p>
          From the previous Proposition 5 we know that u must be -critical for G1 and
v -critical for G2. According to Observation 4 from [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] there exists an optimal
coloring c1 : V (G1) ! N for G1, such that for all u~ 2 V (G1) n fug it holds that
c1(u~) 6= c1(u). In other words, there is a coloring c1 for G1, such that u is the
only vertex in G1 of its color. A similar, optimal coloring c2 must exist for G2
with respect to v. For the combined graph with e removed, i.e., G e, according
to Observation 1 from [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], it must hold that (G e) 2 f (G) 1; (G)g.
Consequently, we can reuse c1 and c2 from G1 and G2, assuming distinct colors
sets for c1 and c2, to obtain a legal coloring of G with (G) colors. However,
we can color u in the same color c2(v), as v is colored, and thus obtain a legal
coloring for G e with (G) 1 colors. This is possible because
1. u is the only vertex in G1 colored in c1(u) by de nition of c1,
2. no vertex u~ 2 V (G1)nfug is colored with c2(v), as c1(V (G1))\c2(V (G2)) = ;
holds, and
3. v is the only vertex in G2 with this color, by de nition of c2, and there is no
edge between u and v.
        </p>
        <p>Consequently, after removing e from G, we can color G e with one color less
than before, such that (G e) = (G) 1 holds and e is -critical.</p>
        <p>Initially, we assumed that G = G1 + G2 with u 2 V (G1) and v 2 V (G2)
holds. If G = G1 [ G2, there cannot exist any edge between vertices from G1
and G2. Hence, the only cases left are G = G1 + G2 or G = G1 [ G2 with both
vertices in G1 or G2. Without loss of generality, let us assume that both vertices
are in G1. Following Proposition 5, we know that both vertices are -critical for
G1, as they are -critical for G. When we can show that e is -critical for G1, it
immediately follows that e is also -critical for G. That is because if G = G1 +G2
and e is -critical for G1, we have (G1 e) = (G1) 1, such that
(G
e) = (G1
e) + (G2) = (G1)
1 + (G2) = (G)
1
holds. If G = G1 [ G2, there is one more argument to add. We know that u
and v are -critical for G and G1. Consequently, (G1) &gt; (G2) must hold, as
otherwise, u or v cannot be -critical for G, since (G) = maxf (G1); (G2)g
is true. But then, it is enough to show that e is -critical for G1, since reducing
(G1) by one via removing e also causes a reduction of (G) by one and hence,
e is -critical for G, too.</p>
        <p>At some point, we must arrive in the case that one vertex is in G1 and the
other vertex is in G2 and G = G1 + G2 holds, since the +-operation is the only
possibility to add edges between vertices in co-graphs. q</p>
        <p>Having these results, we are now able to provide our stability-related results.
Theorem 18. For all co-graphs, the problem
-Stability is in P.</p>
        <p>
          Proof. Let G 2 C be a co-graph. We can compute (G) e ciently and,
according to Observation 1 in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], for every edge e 2 E(G) and every vertex v 2 V (G) it
holds that (G e); (G v) 2 f (G) 1; (G)g: Thus, for every edge e 2 E(G),
we proceed as follows to e ciently determine whether e is -critical or -stable
for G: Denote e = fu; vg for u; v 2 V (G). Then it follows that G u and G v
are induced subgraphs of G e and G e is a subgraph of G. According to the
earlier referenced Observation 1, it must hold that
        </p>
        <p>
          (G v); (G u)
| 2f (G){z1; (G)g }
(G
e)
(G):
Hence, if (G v) = (G) or (G u) = (G), which we can compute e ciently,
it immediately follows that (G e) = (G). In other words, if u or v is -stable,
we know that e must be -stable, too.2 If u and v are -critical, it follows by
2 This is in line with Observation 3 from [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
Proposition 6 that e is -critical. Since we can determine for every node in V (G)
e ciently, whether it is -stable, we can also e ciently determine for every edge
in E(G) whether it is -stable. Consequently, we can decide in polynomial time
whether G is -stable. Thus -Stability 2 P for co-graphs follows. q
        </p>
        <p>Next, we want to study the problem of !-Stability for co-graphs. To do so,
we need the following lemmas.</p>
        <p>Lemma 2. Let G 2 C be a co-graph. We can compute all cliques of size !(G)
for G in time polynomial in jGj.</p>
        <p>Lemma 3. Let G 2 G be a graph and v 2 V (G) and e 2 E(G). Then it holds
that !(G v) and !(G e) are in f!(G) 1; !(G)g.</p>
        <p>Having these results, we can show the next theorem.</p>
        <p>Theorem 19. The problem !-Stability is in P for co-graphs.</p>
      </sec>
      <sec id="sec-4-13">
        <title>Proof. Let G 2 C be a co-graph. By Theorem 15 we can compute ! e ciently</title>
        <p>for G and all induced subgraphs. In order to decide whether G is !-stable, we
proceed as follows for every edge e = fu; vg 2 E(G):</p>
        <p>Case 1: G = G1 [ G2 for two co-graphs G1; G2, and either u; v 2 V (G1)
or u; v 2 V (G2) holds, since there are no edges between G1 and G2. Assume
without loss of generality that u; v 2 V (G1). As !(G) = maxf!(G1); !(G2)g,
we e ciently check whether !(G2) !(G1) holds. In this case, we know that
e cannot be critical to G, because even if e would be !-critical to G1, using
Lemma 3, we still have !(G e) = maxf!(G1 e); !(G2)g = maxf!(G1)
1; !(G2)g = !(G2). Otherwise, if !(G1) &gt; !(G2) holds, we study whether e is
!-critical for G1 by recursively selecting the appropriate case, this time with G1
as G. This is su cient because if e is !-critical for G1, it is also !-critical for G.</p>
        <p>Case 2: G = G1 + G2 and u; v 2 V (G1) or u; v 2 V (G2). In this case, it is
su cient to check whether e is !-critical for the partial graph, i.e., G1 or G2,
containing u and v. That is because !(G) = !(G1) + !(G2) holds and so, if e is
!-critical for one of the two partial graphs, e is also critical for G. Once again,
we check this by recursively applying the appropriate case for the corresponding
partial graph.</p>
        <p>Case 3: G = G1 + G2 and u; v are in di erent partial graphs. Assume that
u 2 V (G1) and v 2 V (G2) holds. Now, in order for e to be !-critical, there must
exist only one clique V 0 V (G1) with !(G1) = jV 0j as well as u 2 V 0 and only
one clique V 00 V (G2) with !(G2) = jV 00j and v 2 V 00. We can check both
conditions e ciently using Lemma 2. If this is the case, then all other cliques in
G1 are strictly smaller than V 0 and all other cliques in G2 are strictly smaller
than V 00. Hence, the only clique of size !(G) in G is V 0 [ V 00, containing u and
v. Removing e = fu; vg from G causes !(G) to be reduced by one since there
is only one clique of size !(G) in G, and afterwards, it is missing the edge e in
G e. Therefore, only in this case e is !-critical.</p>
      </sec>
      <sec id="sec-4-14">
        <title>The number of recursive calls is limited by dlog(jV (G)j)e, since every in</title>
        <p>ner node of G's co-expression combines at least two nodes. Every case can be
computed e ciently, such that we can determine for a co-graph G in time in
O(jE(G)j log(jV (G)j) jV (G)jc) for some c 2 N whether G is !-stable.
Consequently, !-Stability is in P for all co-graphs. q</p>
        <p>As we now know that we can e ciently determine whether a given co-graph G
is !-stable, we can exploit the fact that co-graphs are closed under complements
to obtain the following corollary.</p>
        <p>Corollary 10. The problem</p>
        <p>-Stability is in P for co-graphs.</p>
        <p>
          The next corollary follows from Gallai's theorem [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and [6, Proposition 5].
Corollary 11. The problem
        </p>
        <p>-Stability is in P for co-graphs.</p>
        <p>At this point, we nish the study of stability problems for co-graphs, as all
open questions are answered, and turn to the problems related to unfrozenness.
The next two corollaries exploit the fact that co-graphs are closed under
complements and follow a similar argumentation.</p>
        <p>Corollary 12. The problems -Unfrozenness and -Unfrozenness are in
P for co-graphs.</p>
        <p>Corollary 13. The problem !-Unfrozenness is in P for co-graphs.</p>
        <p>Finally, we answer the last remaining open question related to unfrozenness
and co-graphs.</p>
        <p>Theorem 20. The problem</p>
        <p>-Unfrozenness is in P for co-graphs.</p>
        <p>Proof. Let G 2 G be a co-graph and e = fu; vg 2 E(G) a nonedge of G. Since
G has at least two vertices, u and v, either G = G1 + G2 or G = G1 [ G2 for
two co-graphs G1; G2 holds. We handle both cases separately:
1. If G = G1 +G2 is true, then e must belong either to E(G1) or to E(G2), since
ffu; vg j u 2 V (G1); v 2 V (G2)g E(G), such that E(G) = E(G1) [ E(G2).</p>
      </sec>
      <sec id="sec-4-15">
        <title>Without loss of generality assume that e 2 E(G1) holds. If e is -unfrozen</title>
        <p>for G1, i.e., (G1 + e) = (G1), then e is -unfrozen for G, since (G + e) =
(G1 + e) + (G2) = (G1) + (G2) = (G) follows. Contrarily, if e is
frozen for G1, i.e., (G1 + e) = (G1) + 1, then e is -frozen for G as well,
as (G + e) = (G1 + e) + (G2) = (G1) + 1 + (G2) = (G) + 1 holds.
Hence, it is enough to determine whether e is -unfrozen or -frozen for G1
and we can follow the argumentation of this proof recursively for G1.
2. If G = G1 [ G2 is true, e can belong to E(G1); E(G2), or E(G) n (E(G1) [
E(G2)). We split this into two sub-cases:
(a) If e 2 E(G1) or e 2 E(G2), we proceed as follows. Without loss of
generality assume e 2 E(G1). Since (G) = maxf (G1); (G2)g holds,
an increase of (G1) a ects (G) only if (G1) (G2). Otherwise, e is
-unfrozen for G (but not necessarily for G1). If (G1) (G2), then it
holds that if e is -unfrozen for G1, it follows that e is -unfrozen for G,
since (G + e) = maxf (G1 + e); (G2)g = (G1 + e) = (G1) = (G)
is true. Similarly, if e is -frozen for G1, it follows that e is -frozen for
G, since (G + e) = maxf (G1 + e); (G2)g = (G1 + e) = (G1) + 1 =
(G)+1. Consequently, it is enough to determine whether e is -unfrozen
or -frozen for G1 and we can follow the argumentation of this proof
recursively for G1.
(b) If e 2 E(G) n (E(G1) [ E(G2)), then u 2 V (G1) and v 2 V (G2) follows.</p>
        <p>Now, if (G1) = (G2) = 1 is true, it follows that e is -frozen for G,
since (G+e) = 1+1 = 2 &gt; 1 = maxf (G1); (G2)g = (G). Contrarily,
if (G1) &gt; 1 or (G2) &gt; 1, it follows that e is -unfrozen for G since G1
and G2 share no edge but e. Because of that we can arrange the colors
for V (G1) and V (G2) in such a way that both vertices incident to e have
di erent colors, resulting in (G + e) = (G).</p>
      </sec>
      <sec id="sec-4-16">
        <title>Following these cases, we can e ciently determine for every nonedge e 2 E(G)</title>
        <p>whether it is -frozen or -unfrozen for G, resulting in -Unfrozenness 2 P for
all co-graphs. q
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>We have provided 48 tractability results regarding the stability, vertex-stability,
and unfrozenness problems when restricted to special graph classes. In
particular, we studied these three problems for four important graph classes and four
central graph parameters. Doing so, our work provides some baseline for further,
more expanding work along this line of research. For future work, we propose
to study further special graph classes that are not covered here. Besides the
study of stability for other graph classes, one can also study the concept of cost
of stability :3 Given a graph, the question is how costly it is to stabilize it. In
other words, what is the smallest number of vertices or edges to be added to or
removed from the graph such that the resulting graph is stable or unfrozen with
respect to some graph parameter. Relatedly, it would make sense to combine
these two approaches and study the cost of stability for special graph classes.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>
        We thank the anonymous reviewers for helpful comments. This work was
supported in part by Deutsche Forschungsgemeinschaft under grant RO 1202/21-1.
3 Bachrach et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] study a related notion of \cost of stability" for cooperative games.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bachrach</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elkind</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malizia</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meir</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasechnik</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosenschein</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothe</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zuckerman</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Bounds on the cost of stabilizing a cooperative game</article-title>
          .
          <source>Journal of Arti cial Intelligence Research</source>
          <volume>63</volume>
          ,
          <volume>987</volume>
          {
          <fpage>1023</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Berge</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Perfect graphs</article-title>
          .
          <source>In: Six Papers on Graph Theory</source>
          . pp.
          <volume>1</volume>
          {
          <fpage>21</fpage>
          . Indian Statistical Institute (
          <year>1963</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bollobas</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          : Modern Graph Theory. Springer-Verlag (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Corneil</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lerchs</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burlingham</surname>
            ,
            <given-names>L.S.:</given-names>
          </string-name>
          <article-title>Complement reducible graphs</article-title>
          .
          <source>Discret. Appl. Math. 3</source>
          (
          <issue>3</issue>
          ),
          <volume>163</volume>
          {
          <fpage>174</fpage>
          (
          <year>1981</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Corneil</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perl</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stewart</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A linear recognition algorithm for cographs</article-title>
          .
          <source>SIAM Journal on Computing</source>
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <volume>926</volume>
          {
          <fpage>934</fpage>
          (
          <year>1985</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Frei</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          , J.:
          <article-title>Complexity of stability</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          (to appear), conference version appeared in
          <source>the proceedings of the 31st International Symposium on Algorithms and Computation (ISAAC'20)</source>
          ,
          <source>Leibniz International Proceedings in Informatics (LIPIcs)</source>
          , vol.
          <volume>181</volume>
          ,
          <issue>19</issue>
          :1{
          <fpage>19</fpage>
          :
          <fpage>14</fpage>
          ,
          <year>2020</year>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gallai</surname>
          </string-name>
          , T.:
          <article-title>Uber extreme Punkt- und Kantenmengen</article-title>
          . Ann. Univ. Sci. Budapest, Eotvos Sect.
          <source>Math</source>
          <volume>2</volume>
          ,
          <volume>133</volume>
          {
          <fpage>138</fpage>
          (
          <year>1953</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          , J.:
          <article-title>Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP</article-title>
          .
          <source>Journal of the ACM</source>
          <volume>44</volume>
          (
          <issue>6</issue>
          ),
          <volume>806</volume>
          {
          <fpage>825</fpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          , J.:
          <article-title>Raising NP lower bounds to parallel NP lower bounds</article-title>
          .
          <source>SIGACT News</source>
          <volume>28</volume>
          (
          <issue>2</issue>
          ),
          <volume>2</volume>
          {
          <fpage>13</fpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Hemaspaandra</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spakowski</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vogel</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>The complexity of Kemeny elections</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>349</volume>
          (
          <issue>3</issue>
          ),
          <volume>382</volume>
          {
          <fpage>391</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hopcroft</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karp</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>An n5=2 algorithm for maximum matching in bipartite graphs</article-title>
          .
          <source>SIAM Journal on Computing</source>
          <volume>2</volume>
          ,
          <issue>225</issue>
          {
          <fpage>231</fpage>
          (
          <year>1973</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Jackson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Social and
          <string-name>
            <given-names>Economic</given-names>
            <surname>Networks</surname>
          </string-name>
          . Princeton University Press (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Khor</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Application of graph coloring to biological networks</article-title>
          .
          <source>IET Systems Biology</source>
          <volume>4</volume>
          (
          <issue>3</issue>
          ),
          <volume>185</volume>
          {
          <fpage>192</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. Ko}nig, D.:
          <article-title>Grafok es matrixok</article-title>
          .
          <source>Matematikai es Fizikai Lapok</source>
          <volume>38</volume>
          ,
          <issue>116</issue>
          {
          <fpage>119</fpage>
          (
          <year>1931</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Minor</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Urban</surname>
            ,
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A graph-theory framework for evaluating landscape connectivity and conservation planning</article-title>
          .
          <source>Conservation biology 22(2)</source>
          ,
          <volume>297</volume>
          {
          <fpage>307</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Papadimitriou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : Computational Complexity.
          <article-title>Addison-Wesley, second edn</article-title>
          . (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Papadimitriou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yannakakis</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The complexity of facets (and some facets of complexity)</article-title>
          .
          <source>Journal of Computer and System Sciences</source>
          <volume>28</volume>
          (
          <issue>2</issue>
          ),
          <volume>244</volume>
          {
          <fpage>259</fpage>
          (
          <year>1984</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Papadimitriou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zachos</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Two remarks on the power of counting</article-title>
          .
          <source>In: Proceedings of the 6th GI Conference on Theoretical Computer Science</source>
          . pp.
          <volume>269</volume>
          {
          <fpage>276</fpage>
          . Springer-Verlag Lecture Notes in Computer Science #
          <volume>145</volume>
          (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          , J.:
          <source>Complexity Theory and Cryptology. An Introduction to Cryptocomplexity. EATCS Texts in Theoretical Computer Science</source>
          , Springer-Verlag (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Rothe</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spakowski</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vogel</surname>
          </string-name>
          , J.:
          <article-title>Exact complexity of the winner problem for Young elections</article-title>
          .
          <source>Theory of Computing Systems</source>
          <volume>36</volume>
          (
          <issue>4</issue>
          ),
          <volume>375</volume>
          {
          <fpage>386</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>More complicated questions about maxima and minima, and some closures of NP</article-title>
          .
          <source>Theoretical Computer Science</source>
          <volume>51</volume>
          (
          <issue>1</issue>
          {2),
          <volume>53</volume>
          {
          <fpage>80</fpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Bounded query classes</article-title>
          .
          <source>SIAM Journal on Computing</source>
          <volume>19</volume>
          (
          <issue>5</issue>
          ),
          <volume>833</volume>
          {
          <fpage>846</fpage>
          (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Weishaupt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothe</surname>
          </string-name>
          , J.:
          <article-title>Stability of special graph classes</article-title>
          .
          <source>Tech. Rep. arXiv:2106.01496 [cs.CC], arXiv.org (Jun</source>
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>