<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Approximating Optimal Labelings for Temporal Connectivity (Extended Abstract)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Daniele Carnevale</string-name>
          <email>daniele.carnevale@gssi.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gianlorenzo D'Angelo</string-name>
          <email>gianlorenzo.dangelo@gssi.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Olsen</string-name>
          <email>martino@btech.au.dk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Aarhus University</institution>
          ,
          <addr-line>Birk Centerpark 15, 7400, Herning</addr-line>
          ,
          <country country="DK">Denmark</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Gran Sasso Science Institute</institution>
          ,
          <addr-line>Viale Francesco Crispi, 7, L'Aquila, 67100</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Temporal graphs, in which edges are annotated with time-labels indicating their availability at specific time steps, provide a flexible model for dynamic networks. Two nodes are said to be temporally connected if there exists a path between them such that the edges are traversed in strictly increasing order of their time-labels. We study the Minimum Aged Labeling (MAL) problem, which consists of assigning time-labels so that all node pairs are temporally connected within a global deadline , while minimizing the total number of labels used. MAL highlights the trade-of between ensuring temporal connectivity and minimizing the number of edge activations under strict resource constraints. It has significant implications for energy-aware scheduling in domains such as logistics, transportation, and communication, where reducing the number of active time slots can directly translate into lower energy use, reduced emissions, or infrastructure simplification. Our results establish strong inapproximability bounds for MAL: we prove that no algorithm can approximate the minimum number of labels within a factor better than (log ) for  ≥ 2, unless P = NP, and not within 2log1−   for  ≥ 3, unless NP ⊆ DTIME(2polylog()). Subsequently, we develop approximation algorithms that, under certain assumptions, almost match these lower bounds. Notably, the approximation performance depends on the relationship between  and the diameter of the input graph. Moreover, we establish a connection with the classical Diameter Constrained Spanning Subgraph (DCSS) optimization problem on static graphs and prove that our hardness results apply to DCSS.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Temporal graphs</kwd>
        <kwd>Approximation algorithms</kwd>
        <kwd>Scheduling</kwd>
        <kwd>Routing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>We study a scheduling problem on dynamic networks, inspired by practical applications in logistics,
distribution scheduling, and information difusion within social networks. Consider a real-world
scenario of parcel delivery where a warehouse  serves three cities arranged in a star topology. Each
city has parcels destined for the other cities, and for each pair of cities (, ), there is at least one
parcel that must be sent from  to . A fleet of vehicles located at  is responsible for transporting
parcels between the warehouse and the cities. Each vehicle can depart from  at any hour. Upon
arrival at city , a vehicle delivers parcels destined for  that were previously stored at  , collects
parcels originating from , and returns to the warehouse. A round trip from  to a city and back is
referred to as a trip. For simplicity, we assume travel times are negligible. When a vehicle 1 returns
from city  to the warehouse, it deposits all parcels originating from  and destined for other cities.
When another vehicle 2 departs towards city , it carries all parcels currently stored at  with final
destination . If the trip of 1 is scheduled before that of 2, parcels from  to  are successfully
delivered; otherwise, these parcels must wait for the next trip. Performing a thorough scheduling of all
vehicle trips can simultaneously reduce delivery times and operational costs such as the number of
trips, vehicle usage, fuel consumption, and greenhouse gas emissions.</p>
      <p>For example, the 1st schedule in Figure 1 requires 6 trips to deliver all parcels, with the last deliveries
completed at 8 a.m. The 2nd schedule minimizes the latest delivery time, ensuring that all parcels are</p>
      <p>;8am
6am
5am
;7am


delivered by 6 a.m., two hours earlier than in the first schedule, while still requiring 6 trips. The 3 rd
schedule, instead, minimizes the total number of trips, reducing them to 5, but delays the last delivery
to 7 a.m., one hour later than in the second case.</p>
      <p>
        The scheduling problem becomes significantly more complex when considering a general network in
which each vertex can act both as a warehouse and as a city, and where connections between vertices
are represented by an arbitrary graph. Moreover, similar challenges arise in other domains such as
distribution scheduling [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and information spreading, where the goal is to arrange a small number of
meetings among employees of a company so that each individual can share information with any other
within a given time frame (see [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]).
      </p>
      <p>Motivated by these applications, we consider the following question: What is the minimum number
of trips required to deliver all parcels within a given time frame?</p>
      <p>
        We model a schedule of trips along the edges of a given network using a temporal graph, where
the scheduling time of a vehicle is represented as an edge label. A path in this graph is considered
valid (or temporal) only if its edges are traversed in strictly increasing order of their labels. We then
study the optimization problem of assigning the minimum number of labels to the edges of the given
network so that every pair of vertices is connected by a temporal path, and the largest label does not
exceed a given integer , referred to as the maximum allowed age. This problem, called Minimum Aged
Labeling (MAL), was introduced by Mertzios et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], who proved that it is APX-hard on directed
graphs. Later, Klobas et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] showed that MAL is NP-complete even on undirected graphs. To the best
of our knowledge, no previous hardness or approximation algorithm results are known for MAL on
undirected graphs. Furthermore, the reduction used to prove the APX-hardness on directed graphs [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
does not easily extend to the undirected setting, since it relies heavily on edge directions to constrain
vertex reachability. This paper explores the approximability of MAL on undirected graphs, highlighting
how the problem’s approximation complexity varies with respect to the parameters  and the diameter
 of the input graph. MAL also has a theoretical motivation, as it can be seen as a dynamic version
of the classical Diameter Constrained Spanning Subgraph (DCSS) problem. The DCSS problem asks to
ifnd a spanning subgraph  of a graph  such that the diameter of  does not exceed a given integer,
while minimizing the number of edges in .
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        Due to their versatility, temporal graphs have been studied from various perspectives and under diferent
names, such as dynamic, evolving, or time-varying graphs or networks (see [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]). One area that has
attracted significant attention, mainly motivated by virus-spread minimization (e.g., [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]), concerns
the modification of temporal networks to optimize certain objectives; a recent survey is in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Several
types of operations have been considered, including delaying labels and merging consecutive time
steps [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], edge- and label-deletion [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and altering the relative order of time labels [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Furthermore,
Molter et al. [11] analyzed how the choice between edge-deletion and delaying afects the parameterized
complexity of the reachability-minimization objective. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], the authors studied a problem related yet
orthogonal to MAL, where the goal is to minimize the maximum time needed for a subset of vertices
to reach every other vertex by shifting labels. Klobas et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] considered a generalization of MAL in
which only a subset of terminal vertices must be temporally connected within the given maximum
allowed age , and proved its  [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]-hardness when parameterized by the number of labels.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Our results</title>
      <p>This extended abstract outlines our main results on the MAL problem, covering both hardness of
approximation and the design of eficient approximation algorithms. Further details can be found in the
conference version of this work [12], while a full version is available on ArXiv [13]. We denote by 
the diameter of graph .</p>
      <sec id="sec-3-1">
        <title>3.1. Hardness of Approximation</title>
        <p>We begin by showing that, for any fixed maximum labeling age  ≥ 2, the MAL problem cannot be
approximated within a factor better than (log ), unless P = NP. Furthermore, under a diferent
complexity assumption, we prove a stronger inapproximability bound: for any  ∈ (0, 1), there exists
no 2log1−  -approximation algorithm for MAL, unless NP ⊆ DTIME(2polylog()), even when  is fixed
to a value at least 3.</p>
        <p>These results advance our understanding of the computational complexity of MAL in two directions:
from the exact computation perspective and from the approximation point of view.</p>
        <p>
          (1) From the perspective of exact computation, the NP-hardness result in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] applies only when
 =  = 10. In contrast, we prove that MAL remains NP-hard for every fixed  ≥ 2 (still requiring
 = ). This completes the complexity classification of MAL with respect to the parameter , since
the case  = 1 is straightforward. Additionally, our reduction is considerably simpler than that of [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>
          (2) From an approximation standpoint, the reduction in [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] establishes that MAL is APX-hard when
 =  = 9 in directed graphs. We strengthen this result by proving two stronger inapproximability
bounds: first, MAL cannot be approximated within a logarithmic factor unless P = NP; second, under
a stronger complexity assumption, no 2log1−  -approximation algorithm exists for any  ∈ (0, 1).
The latter bound indicates that achieving better than a polynomial-factor approximation is unlikely.
Furthermore, these hardness results are established for undirected graphs (with the condition  = ),
and hold for all fixed values of  ≥ 2 and  ≥ 3, respectively. Finally, we note that the same
inapproximability bounds also apply to DCSS.
        </p>
        <p>A summary of our hardness of approximation results is presented in Table 1.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Approximation Algorithms</title>
        <p>
          As in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] and [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], all our reductions require the condition  = . Thus, we study the approximability
of MAL when  ≥ , addressing an open question posed in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. We present three sets of results that
(√ · log ), for  ∈ Ω(√︀1/3 · log )
        </p>
        <p>( · 1/3), otherwise
(√ · log ), for  ∈ Ω(√︀/ log )
(︀ ( ·  · log2 )1/3)︀ , for  ∈ Ω(log ) ∩ (√︀/ log )
( · 1/3), otherwise
highlight how the approximation guarantees for MAL depend on the relationship between  and .</p>
        <p>(1) We begin by analyzing the case where  is suficiently larger than , the radius of the graph .
Specifically, if  ≥ 2 (resp.,  ≥ 2 + 1), we provide a polynomial-time algorithm that computes a
solution requiring at most 2 (resp., 1) more labels than the optimum. These additive approximation
guarantees translate into asymptotic multiplicative bounds, with approximation factors arbitrarily close
to 1 as the input size increases. Furthermore, if  ≥ 2 + 2, an optimal solution can be computed in
polynomial time. Since MAL does not admit any feasible solution when  &lt; , this first set of results
leaves open the intermediate regime where  ≤  &lt; 2.</p>
        <p>(2) We next consider the case where  is only slightly larger than , leveraging a connection
between MAL and the DCSS problem. Specifically, we show that the approximability of MAL is within a
factor  of that of DCSS. We begin by showing that when  =  = 2, MAL admits a logarithmic-factor
approximation, which asymptotically matches our first inapproximability bound. Note that if  = 2 and
 = 1, the graph must be a clique. In this case,  = 1 and  = 2, so MAL can be solved using at
most 2 labels more than the optimum. For  ≥  + 2, we obtain an ( · 1/2)-approximation,
which is sublinear in  when  is suficiently small. This bound improves as  increases: we achieve
approximation factors of ( · 2/5) and ( · 1/3) for  ≥  + 4 and  ≥  + 6, respectively.
Finally, for any  ≥ , we obtain an approximation factor of ( · 3/5+ ) for any constant
 &gt; 0. All these approximation factors depend linearly on , as our approach approximates DCSS via
generalizations of it, and then transforms the resulting solution into one for MAL.</p>
        <p>(3) Our main algorithmic contribution addresses the case  ≤  &lt; 2, where we approximate
MAL without relying on DCSS, thereby avoiding the linear dependence on  in the approximation
ratio. We show that when  ≥ ⌈ 32 · ⌉ (resp.,  ≥ ⌈ 53 · ⌉), MAL can be approximated within a factor
of (√ log ) (resp., (( log2 )1/3)). Both bounds are sublinear, and the second algorithm
yields better performance when  = (√︀/ log ), although it requires larger values of .</p>
        <p>Table 2 summarizes the approximation guarantees we obtain for MAL.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion and Open Questions</title>
      <p>In this work, we investigated the complexity of approximating the Minimum Aged Labeling problem
(MAL). We established strong hardness of approximation results for the case  = , summarized
in Table 1. When relaxing the parameter to  &gt; , we provided approximation algorithms with
guarantees that depend on the relationship between  and , as detailed in Table 2. Additionally, we
highlighted a connection between MAL and the Diameter Constrained Spanning Subgraph problem,
showing that comparable hardness and approximation results hold for DCSS.</p>
      <p>Several questions remain open. In particular, the computational complexity of MAL when  &lt;
 &lt; 2 + 2 is still unresolved, as our reductions do not seem to extend to cases where  ≥  + 1.
Furthermore, it is unclear whether the inapproximability results for MAL hold when  &lt;  &lt; 2.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The authors utilized ChatGPT and Grammarly to enhance language clarity and readability. The authors,
who take full responsibility for the final version of the manuscript, carefully reviewed and refined all
content generated by these tools.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work was partially supported by: the European Union - NextGenerationEU under the Italian
Ministry of University and Research National Innovation Ecosystem grant ECS00000041 -
VITALITY - CUP: D13C21000430001; PNRR MUR project GAMING “Graph Algorithms and MinINg for
Green agents” (PE0000013, CUP D13C24000430001); the European Union - Next Generation EU under
the Italian National Recovery and Resilience Plan (NRRP), Mission 4, Component 2, Investment 1.3,
CUP J33C22002880001, partnership on “Telecommunications of the Future”(PE00000001 - program
“RESTART”), project MoVeOver/SCHEDULE (“Smart interseCtions witH connEcteD and aUtonomous
vehicLEs”, CUP J33C22002880001); ARS01_00540 - RASTA project, funded by the Italian Ministry of
Research PNR 2015-2020. The first and second authors acknowledge the support of the MUR (Italy)
Department of Excellence 2023–2027.
[11] H. Molter, M. Renken, P. Zschoche, Temporal reachability minimization: Delaying vs. deleting,
Journal of Computer and System Sciences 144 (2024) 103549. doi:10.1016/j.jcss.2024.103549.
[12] D. Carnevale, G. D’Angelo, M. Olsen, Approximating optimal labelings for temporal connectivity,
Proceedings of the AAAI Conference on Artificial Intelligence 39 (2025) 26490–26497. doi: 10.
1609/aaai.v39i25.34849.
[13] D. Carnevale, G. D’Angelo, M. Olsen, Approximating optimal labelings for temporal connectivity,
2025. URL: https://arxiv.org/abs/2504.16837. arXiv:2504.16837.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Deligkas</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Potapov</surname>
          </string-name>
          ,
          <article-title>Optimizing reachability sets in temporal graphs by delaying</article-title>
          ,
          <source>Proceedings of the AAAI Conference</source>
          (
          <year>2020</year>
          )
          <fpage>9810</fpage>
          -
          <lpage>9817</lpage>
          . doi:
          <volume>10</volume>
          .1609/AAAI.V34I06.6533.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Deligkas</surname>
          </string-name>
          , E. Eiben, G. Skretas,
          <article-title>Minimizing reachability times on temporal graphs via shifting labels</article-title>
          ,
          <source>in: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI-23</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>5333</fpage>
          -
          <lpage>5340</lpage>
          . doi:
          <volume>10</volume>
          .24963/ijcai.
          <year>2023</year>
          /592.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Mertzios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Michail</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Spirakis</surname>
          </string-name>
          ,
          <article-title>Temporal network optimization subject to connectivity constraints</article-title>
          ,
          <source>Algorithmica</source>
          <volume>81</volume>
          (
          <year>2019</year>
          )
          <fpage>1416</fpage>
          -
          <lpage>1449</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00453-018-0478-6.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Klobas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. B.</given-names>
            <surname>Mertzios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Molter</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. G. Spirakis,</surname>
          </string-name>
          <article-title>The complexity of computing optimum labelings for temporal connectivity</article-title>
          ,
          <source>Journal of Computer and System Sciences</source>
          <volume>146</volume>
          (
          <year>2024</year>
          )
          <article-title>103564</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jcss.
          <year>2024</year>
          .
          <volume>103564</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Michail</surname>
          </string-name>
          ,
          <article-title>An introduction to temporal graphs: An algorithmic perspective*</article-title>
          ,
          <source>Internet Mathematics 12</source>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1080/15427951.
          <year>2016</year>
          .
          <volume>1177801</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Braunstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ingrosso</surname>
          </string-name>
          ,
          <article-title>Inference of causality in epidemics on temporal contact networks</article-title>
          ,
          <source>Scientific Reports</source>
          <volume>6</volume>
          (
          <year>2016</year>
          )
          <article-title>27538</article-title>
          . doi:
          <volume>10</volume>
          .1038/srep27538.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Enright</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Kao</surname>
          </string-name>
          , Epidemics on dynamic networks,
          <source>Epidemics</source>
          <volume>24</volume>
          (
          <year>2018</year>
          )
          <fpage>88</fpage>
          -
          <lpage>97</lpage>
          . doi:
          <volume>10</volume>
          .1016/ j.epidem.
          <year>2018</year>
          .
          <volume>04</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Meeks</surname>
          </string-name>
          ,
          <article-title>Reducing reachability in temporal graphs: Towards a more realistic model of real-world spreading processes</article-title>
          , in: Revolutions and Revelations in Computability, Springer International Publishing, Cham,
          <year>2022</year>
          , pp.
          <fpage>186</fpage>
          -
          <lpage>195</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -08740-0_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Enright</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Meeks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. B.</given-names>
            <surname>Mertzios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Zamaraev</surname>
          </string-name>
          ,
          <article-title>Deleting edges to restrict the size of an epidemic in temporal networks</article-title>
          ,
          <source>Journal of Computer and System Sciences</source>
          <volume>119</volume>
          (
          <year>2021</year>
          )
          <fpage>60</fpage>
          -
          <lpage>77</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jcss.
          <year>2021</year>
          .
          <volume>01</volume>
          .007.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Enright</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Meeks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Skerman</surname>
          </string-name>
          ,
          <article-title>Assigning times to minimise reachability in temporal graphs</article-title>
          ,
          <source>Journal of Computer and System Sciences</source>
          <volume>115</volume>
          (
          <year>2021</year>
          )
          <fpage>169</fpage>
          -
          <lpage>186</lpage>
          . doi:
          <volume>10</volume>
          .1016/J.JCSS.
          <year>2020</year>
          .
          <volume>08</volume>
          . 001.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>