Fact-checked by Grok 2 weeks ago

Subgraph isomorphism problem

The subgraph isomorphism problem is a classic in that determines whether a given H (the pattern ) is isomorphic to a of another given G (the target ), meaning there exists an injective mapping from the vertices of H to the vertices of G that preserves adjacency relations between edges in H. This problem requires finding a copy of H embedded within G, where the mapping ensures that every edge in H corresponds to an edge in G, but G may contain additional edges or vertices not involved in the mapping. A variant, known as the induced subgraph isomorphism problem, additionally requires that non-edges in H map to non-edges in G, enforcing a stricter structural match. The problem is NP-complete in general, as established through a reduction from the , placing it among the hardest problems in when both H and G are part of the input. For fixed-size pattern graphs H with k vertices, it admits a polynomial-time running in O(n^k) time, where n is the number of vertices in G, via brute-force enumeration of possible mappings, though this becomes impractical for large k. More efficient approaches leverage advanced techniques, such as with pruning (e.g., the VF2 ), (e.g., LAD and GLASGOW solvers), and color refinement for filtering candidate mappings, often achieving practical performance on real-world instances despite the worst-case exponential complexity. Subgraph isomorphism generalizes several well-known NP-complete problems, including finding a maximum (where H is a ), an induced independent set (where H is an empty graph), and a Hamiltonian path or cycle (where H is a or ). It plays a central role in , where the parameter k (size of H) allows fixed-parameter tractable algorithms, and in structural through invariants like that bound its formula complexity. In practice, the problem arises in diverse applications, such as pattern detection in large-scale databases for querying structural motifs, molecular similarity searches in biochemistry to identify substructures in chemical compounds, in by matching template graphs to image representations, and verification in to detect forbidden configurations in system models.

Problem Definition and Variants

Decision Version

The subgraph isomorphism problem, in its decision version, asks whether a given H = (V_H, E_H) is isomorphic to a subgraph of another G = (V_G, E_G). Formally, the instance consists of two undirected s G and H, and the question is whether G contains a isomorphic to H. This is equivalent to determining the existence of an injective mapping f: V_H \to V_G such that for every edge (u, v) \in E_H, the pair (f(u), f(v)) \in E_G. This mapping preserves the edges of H but does not require preservation of non-edges, distinguishing the standard (non-induced) subgraph isomorphism from the induced variant, where the mapping must also ensure that non-adjacent vertices in H map to non-adjacent vertices in G. The problem was first studied in the as part of early work in computational . A basic yes instance occurs when H is a path graph of length 3 (vertices connected as a-b-c-d) and G is a cycle graph of length 4 (a square); here, the path embeds directly along three consecutive edges of the cycle. In contrast, a no instance arises if H is a triangle (complete graph K_3) and G is a path graph of length 3, as G lacks any cycle and thus cannot contain a triangular subgraph. These examples illustrate how the problem captures in graphs, such as detecting specific motifs in network structures.

Search Version

The search version of the subgraph isomorphism problem requires identifying one or all injective mappings from the vertices of a pattern H to those of a target G that preserve adjacency, thereby explicitly constructing the isomorphic subgraphs. Formally, given undirected graphs H = (V_H, E_H) and G = (V_G, E_G), a solution is an f: V_H \to V_G such that for every edge \{u, v\} \in E_H, the pair \{f(u), f(v)\} is an edge in E_G. This extends the decision version, which merely checks for the existence of such a , by outputting the actual correspondences. The enumeration complexity of this problem is inherently output-sensitive, as the time required grows with the number of distinct isomorphisms, which can be exponentially large even for moderate-sized inputs. In dense graphs, such as complete graphs or Erdős–Rényi random graphs with high edge probability, the number of subgraph isomorphisms for a fixed pattern H with |V_H| = k can reach \Theta(n^k / \mathrm{Aut}(H)), where n = |V_G| and \mathrm{Aut}(H) is the size of H's ; this yields exponential growth in k relative to the input size when k is not constant. Such explosive growth underscores the challenge of full enumeration in worst-case scenarios. In practical applications involving large graphs, managing multiple solutions is critical to avoid redundancy and inefficiency, often employing canonical labeling techniques to assign unique representations to isomorphic s and thereby eliminate duplicates during enumeration. Closely related, the problem of counting the number of distinct subgraph isomorphisms—without explicitly listing them—is #P-complete, highlighting the computational hardness even for mere quantification.

Induced Subgraph Isomorphism

The induced subgraph isomorphism problem requires a stricter mapping than the standard subgraph isomorphism, preserving not only edges but also the absence of edges between vertices in the pattern graph. Formally, given undirected graphs H = (V_H, E_H) and G = (V_G, E_G), an induced subgraph isomorphism is an f: V_H \to V_G such that for all distinct vertices u, v \in V_H, (u, v) \in E_H if and only if (f(u), f(v)) \in E_G. This ensures that the image f(H) is an of G, meaning no extraneous edges exist between the mapped vertices in G beyond those specified in H. This variant differs fundamentally from the non-induced (or monotone) subgraph isomorphism, which only mandates that edges in H map to edges in G, permitting additional edges in G among the images of V_H. For instance, consider H as a graph with two isolated vertices (no edge between them); a non-induced mapping succeeds with any pair of vertices in G, while an induced mapping requires a pair of non-adjacent vertices in G. Similarly, if H includes a path of length 1 (two connected vertices) and an isolated vertex, a non-induced mapping might select images where the isolated vertex connects to one endpoint in G, but an induced mapping forbids such connections, ensuring the isolated vertex remains disconnected from the path's images. These distinctions highlight how induced mappings enforce structural fidelity, preventing "loose" embeddings that ignore non-edges. The isomorphism problem is NP-complete, matching the complexity of its non-induced counterpart. This hardness follows from reductions such as the independent set problem, which can be viewed as seeking an induced matching to an empty graph (a collection of isolated vertices), requiring mutually non-adjacent vertices in G. In contexts like analysis, isomorphism is particularly relevant for exact in cheminformatics, where the notation often denotes a query H into a target G without spurious bonds. For example, searching for a ring (a of six vertices with specific bonds and no chords) as an ensures the matched substructure in G lacks additional intra-ring connections, accurately identifying unaltered motifs in chemical databases. This preserves the topological integrity essential for applications in and structure elucidation.

Graph Isomorphism

is a fundamental problem in that asks whether there exists a f: V(G) \to V(H) between the vertex sets of two finite, undirected graphs G = (V(G), E(G)) and H = (V(H), E(H)) such that for every pair of vertices u, v \in V(G), the edge uv \in E(G) if and only if f(u)f(v) \in E(H). This bijection preserves both adjacency and non-adjacency, ensuring the graphs are structurally identical up to relabeling of vertices. When the graphs G and H have the same number of vertices, the is equivalent to the subgraph isomorphism problem restricted to cases where the pattern graph matches the entire target graph in size. The subgraph isomorphism problem generalizes , as the latter arises as a special case when the pattern graph H has exactly as many vertices as the target graph G, requiring a full mapping rather than a partial . In this sense, solving for G and H with |V(G)| = |V(H)| determines whether H is isomorphic to a subgraph of G that spans all vertices. The problem belongs to the complexity class GI, which consists of problems polynomial-time Turing-reducible to it, and it is GI-complete, meaning it is among the hardest problems in this class. Historically, the problem traces back to applications in chemical structure comparison in the 1950s, with early algorithmic efforts in the 1960s, but significant progress came in 2015 when László Babai announced a quasipolynomial-time algorithm running in \exp((\log n)^{O(1)}) time, improving upon subexponential bounds and placing it outside known NP-complete problems while not yet confirming polynomial-time solvability. For specific graph classes, can be solved efficiently. For example, admit a linear-time based on bottom-up labeling of subtrees, where vertices are assigned codes reflecting the structure of their descendant subtrees, allowing checks by comparing root codes. This contrasts with general graphs, where no polynomial-time is known despite Babai's quasipolynomial , highlighting how structural restrictions like acyclicity enable tractable solutions while arbitrary leads to greater computational challenges.

Subgraph Containment and Minor Problems

The subgraph isomorphism problem determines whether there exists an injective mapping from the vertices of a graph H (the pattern) to the vertices of a graph G (the target) that preserves adjacency, i.e., H is isomorphic to a subgraph of G. This is the non-induced variant, allowing extra edges in the induced subgraph of G on the image vertices (the induced variant requires no extra edges). A key related problem is graph minor containment, where a graph H is a minor of G if H can be obtained from G by a sequence of edge deletions, vertex deletions, and edge contractions (merging adjacent vertices into a single vertex while preserving edges). Edge contraction allows for more flexible embeddings than subgraph isomorphism, as it permits the "smoothing" of paths into single edges, effectively allowing multiple vertices in G to map to a single vertex in H. This makes minor containment a coarser relation: every subgraph isomorphic to H implies H is a minor of G, but the converse does not hold, as contractions can create structures not present as direct subgraphs. Topological containment, or the topological minor problem, further relaxes the structure: H is a topological minor of G if G contains a subdivision of H as a , where subdivision replaces edges of H with paths of arbitrary length. Unlike general minors, topological minors focus on homeomorphic embeddings without contractions that merge branches, preserving the branching structure of H more strictly. This distinction is evident in Wagner's theorem, which characterizes planar graphs as those excluding K_5 or K_{3,3} as minors, generalizing Kuratowski's theorem for topological minors and highlighting how contractions make minor testing more permissive yet structurally deeper. The computational complexity of these problems diverges significantly. Subgraph isomorphism is NP-complete in general, but minor containment is also NP-complete when both G and H are part of the input. However, for a fixed H, the Robertson-Seymour theorem guarantees that testing whether H is a minor of G can be done in polynomial time, as the set of forbidden minors for any minor-closed family is finite, enabling efficient algorithmic checks via dynamic programming on tree decompositions. Topological minor testing shares similar hardness for variable H but admits fixed-parameter tractable algorithms for bounded treewidth graphs. A classic example illustrates these differences: while a G cannot contain K_5 as a (due to exceeding the maximum edges in a planar ), it also excludes K_5 as a by , as any would still violate planarity. In contrast, a subdivided K_5 (topological ) would require explicit paths for each , making detection stricter than general minor testing in dense graphs. These concepts underpin structural , with applications in analyzing and rigidity.

Computational Complexity

NP-Completeness Proofs

The decision version of the subgraph isomorphism problem belongs to . Given an instance consisting of a pattern H = (V_H, E_H) and a target G = (V_G, E_G), a can guess an injective mapping f: V_H \to V_G and verify in time that it is edge-preserving, i.e., for every (u, v) \in E_H, the pair (f(u), f(v)) \in E_G. This verification checks |E_H| edges and ensures injectivity by comparing the |V_H| images, both taking O(|V_G|^2) time in the worst case. To establish NP-hardness, a polynomial-time reduction from the (known to be NP-complete) is used. Consider an instance of clique: a G = (V_G, E_G) with n = |V_G| vertices and an integer k \leq n, asking whether G contains a of size k. Construct the pattern H as the K_k on k vertices (with \binom{k}{2} edges) and use G as the target . This construction requires O(k^2) time to build H. The instance (G, k) is a yes-instance for clique if and only if H is isomorphic to a of G, since a k- in G induces all edges of K_k and vice versa. If k > n, both are no-instances, as G cannot contain K_k. Thus, subgraph isomorphism is . The of subgraph isomorphism was formally proven by Garey and Johnson in their seminal monograph, where it is cataloged as problem GT48 and the above reduction is outlined.

Parameterized and Query Complexity

The subgraph isomorphism problem is fixed-parameter tractable (FPT) when parameterized by the size k = |V(H)| of the pattern H. A basic algorithm achieves this by enumerating all possible mappings from vertices of H to vertices of the host G with n vertices and verifying the edges, yielding a running time of O(n^k \cdot k^2) after accounting for adjacency checks. More refined approaches, such as those using dynamic programming over decompositions, improve the dependence on k but retain the single-exponential form in n. In the query complexity model, where access to the graph is provided via an oracle for edge queries, the randomized decision tree complexity for subgraph isomorphism has a lower bound of \Omega(n^{3/2}). This bound, established by Gröger, holds for any fixed pattern graph and applies even in the adaptive randomized setting. A complexity dichotomy for subgraph isomorphism on graphs excluding a fixed connected forbidden subgraph H (i.e., H-subgraph-free graphs) was established by Bodlaender et al. in 2019, classifying it as polynomial-time solvable or NP-hard for all connected H except the open cases of H = P_5 (path on 5 vertices) and H = 2P_5 (two disjoint paths on 5 vertices each). Recent theoretical frameworks, such as the 2025 complexity framework for forbidden subgraphs by Duffus et al., generalize these dichotomies to broader classes of graph problems on graphs free of a fixed finite set of forbidden subgraphs, though open cases persist for specific instances like subgraph isomorphism. The NP-hardness of subgraph isomorphism implies that, unless P = NP, the optimization problem of finding the maximum number of vertex-disjoint copies of H in G (known as H-packing) is NP-hard and inapproximable to within a factor of n^{1-\epsilon} for any \epsilon > 0 in general.

Algorithms and Solvers

Exact Backtracking Algorithms

Exact backtracking algorithms solve the subgraph isomorphism problem by systematically exploring all possible vertex mappings between the pattern graph H and the target graph G using , ensuring that partial mappings preserve the graph structure at each step. These algorithms attempt to assign each in H to a candidate in G, verifying adjacency and non-adjacency conditions (for induced variants) or just adjacency (for non-induced). If a partial mapping violates the isomorphism requirements, the algorithm to the previous decision point and tries an alternative assignment. This exhaustive enumeration guarantees correctness but incurs high computational cost due to the large search space. A foundational example is Ullmann's algorithm, introduced in 1976, which employs branch-and-bound augmented with a compatibility for efficient pruning. The algorithm initializes a M^0 where M^0_{i,j} = 1 if the of j in G is at least the of i in H, otherwise 0, thereby restricting initial candidates to degree-compatible pairs. During the search, it refines this iteratively using the adjacency matrices of both graphs: for each potential mapping M_{i,j} = 1, it checks if every neighbor x of i in H has at least one compatible neighbor y of j in G, eliminating incompatible entries via the condition \forall x (a_{i x} = 1 \implies \exists y (M_{i y} \cdot b_{j y} = 1)), where a and b are adjacency matrices. are ordered by decreasing to prioritize promising branches and enhance early pruning. The proceeds by fixing mappings row-by-row in this , exploring the tree of depth |V(H)| until a complete is found or all possibilities are exhausted. Further optimizations in basic backtracking frameworks, including Ullmann's, involve degree sequence matching as a preprocessing step to align the multisets of degrees between H and candidate subgraphs of G, immediately ruling out mismatches without search. Additional refinements, such as ordering by degree and look-ahead checks during partial assignments, reduce the effective . The worst-case remains exponential, specifically O(|V(G)|^{|V(H)|}), reflecting the depth-|V(H)| search tree with branching up to |V(G)|, though pruning often yields practical performance for sparse graphs. Despite these enhancements, exact backtracking algorithms are limited by their exponential scaling, making them feasible primarily for small pattern graphs with |V(H)| \leq 10 in moderately sized targets, beyond which the search space becomes intractable even with optimizations.

Advanced and Heuristic Approaches

The VF2 algorithm, introduced by Cordella et al. in 2004, represents a significant advancement over earlier backtracking methods like Ullmann's by incorporating sophisticated look-ahead rules and feasibility checks to prune the search space more effectively. These enhancements allow VF2 to handle larger graphs by performing semantic feasibility tests that verify partial mappings early, reducing unnecessary explorations, and it has been widely adopted in tools like NetworkX for subgraph matching tasks. VF2's state-matching strategy further optimizes by selecting the next vertex pair based on compatibility, achieving better performance on dense graphs compared to basic backtracking. Building on paradigms, the Glasgow Subgraph Solver, developed by McCreesh et al. in 2020, employs lazy clause generation to tackle challenging induced and non-induced isomorphism variants. This solver integrates bit-parallel propagation for all-different constraints and dynamic variable ordering, enabling it to solve hard instances that are intractable for traditional backtrackers. By generating nogoods during search failures, it avoids redundant computations and has demonstrated superior speed on benchmark suites like those from the Parameterized Algorithms and Computational Experimentation challenge. Heuristic approaches often leverage graph invariants, such as eigenvalues of the adjacency matrix, to prune candidate mappings in large-scale instances where exact methods falter. For example, eigen decomposition pruning compares spectral properties of subgraphs to eliminate incompatible nodes early, significantly reducing search space in networks with millions of edges. Approximation heuristics like simulated annealing explore solution spaces probabilistically by iteratively perturbing partial isomorphisms and accepting suboptimal moves with decreasing probability, yielding near-optimal mappings for applications requiring speed over exactness. Symmetry breaking techniques, prominent in 2020s developments, mitigate redundant searches by imposing constraints that eliminate automorphic equivalent states in the pattern graph. In solvers like SymmPi (), coarse-grained symmetry removal identifies and fixes axisymmetric substructures, avoiding duplicate explorations and accelerating matching on symmetric queries by orders of magnitude. These methods, often integrated with , have enabled practical solving of instances up to 1,000 pattern vertices.

Applications

Cheminformatics and Drug Discovery

In cheminformatics, the subgraph isomorphism problem serves as a foundational for substructure search, enabling the identification of specific functional groups or molecular fragments within large compound databases by determining if a query is isomorphic to a subgraph of a target . This approach is essential for screening vast libraries of chemical structures, where exact matching ensures that the queried substructure, including types and connections, is precisely embedded in the larger . For instance, algorithms like VF2, implemented in open-source libraries, facilitate efficient enumeration of matches while handling the combinatorial challenges inherent to molecular graphs. Integration of subgraph isomorphism into SMILES-based systems, such as the RDKit cheminformatics toolkit, supports workflows by allowing rapid querying of substructures in molecular databases represented as SMILES strings. RDKit's GetSubstructMatch function employs subgraph isomorphism to detect embedded patterns, enabling chemists to filter compounds for desired motifs during lead optimization and . This capability is particularly valuable in early-stage , where it accelerates the prioritization of candidates from millions of virtual compounds without exhaustive enumeration. In , subgraph isomorphism underpins matching, where query graphs represent key interaction features like donors or hydrophobic regions, and isomorphism verifies their presence in potential ligands. For embeddings, extensions incorporate spatial constraints into the graph model, allowing alignment of pharmacophoric points while preserving topological isomorphism for accurate identification. Tools like Pharmer employ exact pharmacophore search with spatial indexing for screening, achieving precision comparable to approximate methods while outperforming them in speed for diverse molecular libraries. The impact of these applications is evident in accelerated efforts, such as during the in the 2020s, where subgraph isomorphism facilitated pharmacophore-based to existing drugs by matching antiviral motifs to SARS-CoV-2 targets. By focusing on variants for strict bond preservation, such methods ensured reliable predictions of binding efficacy in repurposing pipelines.

Bioinformatics and

In bioinformatics, the subgraph isomorphism problem plays a crucial role in analyzing protein-protein interaction (PPI) networks, where it facilitates the identification of recurring structural patterns known as . These motifs, such as feed-forward loops or dense overlapping interactomes, represent fundamental building blocks of cellular processes and are detected by searching for subgraphs that match predefined or statistically overrepresented patterns within large PPI graphs. For instance, in signaling pathways, subgraph isomorphism algorithms enumerate and count occurrences of motifs like the bifan or diamond structures, which are enriched in pathways regulating and , providing insights into evolutionary conservation and functional modules. Beyond protein networks, subgraph isomorphism extends to for community detection, where it identifies densely connected subgroups exhibiting isomorphic structures across different graphs. This approach uncovers hidden communities by matching subgraph patterns that represent social roles or interaction cliques, enabling the detection of overlapping groups in platforms like or communication networks. In criminal or adversarial social graphs, isomorphic subgraph matching has been applied to delineate communities based on shared structural signatures, such as hierarchical or star-like formations, aiding in for applications. A prominent application involves aligning metabolic pathways across , where subgraph isomorphism maps conserved subnetworks to reveal evolutionary relationships and functional analogies. Tools like SubMAP employ subgraph mappings to align pathways by identifying isomorphic substructures between genomes, such as those in and , highlighting shared reaction sequences despite topological variations. This alignment supports by quantifying pathway similarities, with metrics showing up to 40-60% conservation in core metabolic modules across distant . Biological networks often present challenges due to noisy data from experimental inaccuracies, such as false positives in edges or incomplete pathway annotations, necessitating approximate subgraph matching techniques over exact . These approximations tolerate edge perturbations or vertex mismatches, as seen in tools like , which compute similarity scores for robust detection in imperfect graphs, addressing scalability issues in networks with thousands of nodes. Heuristic algorithms, such as those incorporating symmetry-breaking, further enable efficient handling of these large, noisy datasets without exhaustive .

Recent Advances

Quantum and Approximation Methods

Recent proposals have explored quantum frameworks for over s, with applications to problems related to the subgraph isomorphism problem. A 2024 framework adapts Grover's within variational quantum circuits, encoding structures using logarithmic qubits for approximate solutions to problems with linear constraints, such as the traveling salesman problem (TSP) and maximum independent set (MIS). It references a variational method for unweighted isomorphism using logarithmic qubits. By leveraging Grover's quadratic speedup—reducing search time from O(n) to —the approach supports these applications via representations and phase estimation techniques. Simulations indicate resource efficiency with O(2 log n + log log w) qubits and O(n² log w) circuit depth, offering advantages over classical exponential-time methods for medium-sized instances up to around 20 vertices. In 2025, further advances include a for weighted isomorphism in molecular , formulating the problem as matching a to a protein pocket grid, demonstrating practical utility in biochemistry. For approximations, uncertainty-aware methods provide robust solutions for inexact subgraph isomorphism in noisy or unlabeled settings. A 2022 approach extracts a minimal topology-preserving from the query , then identifies feasible correspondences in the using topological constraints. A consensus-based expansion step follows, pairing unique paths based on boundary commutativity to refine matches while handling real-valued edge weights, measurement noise up to approximately 10%, and . This two-step process achieves sub-linear and demonstrates statistical robustness on benchmarks like Erdős–Rényi random graphs and image datasets, including low error rates on KITTI stereo images (0.43° rotation, 0.95 m ). It outperforms traditional solvers in uncertain environments by reducing matching errors under tested noise levels. For dense graphs, matching heuristics integrated with these approaches offer practical error bounds, approximating within a factor related to density while avoiding exhaustive search. More recent 2025 developments include GNN-based frameworks like HFrame, which combines algorithms and for , improving matching efficiency and accuracy on large graphs. Performance evaluations highlight quantum methods' potential for speedup in specific instances, such as sparse graphs with linear constraints, where adaptations yield up to √N acceleration over classical for N possible mappings. In contrast, methods excel in for large, noisy networks, though they trade exactness for efficiency in dense cases. These advancements from 2022 to 2025 underscore ongoing efforts to mitigate the of subgraph isomorphism through hybrid quantum-classical and paradigms.

Complexity Frameworks for Restricted Cases

The complexity of the subgraph isomorphism problem on graphs restricted by forbidden subgraphs has been advanced through meta-frameworks that classify solvability based on structural properties of the forbidden set \mathcal{H}. These frameworks, developed in a series of works from 2023 to 2025, establish dichotomies for various graph problems, including , on \mathcal{H}-subgraph-free graphs—graphs containing no member of \mathcal{H} as a subgraph. A central result is that the problem is polynomial-time solvable if the class of \mathcal{H}-subgraph-free graphs has bounded , enabling dynamic programming or monadic second-order (MSO) logic-based solutions, and NP-complete otherwise, due to the presence of high-treewidth obstructions like large grids or expanders. The bounded-treewidth condition holds when \mathcal{H} includes a graph from a specific set \mathcal{S}, consisting of disjoint unions of subdivided claws (subdivisions of K_{1,3}) and paths, as these forcings eliminate branching and depth that lead to unbounded treewidth. For subgraph isomorphism restricted to such classes, algorithms exploit the tree decomposition to achieve linear-time solvability for fixed patterns via Courcelle's theorem, which guarantees fixed-parameter tractability in the treewidth. This framework explains numerous prior results and has been applied to problems like Steiner Forest and Multiway Cut, confirming polynomial solvability precisely when \mathcal{H} satisfies the structural condition. Open problems center on refining these dichotomies, particularly for bipartite forbidden graphs in \mathcal{H}. When the forbidden H \in \mathcal{H} is bipartite—such as short paths like P_4—the corresponding classes often have bounded , yielding polynomial-time algorithms for subgraph isomorphism, as seen in minor-exclusion results where exclusion of subgraphs of P_4 allows linear-time . However, for longer bipartite paths like P_5 or disjoint unions like $2P_5, the complexity remains open, with conjectures suggesting due to unbounded in the classes, while non-bipartite H (containing odd cycles) typically lead to harder cases unless covered by \mathcal{S}. These gaps highlight the need for complete characterizations of bipartite obstructions. Symmetry considerations in restricted classes, such as bounded-degree graphs, further refine the frameworks by allowing symmetry-breaking techniques to simplify isomorphism checks within the search. In bounded-degree \mathcal{H}-free graphs, canonical representations reduce the effective space, faster and leading to improved exponential-time hypotheses for hard cases. Recent 2020–2025 developments emphasize MSO expressibility: on bounded-treewidth \mathcal{H}-free classes, subgraph isomorphism for patterns expressible in MSO (e.g., fixed ) is solvable in linear time, with extensions exploring quantitative MSO for approximation bounds and connections to logic-based .

References

  1. [1]
    [PDF] 1 Subgraph Isomorphism - Stanford CS Theory
    Sep 28, 2016 · Each of these is an instance of the subgraph isomorphism problem that we will define below. Definition 1.1. Let H = (VH,EH) and G = (V,E) be ...Missing: complexity | Show results with:complexity
  2. [2]
    [PDF] COMPUTERS AND INTRACTABILITY A Guide to the Theory of NP ...
    In essence, one proves a new problem to be NP-complete by polynomially reducing a known NP-complete problem to it. ... the SUBGRAPH ISOMORPHISM problem, for ...
  3. [3]
    [PDF] Portfolios of Subgraph Isomorphism Algorithms
    Subgraph isomorphism is a computationally challenging problem with important practical applications, for example in computer vision, biochemistry, and model ...
  4. [4]
    [PDF] Tree-depth and the Formula Complexity of Subgraph Isomorphism
    Apr 28, 2020 · This invariant has a number of equivalent characterizations and plays a major role in structural graph theory and parameterized complexity [10].
  5. [5]
    A Comprehensive Survey and Experimental Study of Subgraph ...
    Mar 26, 2024 · Subgraph matching is a fundamental problem in graph analysis. In recent years, many subgraph matching algorithms have been proposed, making it ...
  6. [6]
  7. [7]
  8. [8]
    [PDF] Frequent Subgraph Discovery∗ - UNC Computer Science
    Dec 1, 2001 · It is easy to see that computing canonical labels is equivalent to determining isomorphism between graphs, because if two graphs are isomorphic ...
  9. [9]
    Towards Subgraph Isomorphism Counting with Graph Kernels - arXiv
    May 13, 2024 · Subgraph isomorphism counting is known as #P-complete and requires exponential time to find the accurate solution. Utilizing representation ...
  10. [10]
    [PDF] Understanding the Complexity of Induced Subgraph Isomorphisms
    In this paper we settle the complexity of the restricted induced sub- graph isomorphism problem by giving a further dichotomy. ... problems cannot be given by ...
  11. [11]
    Induced Subgraph Isomorphism on proper interval and bipartite ...
    Given two graphs G and H as input, the Induced Subgraph Isomorphism (ISI) problem is to decide whether G has an induced subgraph that is isomorphic to H.
  12. [12]
    Systematic benchmark of substructure search in molecular graphs
    Jul 31, 2012 · An induced subgraph isomorphism between a query graph G1 and a target graph G2 exists if G1 is isomorphic to an induced subgraph of G2, i.e. ...
  13. [13]
    The Graph Isomorphism Problem - Communications of the ACM
    Nov 1, 2020 · Graph isomorphism (GI) gained prominence in the theory community in the 1970s, when it emerged as one of the few natural problems in the ...
  14. [14]
    Solving Graph Isomorphism Problem for a Special case - arXiv
    Nov 22, 2017 · Abstract:Graph isomorphism is an important computer science problem. The problem for the general case is unknown to be in polynomial time.Missing: survey | Show results with:survey
  15. [15]
    [PDF] Graph Isomorphism Completeness for Perfect Graphs and ...
    It is known that the GI problem is GI-complete for some special graph classes including regular graphs, bipartite graphs, chordal graphs and split graphs. In ...
  16. [16]
    [1512.03547] Graph Isomorphism in Quasipolynomial Time - arXiv
    Dec 11, 2015 · The paper shows the Graph Isomorphism problem can be solved in quasipolynomial time, using group theoretic "local certificates" and ...
  17. [17]
    The Design and Analysis of Computer Algorithms - Semantic Scholar
    This text introduces the basic data structures and programming techniques often used in efficient algorithms, and covers use of lists, push-down stacks, ...
  18. [18]
    Graph Minor -- from Wolfram MathWorld
    A graph H is a minor of a graph G if a copy of H can be obtained from G via repeated edge deletion and/or edge contraction.
  19. [19]
    [PDF] 12 Graph Minors - Jeff Erickson
    A minor of a graph G is a graph obtained from G by contracting edges, deleting edges, and deleting isolated vertices; a proper minor of G is any minor other ...
  20. [20]
    [PDF] Graph Minor Theory
    Mar 13, 2017 · 1.1 Minors. By contraction of an edge uv in a graph G we mean identification of u and v, i.e. replacement.
  21. [21]
    Topological Minor -- from Wolfram MathWorld
    A graph H is called a topological minor, also known as a homeomorphic subgraph, of a graph G if a graph subdivision of H is isomorphic to a subgraph of G.Missing: definition | Show results with:definition
  22. [22]
    [PDF] Graph minors and equivalence of Wagner's and Kuratowski's theorem
    If a graph G contains a subdivision of a graph H as a subgraph, we write. H t G and say that H is a topological minor of G. You know this notion.
  23. [23]
    The complexity of the vertex-minor problem - ScienceDirect.com
    The problem (MINOR) of deciding whether a graph H is a minor of G is NP-complete when both H and G are part of the input to the problem [5]. However, given a ...
  24. [24]
    Graph minors – a survey - Surveys in Combinatorics 1985
    Graph minors – a survey. By N. Robertson, Ohio State University, P.D. Seymour, Bell Communications Research, Inc. Edited by Ian Anderson; Book: Surveys in ...
  25. [25]
    Computers and Intractability; A Guide to the Theory of NP ...
    Michael Randolph Garey. Nokia Bell Labs. Publication Years1970 - 2002; Publication counts43; Citation count13,978; Available for Download14 · D. S. Johnson ( ...
  26. [26]
    [PDF] Solution Set 6
    Mar 5, 2025 · 1. First, observe that subgroup isomorphism is in NP, because if we are given a specification of the subgraph of G and the mapping between its ...
  27. [27]
    None
    Summary of each segment:
  28. [28]
    Everything you always wanted to know about the parameterized ...
    Everything you always wanted to know about the parameterized complexity of Subgraph Isomorphism (but were afraid to ask) · 63 Citations · 69 References.
  29. [29]
    Complexity Framework for Forbidden Subgraphs I: The Framework
    Jan 5, 2025 · We propose general and easy-to-state conditions on graph problems that explain a large set of results for -subgraph-free graphs.
  30. [30]
    Maximum common induced subgraph - Wikipedia
    A maximum common induced subgraph of two graphs G and H is a graph that is an induced subgraph of both G and H, and that has as many vertices as possible.
  31. [31]
    An Algorithm for Subgraph Isomorphism | Journal of the ACM
    The complexity of the subgraph isomorphism problem where the pattern graph is of fixed size is well known to depend on the topology of the pattern graph.Missing: definition | Show results with:definition
  32. [32]
    [PDF] An Algorithm for Subgraph Isomorphism | Semantic Scholar
    An Algorithm for Subgraph Isomorphism · J. Ullmann · Published in Journal of the ACM 1 January 1976 · Computer Science, Mathematics.
  33. [33]
  34. [34]
    A (sub)graph isomorphism algorithm for matching large graphs
    The algorithm is improved here to reduce its spatial complexity and to achieve a better performance on large graphs; its features are analyzed in detail ...
  35. [35]
    The Glasgow Subgraph Solver: Using Constraint Programming to ...
    Jun 23, 2020 · This paper gives an overview of the Glasgow Subgraph Solver, which is the current state of the art in subgraph solving for hard instances [26].Missing: McCreesh 2020
  36. [36]
    The Glasgow Subgraph Solver: Using Constraint Programming to ...
    The Glasgow Subgraph Solver provides an implementation of state of the art algorithms for subgraph isomorphism problems.Missing: survey | Show results with:survey<|control11|><|separator|>
  37. [37]
    An efficient pruning method for subgraph matching in large-scale ...
    Feb 9, 2023 · In this paper, we propose a novel pruning strategy in subgraph matching to reduce the size of search space, named Eigen Decomposition Pruning.
  38. [38]
    [PDF] Solving the Subgraph Isomorphism Problem Using Simulated ...
    Definition. Below we introduce several formal definitions related to the subgraph isomorphism problem. Definition 1: Given two sets X and Y , a function f ...
  39. [39]
    SymmPi: Exploiting Symmetry Removal for Fast Subgraph Matching
    Jan 15, 2025 · We present novel SymmPi, which exploits symmetry removal for fast graph matching. SymmPi first identifies the coarse-grained axisymmetric subgraphs of the ...Missing: techniques | Show results with:techniques
  40. [40]
    Symmetry breaking in the subgraph isomorphism problem
    Symmetry breaking identifies symmetric states during the search process, and avoids searching both. Symmetry breaking techniques have shown promising ...Missing: 2020 | Show results with:2020<|control11|><|separator|>
  41. [41]
    The RDKit Book — The RDKit 2025.09.2 documentation
    Substructure searching using query molecules that include recursive queries. The recursive queries modify their internal state when a search is run, so it's not ...
  42. [42]
    Accelerating Similarity and Substructure Searches
    Jul 29, 2020 · In graph theory, this problem is called subgraph isomorphism, a problem class that computational theorists call NP-complete. In OEChem TK ...
  43. [43]
    Comparison of Maximum Common Subgraph Isomorphism ...
    Oct 23, 2017 · This article describes challenging benchmarks for a series of MCS algorithms, and reports the MCS type and algorithm combinations which generally yield the ...
  44. [44]
    Pharmer: Efficient and Exact Pharmacophore Search - PMC - NIH
    Three-dimensional pharmacophore methods in drug discovery. ... Maximum common subgraph isomorphism algorithms for the matching of chemical structures.
  45. [45]
    A Triangle Framework among Subgraph Isomorphism ...
    Aug 16, 2022 · We adopt simplified representation pharmacophore graphs by reducing complete molecular structures to abstracts to detect isomorphic topological ...
  46. [46]
    [PDF] Network Motif Discovery Using Subgraph Enumeration and ...
    Network motifs are patterns of connectivity. This paper presents a novel algorithm using a symmetry-breaking technique to discover large network motifs.Missing: signaling | Show results with:signaling
  47. [47]
    Biological network motif detection: principles and practice
    Jun 20, 2011 · Network motifs are statistically overrepresented sub-structures (sub-graphs) in a network, and have been recognized as 'the simple building ...
  48. [48]
    Discovering functional interaction patterns in protein-protein ...
    Counting the frequency of a candidate pattern in a large graph (e.g., a genome-scale protein interaction network) requires the use of subgraph isomorphism test ...
  49. [49]
    Criminal Community Detection Based on Isomorphic Subgraph ...
    We studied community detection in criminal networks using the graph theory and formally introduced an algorithm that opens a new perspective of community ...
  50. [50]
    [PDF] Community Detection Based on Isomorphic Subgraph Analytics in ...
    May 20, 2020 · The significance of pinpointing the isomorphic graphs is associated with deciding and connecting akin graphs or subgraphs among social networks,.
  51. [51]
    SubMAP: Aligning Metabolic Pathways with Subnetwork Mappings
    Both the homological similarities of subnetworks and their topological organization provide us significant information for the alignment of metabolic pathways.
  52. [52]
    Alignment of metabolic pathways | Bioinformatics - Oxford Academic
    For example, the finding that pathways within a species resemble each other may imply that they arose during evolution due to instances of gene duplication ...Missing: across | Show results with:across
  53. [53]
    SAGA: a subgraph matching tool for biological graphs | Bioinformatics
    This paper presents a novel approximate graph matching technique called SAGA. This technique employs a flexible model for computing graph similarity.
  54. [54]
    Matched Filters for Noisy Induced Subgraph Detection - PMC
    The problem of noisy matched filters or inexact subgraph isomorphism differs from exact isomorphism in that only the “closest” induced subgraph is sought after.
  55. [55]
    A Quantum Framework for Combinatorial Optimization Problem over ...
    Jan 24, 2025 · In this paper, we propose a general quantum algorithm framework searching for approximate solutions to combinatorial optimization problems with linear ...
  56. [56]
    Uncertainty-aware Efficient Subgraph Isomorphism using Graph Topology
    ### Summary of Uncertainty-aware Efficient Subgraph Isomorphism using Graph Neural Networks
  57. [57]
    Open Problems and Recent Developments on a Complexity ...
    Feb 7, 2025 · This paper discusses this framework, highlights current developments and open problems, and surveys recent insights into the complexity on H - ...
  58. [58]
    [PDF] Complexity Framework for Forbidden Subgraphs IV: The Steiner ...
    May 2, 2023 · This paper studies the complexity of Steiner Forest on H-subgraph-free graphs, which are graphs that do not contain a fixed graph H as a  ...Missing: 2020-2025 | Show results with:2020-2025
  59. [59]
    Subgraph Isomorphism on Graph Classes that Exclude a Substructure
    May 25, 2019 · View a PDF of the paper titled Subgraph Isomorphism on Graph Classes that Exclude a Substructure, by Hans L. Bodlaender and 6 other authors.