We introduce the discrete-time treatment number of a graph, in which each vertex is in exactly one of three states at any given time-step: compromised, vulnerable, or treated. Our treatment number is distinct from other graph searching parameters that use only two states, such as the firefighter problem or Bernshteyn and Lee's inspection number. Vertices represent individuals and edges exist between individuals with close connections. Each vertex starts out as compromised; it can become compromised again even after treatment. Our objective is to treat the entire population so that at the last time-step, no members are vulnerable or compromised, while minimizing the maximum number of treatments that occur at each time-step. This minimum is the treatment number, and it depends on the choice of a pre-determined length of time $r$ that a vertex can remain in a treated state and length of time $s$ that a vertex can remain in a vulnerable state without being treated again.
We denote the pathwidth of graph $H$ by $pw(H)$ and prove that the treatment number of $H$ is bounded above by $\lceil \frac{1+pw(H)}{r+s}\rceil$. This equals the best possible lower bound for a cautious treatment plan, defined as one in which each vertex, after being treated for the first time, is treated again within every consecutive $r+s$ time-steps until its last treatment. However, many graphs admit a plan that is not cautious. When $r=s=1$, we find a useful tool for proving lower bounds, show that the treatment number of an $n\times n$ grid equals $\lceil\frac{1+n}{2}\rceil$, characterize graphs that require only one treatment per time-step, and prove that subdividing one edge can reduce the treatment number. It is known that there are trees with arbitrarily large pathwidth; surprisingly, we prove that for any tree $T$, there is a subdivision of $T$ that requires at most two treatments per time-step.
- Paper ID: 2408.05313
- Title: Discrete-time treatment number
- Authors: N.E. Clarke (Acadia University), K.L. Collins (Wesleyan University), M.E. Messinger (Mt. Allison University), A.N. Trenk (Wellesley College), A. Vetta (McGill University)
- Classification: math.CO (Combinatorics), physics.soc-ph (Sociophysics)
- Publication Date: October 13, 2025
- Paper Link: https://arxiv.org/abs/2408.05313v2
This paper introduces the concept of the discrete-time treatment number for graphs, where each vertex exists in one of three states at any given time step: compromised, vulnerable, or treated. This treatment number differs from other graph search parameters that use only two states, such as the firefighter problem or the inspection number of Bernshteyn and Lee. Vertices represent individuals, and edges exist between individuals who have close contact. Each vertex initially starts in the compromised state and may become compromised again even after treatment. The objective is to treat the entire population such that at the final time step no member is in a vulnerable or compromised state, while minimizing the maximum number of treatments occurring at each time step.
The core problem studied in this paper concerns the dynamic process of controlling contamination effects in networks. It is a deterministic graph process that models the race between treatment and the potential re-compromise of vertices.
The paper provides three concrete interpretive applications:
- Classroom Management Scenario: Students exist in three states—focused (green), losing attention (yellow), or distracted (red)—and teachers must devise strategies to ensure all students ultimately remain focused.
- Spy Network: Spies may be loyal (green), considering becoming double agents (yellow), or compromised by the adversary (red), requiring meetings with handlers to maintain loyalty.
- Medical Treatment: Corresponding to the SEIS epidemic model with susceptible (green), exposed (yellow), and infected (red) states, controlling infection spread through treatment.
Existing graph search problems (such as the firefighter problem, node search, and inspection games) primarily employ two-state models, while this paper innovatively introduces a three-state model that better reflects real-world dynamic propagation processes.
- Introduction of a New Graph Parameter: Proposes the (r,s)-treatment number τr,s(H), where r is the length of the protection period after treatment and s is the duration of the vulnerable state.
- Establishment of Upper Bound Theory: Proves that the treatment number is bounded above by ⌈r+s1+pw(H)⌉, where pw(H) is the pathwidth of graph H.
- Optimality of Cautious Protocols: Proves that for cautious treatment plans, the above upper bound is optimal.
- Complete Analysis of the Special Case (r=s=1):
- Characterizes graphs with treatment number 1 (caterpillar graphs)
- Proves that the treatment number of n×n grids is ⌈21+n⌉
- Provides important tools for proving lower bounds
- Surprising Results on Subdivided Graphs: Proves that for any tree T, there exists a subdivision of T with treatment number at most 2.
Input: Connected graph H=(V(H),E(H)), protection period length r≥1, vulnerable period length s≥1
Output: (r,s)-treatment number τr,s(H)
Constraints:
- Time step 0: All vertices are red (compromised)
- At each time step t: Select treatment set At⊆V(H)
- State transition rules: Protection lasts r steps after treatment, vulnerable state lasts s steps
- Goal: There exists time step N such that GN=V(H) (all vertices are green)
The paper defines precise state transition rules (see Table 1):
- Green Vertex Classification: Gt=Gtr∪Gtr−1∪⋯∪Gt1
- Yellow Vertex Classification: Yt=Yts∪Yts−1∪⋯∪Yt1
- Transition Rules:
- Treated vertices enter Gtr
- Protection period decreases: Gti→Gt+1i−1
- Compromised neighbors cause: Gt1→Yt+1s (if not re-treated)
- Vulnerable period decreases: Yti→Yt+1i−1
- Final transition to red: Yt1→Rt+1
Minimal Protocols (Definition 2.7): Avoid unnecessary treatments
Monotone Protocols (Definition 3.5): Once treated, vertices never become red again
Cautious Protocols (Definition 3.7): Between first and last treatment, treat at least once in every consecutive r+s time steps
- Three-State Model: Compared to traditional two-state models, more accurately simulates gradual degradation processes in reality.
- Pathwidth Connection: Establishes profound connections between treatment number and graph structural parameters (pathwidth).
- Protocol Classification Theory: Systematically analyzes properties and relationships among different protocol types.
- Subdivision Graph Theory: Discovers that subdivision operations can reduce treatment number, which is counterintuitive in graph search theory.
The paper primarily verifies results through theoretical analysis and concrete graph examples:
- (1,1)-Protocol for K1,3: Demonstrates a protocol of width 1
- Petersen Graph: Proves treatment number equals 3
- 4×4 Grid: Demonstrates pathwidth decomposition method
- Subdivision Construction: Shows subdivision of P4□P4
- Upper Bound Proofs: Construct protocols via pathwidth decomposition
- Lower Bound Proofs: Use vertex isoperimetric values and tools from Theorem 4.4
- Optimality Verification: Prove cautious protocols achieve the upper bound
- General Upper Bound (Theorem 3.4):
τr,s(H)≤⌈r+s1+pw(H)⌉
- Lower Bound for Cautious Protocols (Theorem 3.10):
width(J)≥⌈r+s1+pw(H)⌉
- Exact Values for Grids (Theorem 4.7):
τ(Pn□Pn)=⌈2n+1⌉
- Characterization of Graphs with Treatment Number 1 (Theorem 4.3):
For a graph H containing at least one edge, τ(H)=1 if and only if H is a caterpillar graph.
Main Theorem (Corollary 5.8): For any tree T, there exists a subdivision of T with treatment number at most 2.
This result is particularly surprising because:
- Trees of arbitrarily large pathwidth exist
- Yet through appropriate subdivision, the treatment number can always be reduced to 2
- Petersen Graph: τ(Petersen)=3
- Cycle Graphs: τ(Cn)=2 for n≥3
- K1,3′ (subdivision of K1,3): τ(K1,3′)=2
- Firefighter Problem: Vertices remain colored once marked, whereas this paper allows re-compromise
- Node Search: Focuses on edge clearing, whereas this paper focuses on vertex states
- Inspection Games: Seeks intruders, whereas this paper treats the entire network
Bernshteyn and Lee proved that the inspection number is bounded above by 1+pw(H), while this paper's bound ⌈r+s1+pw(H)⌉ is tighter when r+s>1.
- Complete Theoretical Framework: Establishes a comprehensive theoretical framework for the discrete-time treatment model
- Central Role of Pathwidth: Reveals the fundamental importance of pathwidth in treatment problems
- Unexpected Properties of Subdivided Graphs: Discovers the powerful effect of subdivision operations in reducing treatment number
- Computational Complexity: The paper does not discuss the algorithmic complexity of computing treatment number
- Stochastic Models: Only considers deterministic models, does not address stochastic propagation
- Practical Validation: Lacks verification on real network data
The paper proposes six open problems in Section 6:
- Time Step Optimization (Question 6.1)
- Characterization of Width 1 Protocols (Question 6.2)
- Parameter Symmetry: τr,s(H)=τs,r(H)? (Question 6.3)
- Treatment Number of Minimal Trees (Question 6.4)
- General Theory of Subdivided Graphs (Question 6.5)
- Relationship with Cops and Robbers Games (Question 6.6)
- Theoretical Depth: Establishes a complete mathematical theoretical framework with rigorous proofs
- Novelty: The three-state model represents an important extension to existing graph search theory
- Practical Value: The model is applicable to epidemic control, network security, and other practical problems
- Unexpected Discoveries: The subdivision graph results defy intuition and possess significant theoretical value
- Missing Algorithms: Lacks concrete algorithms for computing treatment number
- Insufficient Experimental Validation: Primarily theoretical analysis, lacks experiments on real networks
- Lack of Parameter Selection Guidance: Provides no guidance on how to choose r and s in practical applications
- Theoretical Contribution: Opens new directions in graph search theory
- Interdisciplinary Value: Connects combinatorics, network science, and epidemiology
- Potential for Follow-up Research: The proposed open problems provide clear directions for future research
- Epidemic Control: Optimization of vaccination strategies
- Network Security: Control of malware propagation
- Social Networks: Information dissemination management
- Educational Management: Classroom attention maintenance strategies
The paper cites 18 relevant references, primarily including:
- Bernshteyn & Lee (2022): Inspection game theory
- Bodlaender (1998): Pathwidth theory
- Bonato (2022): Survey on pursuit-evasion games
- Finbow & MacGillivray (2009): Survey on firefighter problem
These references provide important support for the theoretical foundations of this paper.