{"id":2266,"date":"2024-04-17T13:36:27","date_gmt":"2024-04-17T11:36:27","guid":{"rendered":"https:\/\/perso.lirmm.fr\/christophe-paul\/?page_id=2266"},"modified":"2024-09-13T17:01:03","modified_gmt":"2024-09-13T15:01:03","slug":"publication","status":"publish","type":"page","link":"https:\/\/www.lirmm.fr\/christophe-paul\/publication\/","title":{"rendered":"Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2266\" class=\"elementor elementor-2266\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ddffaf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ddffaf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06e7c90\" data-id=\"06e7c90\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0375a1 elementor-widget elementor-widget-text-editor\" data-id=\"d0375a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Publications<\/strong> (complete versions gathered with the extended abstract, if any)<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4a1d03 elementor-widget elementor-widget-text-editor\" data-id=\"f4a1d03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>[92]\u00a0<\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">C. Paul,<\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">\u00a0<\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\" title=\"Evangelos Protopapas\">E. Protopapas, D.M. Thilikos and S. Wiederrecht. Obstructions to Erd\u00f6s-Posa dualities for minors. In\u00a0<em><strong>IEEE Symposium on Foundations of Computer Science &#8211; FOCS<\/strong>. 2024, to appear.<br \/>See also <b><i><a href=\"https:\/\/arxiv.org\/abs\/2407.09671\">arXiv:2407.09671<\/a><\/i><\/b>, 2024.<\/em><\/span><\/p><p><strong>[91] <\/strong>C. Paul, <span title=\"Evangelos Protopapas\">E. Protopapas, D.M. Thilikos and S. Wiederrecht.\u00a0<\/span><a href=\"https:\/\/drops.dagstuhl.de\/entities\/document\/10.4230\/LIPIcs.ICALP.2024.114\">Delineating Half-Integrality of the Erd\u0151s-P\u00f3sa Property for Minors: the Case of Surfaces<\/a>. In \u00a0<strong><em>International Colloquium on Automata, Logic and Programming \u2013 ICALP<\/em><\/strong>. Number 297 of\u00a0<em>Leibnitz International Proceedings in Informatics<\/em>, pages 35:1-35:20, 2024. <br \/>See also <b><i><a href=\"https:\/\/arxiv.org\/abs\/2406.16647\">arXiv:2406.16647<\/a><\/i><\/b>, 2024.<\/p><p><strong>[90]<\/strong> D.G. Corneil, M. Habib, C. Paul, M. Tedder. A recursive linear time modular decomposition algorithm via LexBFS.\u00a0<em><strong><a href=\"http:\/\/arxiv.org\/abs\/0710.3901\">arXiv:0710.3901<\/a><\/strong><\/em>, 2024.<br \/><i style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Extended abstract:<\/i><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"> Simple, linear-time modular decomposition.\u00a0In<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em> International Colloquium on Automata, Languages and Programming \u2013 ICALP<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 5125 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 634-645, 2008.<br \/><i style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Implementation of the algorithm (by C. Bouvier):\u00a0<\/i>\u00a0<em><a href=\"https:\/\/gite.lirmm.fr\/bouvier\/modular-decomposition\"><strong>GitHub:modular decomposition<\/strong><\/a><\/em><\/span><\/p><p><strong>[89]<\/strong> C. Paul, <span title=\"Evangelos Protopapas\">E. Protopapas, D.M. Thilikos. Graph Parameters, Universal Obstructions, and WQO<\/span>. <strong><em><a href=\"https:\/\/arxiv.org\/abs\/2304.03688\">arXiv:2304.03688<\/a><\/em><\/strong>, 2023.<\/p><p><strong>[88]<\/strong> C. Paul, <span title=\"Evangelos Protopapas\">E. Protopapas.\u00a0<\/span><a href=\"https:\/\/drops.dagstuhl.de\/entities\/document\/10.4230\/LIPIcs.STACS.2024.55\">Tree-Layout Based Graph Classes: Proper Chordal Graphs<\/a>. In <strong><em>International Symposium on Theoretical Aspects of Computer Science \u2013 STACS<\/em><\/strong>. Number 289 of\u00a0<em>Leibnitz International Proceedings in Informatics<\/em>, pages 55:1-55:18, 2024.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">See also <\/span><strong><em><a href=\"http:\/\/10.48550\/ARXIV.2211.07550\">arXiv:2211.07550<\/a><\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, 2022.<\/span><\/p><p><strong>[87]<\/strong> C. Paul, E. Protopapas, D.M. Thilikos. <a href=\"http:\/\/10.48550\/ARXIV.2304.14121\">Universal obstructions of graph parameters<\/a>. <em><strong>arXiv<\/strong><\/em> 2304.14121, 2023.<\/p><p><strong>[86]<\/strong> <span title=\"Lo\u00efc Magne\">L. Magne<\/span>,\u00a0C. Paul,\u00a0<span title=\"Abhijat Sharma\">A. Sharma<\/span>,\u00a0<span title=\"Dimitrios M. Thilikos\">D.M. Thilikos.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1016\/j.disc.2023.113345\">Edge-treewidth: Algorithmic and combinatorial properties<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 341:40-54, 2023.<br \/>See also <em><strong><a href=\"https:\/\/doi.org\/10.48550\/arXiv.2112.07524\">arXiv:2112.07524<\/a><\/strong><\/em>, 2021.<\/p><p><strong>[85]<\/strong> <span title=\"Guillaume Mescoff\">G. Mescoff<\/span>,\u00a0C. Paul,\u00a0<span title=\"Dimitrios M. Thilikos\">D.M. Thilikos.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1016\/j.disc.2023.113345\">The mixed search game against an agile and visible fugitive is monotone<\/a>.\u00a0<strong><em>Discrete Mathematics<\/em><\/strong>, 346(4):113345, 2023.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/2204.10691\">arXiv:2204.10691<\/a><\/strong><\/em>, 2022.<\/p><p><strong>[84]<\/strong> C. Paul,\u00a0<span title=\"Markus Bl\u00e4ser\">M. Bl\u00e4ser.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1007\/s00224-022-10116-6\">Preface of STACS 2020<\/a>. Special issue of\u00a0<strong><em>Theory of Computing Systems<\/em><\/strong>, 67(1):1-3, 2023.<\/p><p><strong>[83]<\/strong> <span title=\"Guillaume Mescoff\">G. Mescoff<\/span>,\u00a0C. Paul,\u00a0<span title=\"Dimitrios M. Thilikos\">D.M. Thilikos.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1016\/j.dam.2021.02.039\">A polynomial time algorithm to compute the connected treewidth of a series-parallel graph<\/a>.\u00a0<em><strong>Discrete Applied Mathematics<\/strong>,<\/em>\u00a0312:72-85, 2022.<br \/>See also<em><strong> <a href=\"https:\/\/arxiv.org\/abs\/2004.00547\">arXiv:2004.00547<\/a><\/strong>, 2020.<\/em><\/p><p><strong>[82]<\/strong> <span title=\"Mamadou Moustapha Kant\u00e9\">M.M. Kant\u00e9<\/span>,\u00a0C. Paul,\u00a0<span title=\"Dimitrios M. Thilikos\">D.M. Thilikos.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1137\/20M1369361\">A Linear Fixed Parameter Tractable Algorithm for Connected Pathwidth<\/a>.\u00a0<strong><em>SIAM Journal on Discrete Mathematics<\/em>,<\/strong> 36(1):411-435, 2022.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.ESA.2020.64\"><strong><em>Extended abstract<\/em><\/strong><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Annual European Symposium on Algorithms \u2013\u00a0<\/em><em>ESA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 173 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages\u00a064:1-64:16, 2020.<br \/>See also<em>\u00a0<strong><a href=\"https:\/\/arxiv.org\/abs\/2004.11937\">arXiv:2004.11937<\/a><\/strong>, 2020.<\/em><\/span><\/p><p><strong>[81]<\/strong> <span title=\"Svein H\u00f8gemo\">S. H\u00f8gemo<\/span>, <span title=\"Benjamin Bergougnoux\">B. Bergougnoux<\/span>, <span title=\"Ulrik Brandes\">U. Brandes<\/span>, C. Paul, <span title=\"Jan Arne Telle\">J.A. Telle.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1007\/978-3-030-86593-1_20\">On Dasgupta\u2019s Hierarchical Clustering Objective and Its Relation to Other Graph Parameters<\/a>.\u00a0In <strong><em>International Symposium\u00a0Fundamentals of Computation Theory \u2013 FCT<\/em><\/strong>. Number 12867 of\u00a0<em>Lecture Notes in Computer Science<\/em>, pages\u00a0287-300, 2021.<br \/>See also<em><strong>\u00a0<\/strong><strong><a href=\"https:\/\/arxiv.org\/abs\/2105.12093\">arXiv:2105.12093<\/a><\/strong><\/em>, 2021.<\/p><p><strong>[80]<\/strong> <span title=\"Isolde Adler\">I. Adler<\/span>,\u00a0C. Paul,\u00a0<span title=\"Dimitrios M. Thilikos\">D.M. Thilikos.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1002\/jgt.22669\">Connected search for a lazy robber<\/a>.\u00a0<strong><em>Journal of Graph Theory<\/em><\/strong>, 97(4):510-552, 2021.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.FSTTCS.2019.7\">Extended abstract<\/a><\/strong> <\/em>in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science \u2013\u00a0<\/em><em>FSTTCS.<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">\u00a0Number 150 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 7:1-7:14, 2019.<\/span><\/p><p><strong>[79]<\/strong> <span title=\"Rolf Niedermeier\">R. Niedermeier<\/span>,\u00a0C. Paul.\u00a0<a href=\"https:\/\/doi.org\/10.1007\/s00224-020-10026-5\">Preface of STACS 2019<\/a> Special Issue of\u00a0<strong><em>Theory of Computing Systems<\/em><\/strong>, 65(4):635-637, 2021.<\/p><p><strong>[78]<\/strong> C. Paul,\u00a0<span title=\"Michal Pilipczuk\">M. Pilipczuk.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1007\/s00453-020-00748-w\">Special Issue Dedicated to the 13th International Symposium on Parameterized and Exact Computation<\/a>.\u00a0<strong><em>Algorithmica<\/em><\/strong>, 82(8): 2133-2134, 2020.<\/p><p><strong>[77]<\/strong> <span title=\"Svein H\u00f8gemo\">S. H\u00f8gemo<\/span>, C. Paul, J.A.<span title=\"Jan Arne Telle\">\u00a0Telle.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.MFCS.2020.47\">Hierarchical Clusterings of Unweighted Graphs<\/a>. In <em><strong>International Symposium on Mathematical Foundations of Computer Science \u2013\u00a0<\/strong><\/em><strong><em>MFCS<\/em><\/strong>. Number 173 of\u00a0<em>Leibnitz International Proceedings in Informatics<\/em>, pages\u00a047:1-47:13, 2020.<br \/>See also <em><strong><a href=\"https:\/\/arxiv.org\/abs\/2008.03061\">arXiv:2008.03061<\/a><\/strong><\/em>, 2020.<\/p><p><strong>[76]<\/strong> S. Bessy, M. Bougeret, S. Chaplick, D. Gon\u00e7alves, C. Paul.\u00a0<a href=\"https:\/\/doi.org\/10.1016\/j.dam.2019.10.019\">On independent set in B1-EPG graphs<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 278:62-72, 2020.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><strong><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-28684-6_14\"><em>Extended abstract<\/em><\/a><\/strong> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Workshop on Approximation and Online Algorithms \u2013 WAOA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 9499 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 158-169, 2015.<br \/>See also <em><strong><a href=\"https:\/\/arxiv.org\/abs\/1510.00598\">arXiv:1510.00598<\/a><\/strong><\/em>, 2015.<\/span><\/p><p><strong>[75]<\/strong> J. Baste, D. G\u00f6z\u00fcpek, C. Paul, I. Sau, M. Shalom, D.M. Thilikos. <a href=\"https:\/\/doi.org\/10.1002\/net.21923\">Parameterized complexity of finding a spanning tree with minimum reload cost diameter<\/a>.\u00a0<strong><em>Networks<\/em><\/strong>, 75(3):259-277, 2020.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.IPEC.2017.3\">Extended abstract<\/a><\/strong><\/em> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Symposium on Parameterized and Exact Computation \u2013 IPEC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 89 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 3:1-3:12, 2017.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1703.01686\">arXiv:1703.01686<\/a><\/strong><\/em><em>, 2017.<\/em><\/span><\/p><p><strong>[74]<\/strong> S. Limnios, C. Paul, J. Perret and D.M. Thilikos. <a href=\"https:\/\/doi.org\/10.1016\/j.tcs.2020.06.006\">Edge degeneracy: algorithmic and structural results<\/a>.\u00a0<strong><em>Theoretical Computer Science<\/em><\/strong>, 839:164-175, 2020.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/2009.03809\">arXiv:2009.03809<\/a><\/strong><\/em><em>, 2020.<\/em><\/p><p><strong>[73]<\/strong> C. Paul, <span title=\"Markus Bl\u00e4ser\">M. Bl\u00e4ser. <a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.STACS.2020\">Proceedings of the\u00a0<\/a><\/span><em><strong>37th International Symposium on Theoretical Aspects of Computer Science \u2013 STACS\u201920<\/strong><\/em>. Number 154 of <em>Leibnitz International Proceedings in Informatics, 2020.<\/em><\/p><p><strong>[72]<\/strong> V. Garnero, C. Paul, I. Sau and D.M. Thilikos. <a href=\"https:\/\/doi.org\/10.1007\/s00453-018-0495-5\">Explicit linear kernels for packing problems.<\/a>\u00a0<strong><em>Algorithmica<\/em><\/strong>, 81(4):1615-1656, 2019.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1610.06131\">arXiv:1610.06131<\/a><\/strong><\/em>, 2016.<\/p><p><strong>[71]<\/strong> F. Barbero, C. Paul and M. Pilipczuk. <a href=\"https:\/\/doi.org\/10.1002\/jgt.22408\">Strong immersion is a well-quasi-ordering for semi-complete digraphs<\/a>.\u00a0<strong><em>Journal of Graph Theory<\/em><\/strong>, 90(4):484-496, 2019.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1707.03563\">arXiv:1707.03563<\/a><\/strong><\/em><em>, 2017.<\/em><\/p><p><strong>[70]<\/strong> C. Paul, R. Niedermeier<span title=\"Markus Bl\u00e4ser\">. <a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.STACS.2019\">Proceedings of the\u00a0<\/a><\/span><strong><em>36th International Symposium on Theoretical Aspects of Computer Science \u2013 STACS\u201919<\/em><\/strong>. Number 129 of <em>Leibnitz International Proceedings in Informatics, 2019.<\/em><\/p><p><strong>[69]\u00a0<\/strong>C. Paul, <span title=\"Michal Pilipczuk\">M. Pilipczuk. <a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.IPEC.2018\">Proceedings of the\u00a0<\/a><\/span><em><strong>13th International Symposium on Parameterized and Exact Computation \u2013 IPEC\u201918. <\/strong><\/em>Number\u00a0115 of <em>Leibnitz International Proceedings in Informatics, 2019.<\/em><\/p><p><strong>[68]<\/strong> E.J. Kim, S.I. Oum, C. Paul, I. Sau and D.M. Thilikos. <a href=\"https:\/\/doi.org\/10.1007\/s00453-016-0245-5\">An FPT 2-Approximation for Tree-Cut Decomposition<\/a>.\u00a0<em><strong>Algorithmica<\/strong><\/em>, 80(1):116,135, 2018.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-28684-6_4\">Extended abstract<\/a><\/strong><\/em> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Workshop on Approximation and Online Algorithms \u2013 WAOA<\/em>.<\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"> Number 9499 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 35-46, 2015.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1509.04880\">arXiv:1509.04880<\/a><\/strong><\/em><em>,<\/em> 2015.<\/span><\/p><p><strong>[67]<\/strong> <span title=\"Mark Jones\">D.G. Cor<\/span><span title=\"Derek G. Corneil\">neil<\/span>,\u00a0<span title=\"Sang-il Oum\">S.-I. Oum<\/span>,\u00a0C. Paul.\u00a0<a href=\"https:\/\/doi.org\/10.1016\/S0166-218X(18)30415-3\">Preface: Seventh \u00a0Workshop on Graph Classes, Optimization, and Width Parameters, Aussois, France, October 2015<\/a>.\u00a0<em><strong>Discrete Applied Mathematics<\/strong><\/em>, 248: 1-2, 2018.<\/p><p><strong>[66]<\/strong> F. Barbero, C. Paul and M. Pilipczuk. <a href=\"https:\/\/doi.org\/10.1145\/3196276\">Exploring the complexity of layout parameters in tournaments and semi-complete digraphs<\/a>.\u00a0<em><strong>ACM Transactions on Algorithmics<\/strong><\/em>, 14(3):38:1-38-31, 2018.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2017.70\">Extended abstract<\/a><\/strong><\/em> in<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"> <em>International Colloquim on Automata, Languages, and Programming \u2013 ICALP<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 80 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 70:1-70:13, 2017.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1706.00617\">arXiv:1706.00617<\/a><\/strong><\/em><em>, 2017.<\/em><\/span><\/p><p><strong>[65]<\/strong> M.M. Kant\u00e9, E.J. Kim, O. Kwon and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/s00453-016-0230-z\">An FPT algorithm and a polynomial kernel for linear rankwidth-1 vertex deletion<\/a>.\u00a0<em><strong>Algorithmica<\/strong><\/em>, 79(1):66-95, 2017.\u00a0<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.IPEC.2015.138\">Extended abstract<\/a><\/strong><\/em> in<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"> <em>International Symposium on Parameterized and Exact Computation \u2013 IPEC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 43 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 138-150, 2015.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1504.05905\">arXiv:1504.05905<\/a><\/strong><\/em>, 2015.<\/span><\/p><p><strong>[64]<\/strong> E.J. Kim, C. Paul, I. Sau and D.M. Thilikos. <a href=\"https:\/\/doi.org\/10.1016\/j.jcss.2017.01.003\">Parameterized algorithms for min-max multiway cut and list digraph homomorphism<\/a>.\u00a0<em><strong>Journal of Computer and System Science<\/strong><\/em>, 86:191-206, 2017.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.IPEC.2015.78\">Extended abstract<\/a><\/strong><\/em> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Symposium on Parameterized and Exact Computation \u2013 IPEC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 43 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 78-89, 2015.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1509.07404\">arXiv:1509.07404<\/a><\/strong><\/em>, 2015.<\/span><\/p><p><strong>[63]<\/strong> N. Cohen, D. Gon\u00e7alves, E.J. Kim, C. Paul, I. Sau, D.M. Thilikos and M. Weller. <a href=\"https:\/\/doi.org\/10.1016\/j.jcss.2017.05.016\">A polynomial-time algorithm for outerplanar diameter improvement<\/a>.\u00a0<strong><em>Journal of Computer and System Science,<\/em><\/strong> 89:315-327, 2017.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-20297-6_9\">Extended abstract<\/a><\/strong><\/em> in <\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><strong>International Workshop on\u00a0<\/strong><\/em><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Graph Theoretical Concepts in Computer Science \u2013 WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 8747 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 201-213, 2015.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1403.5702\">arXiv:1403.5702<\/a><\/strong><\/em>, 2014.<\/span><\/p><p><strong>[62]<\/strong> <b>\u00a0<\/b>D. G\u00f6z\u00fcpek, S. \u00d6zkan, C. Paul, I. Sau, M. Shalom. <a href=\"https:\/\/doi.org\/10.1016\/j.tcs.2017.06.013\">Parameterized complexity of the MINCCA problem on graphs of bounded decomposability<\/a>.\u00a0<strong><em>Theoretical Computer Science,<\/em><\/strong> 690:91-103, 2017.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-662-53536-3_17\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><strong>International Workshop on\u00a0<\/strong><\/em><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Graph Theoretical Concepts in Computer Science \u2013 WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 9941 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 195-206, 2016.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/export.arxiv.org\/abs\/1605.00532\">arXiv:1605.00532<\/a><\/strong><\/em>, 2016.<\/span><\/p><p><strong>[61]<\/strong> <span title=\"Mark Jones\">M. Jones<\/span>,\u00a0C. Paul,\u00a0<span title=\"C\u00e9line Scornavacca\">C. Scornavacca.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1186\/s12859-016-1267-3\">On the consistency of orthology relationships.<\/a> In <em><strong>RECOMB Comparative Genomics Satellite Workshop \u2013 RECOMB-CG.\u00a0BMC Bioinformatics<\/strong><\/em>, 17(S-14):251-262, 2016.<\/p><p><strong>[60]<\/strong> J. Baste, C. Paul, I. Sau and C. Scornavacca. <a href=\"https:\/\/doi.org\/10.1007\/s11538-017-0260-y\">Efficient FPT algorithms for (strict) compatibility of unrooted phylogenetic trees<\/a>.\u00a0<em><strong>Bulletin of Mathematical Biology<\/strong><\/em>, <span data-test=\"journal-volume\">79:<\/span>920\u2013938,\u00a0<span data-test=\"article-publication-year\">2017.<br \/><\/span><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-41168-2_5\"><em><strong>Extended abstract<\/strong><\/em><\/a> in\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Conference on Algorithmic Aspects in Information and Management &#8211; AAIM<\/em>.<\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"> Number 9778 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 53-64, 2016.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1604.03008\">arXiv:1604.03008<\/a><\/strong><\/em>, 2016.<\/span><\/p><p><strong>[59]<\/strong> C. Paul, A. Perez and S. Thomass\u00e9. <a href=\"https:\/\/doi.org\/10.1016\/j.jcss.2015.08.002\">Linear kernel for rooted triplet inconsistency and other problems based on conflict packing technique<\/a>.\u00a0<em><strong>Journal of Computer and System Science<\/strong><\/em>, 82(2):366-379, 2016.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-22993-0_45\"><em><strong>Extended abstract<\/strong><\/em><\/a>: Conflict packing yields linear vertex-kernels for k-FAST, k-dense RTI and a related problem.\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Mathematical Foundations of Computer Science \u2013 MFCS<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 6907 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 497-507, 2011.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1101.4491\">arXiv:1101.4491<\/a><\/strong><\/em>, 2011.<\/span><\/p><p><strong>[58]<\/strong> E.J. Kim, A. Langer, C. Paul, F. Reidl, P. Rossmanith, I. Sau, and S. Sikdar. <a href=\"https:\/\/doi.org\/10.1145\/2797140\">Linear kernels and single-exponential algorithms via protrusion decompositions<\/a>.\u00a0<em><strong>ACM Transactions on Algorithms<\/strong><\/em>, 12(2):21, 2016.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-39206-1_52\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Colloquim on Automata, Languages, and Programming \u2013 ICALP<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 7965 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 613-624, 2013.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1207.0835\">arXiv:1207.0835<\/a><\/strong><\/em>, 2012.<\/span><\/p><p><strong>[57]<\/strong> E.J. Kim, C. Paul and G. Philip. <a href=\"https:\/\/doi.org\/10.1016\/j.jcss.2014.05.001\">A single-exponential FPT algorithm for the K4-minor cover problem<\/a>.\u00a0<em><strong>Journal of Computer and System Science<\/strong><\/em>, 81(1) :186-207, 2015.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-31155-0_11\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Scandinavian Workshop On Algorithmic Theory \u2013 SWAT<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 7357 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 119-130, 2012.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1204.1417\">arXiv:1204.1417<\/a><\/strong><\/em>, 2012.<\/span><\/p><p><strong>[56]<\/strong> P. Golovach, P. Heggernes, P. van\u2019t Hof and C. Paul. <a href=\"https:\/\/doi.org\/10.1137\/140975279\">Hadwiger number of graphs with small chordality<\/a>. <em><strong>SIAM Journal on\u00a0Discrete Applied Mathematics<\/strong><\/em>, 29(3) :1427-1451, 2015.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-12340-0_17\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Workshop on Approximation and Online Algorithms \u2013 WAOA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 9499 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 158-169, 2014.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1406.3812\">arXiv:1406.3812<\/a><\/strong><\/em>, 2014.<\/span><\/p><p><strong>[55]<\/strong> V. Garnero, C. Paul, I. Sau and D. Thilikos. <a href=\"https:\/\/doi.org\/10.1137\/140968975\">Explicit linear kernels via dynamic programming<\/a>.\u00a0<strong><em>SIAM Journal on Discrete Mathematics<\/em>,<\/strong> 29(4) :1864-1894, 2015.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.STACS.2014.312\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Symposium on Theoretical Aspect of Computer Science \u2013 STACS<\/em>.<\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"> Number 25 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 312-324, 2014.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1312.6585\">arXiv:1312.6585<\/a><\/strong><\/em>, 2013.<\/span><\/p><p><strong>[54]<\/strong> G. Joret, C. Paul, I. Sau, S. Saurabh and S. Thomass\u00e9. <a href=\"https:\/\/doi.org\/10.1137\/120883736\">Hitting and harvesting pumpkins<\/a>.\u00a0<strong><em>SIAM Journal on Discrete Mathematics<\/em><\/strong>, 28(3):1363-1390, 2014.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-23719-5_34\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>European Symposium on Algorithms \u2013 ESA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 6942 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 394-407, 2011.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1105.2704\">arXiv:1105.2704<\/a><\/strong><\/em>, \u00a02011.<\/span><\/p><p><strong>[53]<\/strong> E. Gioan, C. Paul, M. Tedder and D.G. Corneil. <a href=\"https:\/\/doi.org\/10.1007\/s00453-013-9745-8\">Circle Graph Recognition in Time O(n+m).\\alpha(n+m)<\/a>.\u00a0<strong><em>Algorithmica<\/em><\/strong>, 69(4):759-788, 2014.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1104.3284\">arXiv:1104.3284<\/a><\/strong><\/em>, 2011.<\/p><p><strong>[52]<\/strong> E. Gioan, C. Paul, M. Tedder and D.G. Corneil. <a href=\"https:\/\/doi.org\/10.1007\/s00453-013-9752-9\">Practical and Efficient Split Decomposition via Graph-Labelled Trees<\/a>.\u00a0<strong><em>Algorithmica<\/em><\/strong>, 69(4):789-843, 2014.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1104.3283\">arXiv:1104.3283<\/a><\/strong><\/em>, \u00a02011.<\/p><p><strong>[51]<\/strong>\u00a0P. Heggernes, P. van\u2019t Hof, B. L\u00e9v\u00eaque and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2013.02.025\">Contracting chordal graphs and bipartite graphs to paths and trees<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 164(2):444-449, 2014.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1016\/j.endm.2011.05.016\"><em><strong>Extended abstract<\/strong><\/em><\/a> in<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em> Latin-American<\/em><em> Algorithms, Graphs, and Optimization Symposium &#8211; LAGOS<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, \u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Electronic Notes in Discrete Mathematics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, 37:87-92, 2011.<\/span><\/p><p><strong>[50]<\/strong> N. Bousquet, G. Mertzios, C. Paul, I. Sau and S. Thomass\u00e9.\u00a0<a href=\"https:\/\/doi.org\/10.1007\/s00224-013-9478-8\">Parameterized domination in circle graphs<\/a>.\u00a0<strong><em>Theory of Computing Systems<\/em><\/strong>, 54(1):45-72, 2014.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-34611-8_31\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop on\u00a0Graph Theoretical Concepts in Computer Science \u2013 WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 7551 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 308-319, 2012.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1205.3728\">arXiv:1205.3728<\/a><\/strong><\/em>, 2012.<\/span><\/p><p><strong>[49]<\/strong> P. Heggernes P. van \u2018t Hof, B. L\u00e9v\u00eaque, D. Lokshtanov and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/s00453-012-9670-2\">Contracting graphs to paths and trees.<\/a>\u00a0<strong>Algorithmica<\/strong>, 68(1):109-132, 2014.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-28050-4_5\"><em><strong>Extended abstract<\/strong><\/em><\/a> in\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Symposium on Parameterized and exact Computation &#8211; IPEC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 7112 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science\u00a0<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 55-66, 2011.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1104.3677\">arXiv:1104.3677<\/a><\/strong><\/em>, 2011.<\/span><\/p><p><strong>[48]<\/strong> S. Guillemot, F. Havet, C. Paul and A. Perez.<a href=\"https:\/\/doi.org\/10.1007\/s00453-012-9619-5\"> On the (non-)existence of polynomial kernels for Pl-free edge modification problems.<\/a>\u00a0<strong><em>Algorithmica<\/em><\/strong>, 65(4):900-926, 2013.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-17493-3_15\"><em><strong>Extended abstract<\/strong><\/em><\/a> in\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Symposium on Parameterized and Exact Computation \u2013 IPEC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 6478 in Lecture Notes in Computer Science, pages 147-157, 2010.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1007.4011\">arXiv:1007.4011<\/a><\/strong><\/em>, 2010.<\/span><\/p><p><strong>[47]<\/strong> P. Heggernes, P. van \u2018t Hof, D. Lokshtanov and C. Paul. <a href=\"https:\/\/doi.org\/10.1137\/130907392\">Obtaining a bipartite graph by contracting few edges<\/a>.\u00a0<strong><em>SIAM Journal on Discrete Mathematics<\/em><\/strong>, 27(4):2143-2156, 2013.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.FSTTCS.2011.217\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science \u2013 FSTTCS<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 13 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, page 217-228, 2011.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/1102.5441\">arXiv:1102.5441<\/a><\/strong><\/em>, 2011.<\/span><\/p><p><strong>[46]<\/strong> E. Gioan and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2011.05.007\">Split decomposition and graph-labelled trees: characterizations and fully-dynamic algorithms for totally decomposable graphs<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 160(6):708-733, 2012.\u00a0<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em><strong><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-77120-3_6\">Extended abstract<\/a><\/strong><\/em>: Dynamic distance hereditary graphs using split decomposition. In\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Symposium on Algorithms and Computation <\/em>\u2013\u00a0<em>ISAAC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 4835 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 41-51, 2007.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/0810.1823\">arXiv:0810.1823<\/a><\/strong><\/em>, 2008.<\/span><\/p><p><strong>[45]<\/strong> P. Gambette, V. Berry and C. Paul. <a href=\"https:\/\/doi.org\/10.1142\/S0219720012500047\">Quartet and unrooted phylogenetic networks<\/a>.\u00a0<em><strong>Journal of Bioinformatics and Computational Biology<\/strong>,<\/em>\u00a010(4):23 pages, 2012.<\/p><p><strong>[44]<\/strong> <b>\u00a0<\/b>S. Bessy, F. Fomin, S. Gaspers, C. Paul, A. Perez, S. Saurabh and S. Thomass\u00e9. <a href=\"https:\/\/doi.org\/10.1016\/j.jcss.2010.10.001\">Kernels for feedback arc set in tournaments<\/a>.\u00a0<strong><em>Journal of Computer and System Science<\/em><\/strong>, 77(6):1071-1078, 2011.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.4230\/LIPIcs.FSTTCS.2009.2305\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop On Combinatorial Algorithms \u2013 FSTTCS<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 4 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Leibnitz International Proceedings in Informatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 37-47, 2009.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/0907.2165\">arXiv:0907.2165<\/a><\/strong><\/em>, 2009.<\/span><\/p><p><strong>[43]\u00a0<\/strong>C. Paul, <span title=\"Michel Habib\">M. Habib. <a href=\"https:\/\/doi.org\/10.1007\/978-3-642-11409-0\">Proceedings of the <em><strong>35th International Workshop on\u00a0<\/strong><\/em><\/a><\/span><em><strong>Graph-Theoretic Concepts in Computer Science \u2013 WG\u201909<\/strong><\/em>. Revised Papers. Number 5911 of <em>Lecture Notes in Computer Science<\/em>, 2010<\/p><p><strong>[42]<\/strong> P. Heggernes, D. Lokshtanov, J. Nederlof, C. Paul and J.A. Telle. <a href=\"https:\/\/doi.org\/10.1007\/978-3-642-16926-7_17\">Generalized graph clustering : recognizing (p,q)-cluster<\/a>. In <em><strong>International Workshop on\u00a0<\/strong><\/em><strong><em>Graph Theoretical Concepts in Computer Science \u2013 WG<\/em><\/strong>. Number 6410 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 171-183, 2010.<\/p><p><strong>[41]<\/strong> M. Fellows, P. Giannopoulos, C. Knauer, C. Paul, F. Rosamond, S. Whitesides and \u00a0N. Yu. <a href=\"https:\/\/doi.org\/10.1007\/978-3-642-16926-7_13\">Milling a graph with turn costs : a parameterized complexity perspective<\/a>. In <em><strong>International Workshop on\u00a0<\/strong><\/em><strong><em>Graph Theoretical\u00a0Concepts in Computer Science \u2013 WG<\/em><\/strong>. Number 6410 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 123-134, 2010.\u00a0<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">See also <em><strong><a href=\"https:\/\/arxiv.org\/abs\/0912.1050\">arXiv:0912.1050<\/a><\/strong><\/em><\/span><em><strong>,<\/strong><\/em>\u00a0<span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">2009.<\/span><\/p><p><strong>[40]<\/strong> C. Crespelle and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/s00453-008-9273-0\">Fully Dynamic Algorithm for Modular Decomposition and Recognition of Permutation Graphs<\/a>.\u00a0<strong><em>Algorithmica<\/em><\/strong>, 58(2):405-432, 2010.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/11604686_4\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop on Graph Theoretical Concepts in Computer Science- WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 3787 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 38-48, 2005.<\/span><\/p><p><strong>[39]<\/strong> M. Habib and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.cosrev.2010.01.001\">A survey on algorithmic aspects of modular decomposition<\/a>.\u00a0<em>Computer Science Review<\/em>, 4(1):41-59, 2010.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/0912.1457\">arXiv:0912.1457<\/a><\/strong><\/em>, 2009.<\/p><p><strong>[38]<\/strong> S. Bessy and C. Paul and A. Perez. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2010.07.002\">Polynomial kernels for 3-leaf power graph modification problems<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 158(16):1732-1744, 2010.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-642-10217-2_10\"><em><strong>Extended abstract<\/strong><\/em><\/a> in\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop On Combinatorial Algorithms \u2013 IWOCA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 5874 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 72-80, 2009.<br \/>See also <em><strong><a href=\"https:\/\/arxiv.org\/abs\/0809.2858\">arXiv:0809.2858<\/a><\/strong><\/em>, 2009.<\/span><\/p><p><strong>[37]<\/strong> D.H. Huson,\u00a0<span title=\"Regula Rupp\">R. Rupp<\/span>,\u00a0<span title=\"Vincent Berry\">V. Berry<\/span>, P.<span title=\"Philippe Gambette\">\u00a0Gambette<\/span>, C. Paul. <a href=\"https:\/\/doi.org\/10.1093\/bioinformatics\/btp217\">Computing galled networks from real data<\/a>. In\u00a0<em>International Conference on Intelligent Systems for Molecular Biology &#8211; ISMB<\/em>,\u00a0<strong>Bioinformatics<\/strong>, 25(12),\u00a02009.<\/p><p><strong>[36]<\/strong> P. Gambette, V. Berry and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/978-3-642-02441-2_26\">The structure of level-k phylogenetic networks<\/a>. In\u00a0<strong><em>Annual Symposium on Combinatorial Pattern Matching \u2013 CPM<\/em><\/strong>. Number 5577 in\u00a0<em>Lecture Notes in\u00a0Computer Science<\/em>, pages 289-300, 2009.\u00a0<\/p><p><strong>[35] <\/strong>S. Durocher, C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2008.10.006\">Kinetic maintenance of mobile k-centres on trees<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 157(7):1432-1446, 2009.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-77120-3_31\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Symposium on Algorithms and Computation<\/em>\u00a0\u2013\u00a0<em>ISAAC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 4825 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 341-352, 2007.<\/span><\/p><p><strong>[34]<\/strong> S. Guillemot, F. Nicolas, V. Berry and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2008.06.007\">On the approximability results for maximum agreement subtree and maximum compatible tree problems.<\/a>\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 157(7):1555-1570, 2009.<br \/>See also\u00a0<em><strong><a href=\"https:\/\/arxiv.org\/abs\/0802.2736\">arXiv:0802.2736<\/a><\/strong><\/em>, \u00a02008.<\/p><p><strong>[33]<\/strong>\u00a0C. Paul and J.A. Telle. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2008.08.006\">Branchwidth of chordal graphs<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 157(12):2718-2725, 2009.<\/p><p><strong>[32]<\/strong> C. Paul and J.A. Telle. <a href=\"http:\/\/Edge maximal graphs of branchwidth k : the k-branches.\" data-wplink-url-error=\"true\">Edge maximal graphs of branchwidth k : the k-branches.<\/a>\u00a0<strong><em>Discrete Mathematics<\/em><\/strong>, 309(6):1467-1475, 2009.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/11561071_35\"><em><strong>Extended abstract:<\/strong><\/em><\/a> New Tools and Simpler Algorithms for Branchwidth. In\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>European Symposium on Algorithms &#8211; ESA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 3669 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 379-390, 2005.<\/span><\/p><p><strong>[31]<\/strong> Y. Villanger, P. Heggerness, C. Paul and J.A. Telle. <a href=\"https:\/\/doi.org\/10.1137\/070710913\">Interval completion is fixed parameter tractable<\/a>. In <strong>SIAM Journal on Computing<\/strong>, 38(5):2007-2020 , 2009.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1145\/1250790.1250847\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>ACM Symposium on Theory of Computing \u2013 STOC<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 347-381, 2007.<\/span><\/p><p><strong>[30]<\/strong>\u00a0S. B\u00e9rard, A. Chateau, C. Chauve, C. Paul and E. Tannier. <a href=\"https:\/\/doi.org\/10.1089\/cmb.2009.0088\">Computation of perfect DCJ rearrangement with linear and circular chromosomes<\/a>. In <strong>Journal of Computational Biology<\/strong>, 16(10) :1287-1309, 2009.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-87989-3_12\"><em><strong>Extend abstract:<\/strong><\/em><\/a> Perfect DCJ rearrangement. In\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">A<strong>nnual RECOMB Satellite Workshop on Comparative Genomic \u2013 RECOMB-CG<\/strong><\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 5267 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Bioinformatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 156-167, 2008.\u00a0<\/span><\/p><p><strong>[29]<\/strong> D. Bremner, J. Lenchner, G. Liotta, C. Paul, M. Pouget, S. Stolpner, S. Wismath. <a href=\"https:\/\/hal-lirmm.ccsd.cnrs.fr\/lirmm-00324589\/file\/paper05full.pdf\">A note on \u03b1-drawable k-trees<\/a>. In\u00a0<strong><em>Canadian Conference on Computational Geometry \u2013 CCCG<\/em><\/strong>. 2008.<\/p><p><strong>[28]<\/strong> V. Berry, S. Guillemot, F. Nicolas and C. Paul. <a href=\"https:\/\/doi.org\/10.1145\/1497290.1497299\">Linear time 3-approximation for MAST problem<\/a>.\u00a0<strong><em>ACM Transcations on Algorithms<\/em><\/strong>, 5(2):1-18, 2009.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/11533719_14\"><em><strong>Extended abstract:<\/strong><\/em><\/a> On the Approximation of Computing Evolutionary Trees.\u00a0<\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Computing and Combinatorics Conference \u2013 COCOON<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 3595 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 115-125, 2005.<\/span><\/p><p><strong><b>[27]\u00a0<\/b><\/strong>B.M. Bui Xuan and M. habib and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.tcs.2007.10.048\">Competitive Graph Searches<\/a>.\u00a0<strong><em>Theoretical Computer Science<\/em><\/strong>, 393(1-3):72-80, 2008.<\/p><p><strong>[26]<\/strong> S. B\u00e9rard, C. Chauve and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.ipl.2007.10.012\">A more efficient algorithm for perfect sorting by reversals<\/a>.\u00a0<strong><em>Information Processing Letters<\/em><\/strong>, 106:90-95, 2008.<\/p><p><strong>[25]<\/strong> C. Gavoille and C. Paul. <a href=\"https:\/\/doi.org\/10.1137\/050635006\">Optimal Distance Labeling for Interval and Circular-Arc Graphs<\/a>.\u00a0<strong><em>SIAM Journal on Discrete Mathematics<\/em><\/strong>, 22(3) :1239-1258, 2008.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-39658-1_25\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Annual European Symposium on Algorithms \u2013 ESA<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">,\u00a0number 2832 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 254-265, 2003.<\/span><\/p><p><strong>[24]<\/strong> A. Bretscher, D. Corneil, M. Habib and C. Paul. <a href=\"https:\/\/doi.org\/10.1137\/060664690\">A simple linear time LexBFS cograph recognition algorithm<\/a>.\u00a0<strong><em>SIAM Journal on Discrete Mathematics<\/em><\/strong>, 22(4) :1277-1296, 2008.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-39890-5_11\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop on\u00a0Graph-Theoretic Concepts in Computer Science \u2013 WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 2880 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 119-130, 2003.\u00a0<\/span><\/p><p><strong>[23]<\/strong> M. Habib, D. Kelly, E. Lebhar and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.disc.2005.12.048\">Can transitive orientation make sandwich problems easier ?<\/a>\u00a0<strong><em>Discrete Mathematics<\/em><\/strong>, 307:2030-2041, 2007.<\/p><p><strong>[22]<\/strong> A. Bergeron, S. B\u00e9rard, C. Chauve, and C. Paul. <a href=\"https:\/\/doi.org\/10.1109\/TCBB.2007.1011\">Perfect sorting by reversals is not Always Difficult<\/a>.\u00a0<strong><em>IEEE-ACM Transaction on Computational Biology and Bioinformatics<\/em><\/strong>, 4(1):4-16, 2007.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/11557067_19\"><em><strong>Extended abstract<\/strong><\/em><\/a> in<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><strong>\u00a0International Workshop on Algorithm in Bioinformatics &#8211; WABI<\/strong><\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">. Number 3692 in <\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Bioinformatics<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 228-238, 2005.<\/span><\/p><p><strong>[21]<\/strong> C. Paul, A. Proskurowski and J.A. Telle. <a href=\"https:\/\/doi.org\/10.1007\/11917496_19\">Algorithmic generation of graphs of branchwidth &lt;= k<\/a>. In\u00a0<strong><em>International Workshop on Graph Theoretical Concepts in Computer Science \u2013 WG<\/em><\/strong>, number 4271 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 206-216, 2006.<\/p><p><strong>[20]<\/strong> C. Crespelle and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2006.03.005\">Fully-Dynamic Recognition Algorithm and Certificate for Directed Cographs.<\/a>\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 154(12):1722-1741, 2006.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-30559-0_8\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop on Graph Theoretical Concepts in Computer Science \u2013 WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, number 3353 in\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 93-104, 2004.<\/span><\/p><p><strong>[19]<\/strong> P. Fraigniaud and C. Gavoille and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/s00446-005-0137-4\">Eclecticism Shrinks Even Small Worlds<\/a>.\u00a0<strong><em>Journal of Distributed Computing<\/em><\/strong>, 18(4):279-291, 2006.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1145\/1011767.1011793\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing \u2013 PODC<\/em><\/strong><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">,<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">\u00a0pages 168-178, 2004.<\/span><\/p><p><strong>[18]<\/strong> B.M. Bui Xuan, M. Habib and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/11602613_16\">Revisiting Uno and Yagiura\u2019s Algorithm<\/a>. In<em>\u00a0<strong>International Symposium on Algorithms and Computation- ISAAC<\/strong><\/em>, number 3827 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 146\u2013155, 2005.<\/p><p><strong>[17]<\/strong> C. Paul,\u00a0<span title=\"Jan Arne Telle\">J.A. Telle.\u00a0<\/span><a href=\"https:\/\/doi.org\/10.1016\/j.endm.2005.06.075\">Edge-maximal graphs of branchwidth k<\/a>. In <em><strong>International Colloquium on Graph Theory &#8211; ICGT<\/strong><\/em>.\u00a0<em>Electronic Notes in Discrete Mathematics,\u00a0<\/em>22: 363-368, 2005.<\/p><p><strong>[16]<\/strong> M. Habib and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/j.dam.2004.01.011\">A Simple Linear Time Algorithm for Cograph Recongition<\/a>.\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 145(2):183-197, 2005.<\/p><p><strong>[15]<\/strong> M. Habib, C. Paul and M. Raffinot. <a href=\"https:\/\/doi.org\/10.1007\/978-3-540-27801-6_27\">Common connected Components of Interval Graphs<\/a>. In\u00a0<strong><em>Annual Combinatorial Pattern Matching Symposium \u2013 CPM<\/em><\/strong>, number 3109 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 347-358, 2004.<\/p><p><strong>[14]<\/strong> M. Habib, F. de Montgolfier and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/978-3-540-27810-8_17\">A simple linear-time modular decomposition algorithm<\/a>. In\u00a0<em>\u00a0<strong>Scandinavian Workshop on Algorithm Theory &#8211; SWAT<\/strong><\/em>, number 3111 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 187-198, 2004.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">There is a flaw in the algorithm presented in that paper.<\/span><\/p><p><strong>[13]<\/strong> M. Bouklit and D. Coudert and J.-F. Lalande and C. Paul and H. Rivano. <a href=\"https:\/\/hal-lirmm.ccsd.cnrs.fr\/lirmm-00269524\">Approximate multicommodity flow for WDM networks design<\/a>. In <strong><em>International Colloquium on Structural Information Complexity \u2013 SIROCCO<\/em>,<\/strong> number 17 of <em>Proceedings in Informatics<\/em>, Carleton Scientific, pages 43-56, \u00a02003.<\/p><p><strong>[12]<\/strong> C. Gavoille and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/S0012-365X(03)00232-2\">Distance labeling and split decomposition<\/a>.\u00a0<strong><em>Discrete Mathematics<\/em><\/strong>, 273(1-3):115-130, 2003.<\/p><p><strong>[11]<\/strong> M. Habib and E. Lebhar and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/S0020-0190(03)00265-5\">A note on finding all homogeneous set sandwiches<\/a>.\u00a0<strong><em>Information Processing Letters<\/em><\/strong>, 87:147-151, 2003.<\/p><p><strong>[10]<\/strong> D. Corneil, F. Dragan, M. Habib, and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/S0166-218X(00)00281-X\">Diameter determination on restricted graph families.<\/a>\u00a0<strong><em>Discrete Applied Mathematics<\/em><\/strong>, 113(2-3):143-166, 2001.<br \/><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><a href=\"https:\/\/doi.org\/10.1007\/10692760_16\"><em><strong>Extended abstract<\/strong><\/em><\/a> in <\/span><strong style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\"><em>International Workshop Graph-Theoretic Concepts in Computer Science \u2013 WG<\/em><\/strong><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, volume 1517 of\u00a0<\/span><em style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">Lecture Notes in Computer Science<\/em><span style=\"color: var( --e-global-color-text );font-family: var( --e-global-typography-text-font-family ), Sans-serif\">, pages 192-202, 1998.<\/span><\/p><p><strong>[9]<\/strong> M. Habib, C. Paul, and L. Viennot. <a href=\"https:\/\/doi.org\/10.46298\/dmtcs.269\">Linear time recognition of\u00a0<em>P<\/em>4-indifference graphs<\/a>.\u00a0<strong><em>Discrete Mathematics and Theoretical Computer Science<\/em>,<\/strong> 4(2):173-178, 2001. Special issue: Graph Decomposition.<\/p><p><strong>[8]<\/strong> <span title=\"Cyril Gavoille\">C. Gavoille<\/span>, C. Paul.\u00a0<a href=\"https:\/\/doi.org\/10.1016\/S1571-0653(04)00374-9\">Split Decomposition and Distance Labelling: An Optimal Scheme For Distance Hereditary Graphs<\/a>. In <em><strong>Euroconference on Combinatorics, Graph Theory and Applications &#8211; EuroComb<\/strong><\/em>.\u00a0<em>Electronic Notes in Discrete Mathematics<\/em>, 10:117-120, 2001.<\/p><p><strong>[7]<\/strong> G. Damiand, M. Habib, and C. Paul. <a href=\"https:\/\/doi.org\/10.1016\/S0304-3975(00)00234-6\">A simple paradigm for graph recognition : application to cographs and distance hereditary graphs<\/a>.\u00a0<strong><em>Theoretical Computer Science<\/em><\/strong>, 263:99-111, 2001.\u00a0<\/p><p><strong>[6]<\/strong>\u00a0C. Gavoille, M. Katz, N. Katz, C. Paul, and D. Peleg. <a href=\"https:\/\/doi.org\/10.1007\/3-540-44676-1_40\">Approximate distance labeling scheme<\/a>. In <strong><em>Annual European Symposium on Algorithms &#8211; ESA<\/em><\/strong>, number 2161 in\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 476-487. 9th , 2001.<\/p><p><strong>[5]<\/strong> <span title=\"Cyril Gavoille\">C. Gavoille<\/span>, C. Paul.\u00a0<a href=\"https:\/\/doi.org\/10.1016\/S1571-0653(05)80145-3\">Approximate Distance Labeling Schemes<\/a>. In\u00a0<strong><em>International Conference on Graph Theory &#8211; ICGT<\/em><\/strong>. <em>Electronic Notes in Discrete Mathematics<\/em>, 5: 134-137, 2000.<\/p><p><strong>[4]<\/strong> M. Habib, R. McConnell, C. Paul, and L. Viennot. <a href=\"https:\/\/doi.org\/10.1016\/S0304-3975(97)00241-7\">Lex-BFS and partition refinement, with applications to transitive orientation, interval graph recognition and consecutive ones testing<\/a>.\u00a0<strong><em>Theoretical Computer Science<\/em><\/strong>, 234:59-84, 2000.<\/p><p><strong>[3]<\/strong> M. Habib, C. Paul, and L. Viennot. <a href=\"https:\/\/doi.org\/10.1142\/S0129054199000125\">Partition refinement: an interested algorithmic tool kit.<\/a>\u00a0<strong><em>International Journal of Foundation of Computer Science<\/em><\/strong>, 10(2):147-170, 1999<\/p><p><strong>[2]\u00a0<\/strong>M. Habib, C. Paul, and L. Viennot. <a href=\"https:\/\/doi.org\/10.1007\/BFb0028546\">A synthesis on partition refinement: a useful routine for strings, graphs, boolean matrices and automata.<\/a> In <em><strong>International\u00a0Symposium on Theoretical Aspect of Computer Science \u2013 STACS<\/strong>,<\/em>\u00a0number 1373 in <em>Lecture Notes in Computer Science<\/em>, pages 25-38, 1998.<\/p><p><strong>[1]\u00a0<\/strong>P. Galinier, M. Habib, and C. Paul. <a href=\"https:\/\/doi.org\/10.1007\/3-540-60618-1_88\">Chordal graphs and their clique graph<\/a>. In <em><strong>International Workshop on\u00a0Graph-Theoretic Concepts in Computer Science \u2013 WG<\/strong>,<\/em>\u00a0volume 1017 of\u00a0<em>Lecture Notes in Computer Science<\/em>, pages 358-371, 1995.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publications (complete versions gathered with the extended abstract, if any) [92]\u00a0C. Paul,\u00a0E. Protopapas, D.M. Thilikos and S. Wiederrecht. Obstructions to Erd\u00f6s-Posa dualities for minors. In\u00a0IEEE&hellip;<\/p>\n","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_crdt_document":"","_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-2266","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Christophe PAUL","author_link":"https:\/\/www.lirmm.fr\/christophe-paul\/author\/christophe-paul\/"},"uagb_comment_info":0,"uagb_excerpt":"Publications (complete versions gathered with the extended abstract, if any) [92]\u00a0C. Paul,\u00a0E. Protopapas, D.M. Thilikos and S. Wiederrecht. Obstructions to Erd\u00f6s-Posa dualities for minors. In\u00a0IEEE&hellip;","_links":{"self":[{"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/pages\/2266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/comments?post=2266"}],"version-history":[{"count":0,"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/pages\/2266\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lirmm.fr\/christophe-paul\/wp-json\/wp\/v2\/media?parent=2266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}