Multi-Constrained QoS Routing: A Norm Approach

Size: px
Start display at page:

Download "Multi-Constrained QoS Routing: A Norm Approach"

Transcription

1 1 Multi-Constrained QoS Routing: A Norm Approach Guoliang Xue, Senior Member, IEEE and S. Kami Makki, Member, IEEE Abstract A fundamental problem in quality-of-service (QoS) routing is the multi-constrained path (MCP) problem, where one seeks a source-destination path satisfying K 2 additive QoS constraints in a network with K additive QoS parameters. The MCP problem is known to be NP-complete. ne popular approach is to use the shortest path with respect to a single edge weighting function as an approximate solution to MCP. In a pioneering work, affe showed that the shortest path with respect to a scaled 1-norm of the K edge weights is a 2-approximation to MCP in the sense that the sum of the larger of the path weight and its corresponding constraint is within a factor of 2 from minimum. In a recent paper, Xue et al. showed that the shortest path with respect to a scaled -norm of the K edge weights is a K-approximation to MCP, in the sense that the largest ratio of the path weight over its corresponding constraint is within a factor of K from minimum. In this paper, we study the relationship between these two optimization criteria and present a class of provably good approximation algorithms to MCP. We first prove that a good approximation according to the second optimization criterion is also a good approximation according to the first optimization criterion, but not vice versa. We then present a class of very simple K-approximation algorithms according to the second optimization criterion, based on the computation of a shortest path with respect to a single edge weighting function. Index Terms QoS routing, multiple additive QoS parameters, approximation algorithms, scaled p-norm. 1. INTRDUCTIN A fundamental problem in quality-of-service (QoS) routing is the multi-constrained path (MCP) problem, where one seeks a source-destination path satisfying K 2 additive QoS constraints in a network with K additive QoS parameters, such as cost, delay, and reliability [2], [10], [18], [20], [25]. Commonly, the network is modeled by a directed graph where the n vertices represent computers or routers and the m edges represent links. To model multiple QoS parameters, each edge is associated with K edge weights, representing cost, delay, and reliability, etc., of the edge. Correspondingly, each path has multiple path weights associated with it, representing cost, delay, and reliability, etc., of the path. If an edge weight represents cost or delay of the edge, then the corresponding path weight is the sum of the weights associated with the edges on the path. For this reason, QoS parameters such as cost and delay are called additive parameters. If an edge weight represents the reliability of the edge, then the corresponding Guoliang Xue is a Full Professor in the Department of Computer Science and Engineering at Arizona State University, Tempe, AZ xue@asu.edu. The research of this author was supported in part by AR grant W911NF and NSF grants CCF and ANI S. Kami Makki is an Assistant Professor with the Department of Electrical Engineering & Computer Science at The University of Toledo, Toledo, H kmakki@eng.utoledo.edu. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research ffice or the U.S. Government. path weight is the product of the weights associated with the edges on the path. Since the logarithm of the product of N positive numbers is the sum of the logarithms of the N positive numbers, QoS parameters such as reliability are also called additive parameters. It is well known that the MCP problem is NP-complete as long as there are K 2 additive QoS parameters [25]. Another kind of QoS parameters are known as concave parameters (such as bandwidth) where the corresponding weight of a path is the smallest of the weights of the edges on the path [25]. Problems involving concave QoS parameters can be easily solved by considering a polynomial number of subgraphs each with only those edges whose weights are greater than or equal to a particular chosen value. Therefore the number of concave QoS parameters does not affect the computational complexity of the MCP problem (whether it is in P or NP-complete). If all QoS parameters are concave, or all except one of the QoS parameters are concave, the MCP problem is polynomial time solvable. Therefore in this paper we restrict our attention to additive parameters only. Due to its increasing important applications, the MCP problem has been studied by many researchers. Existing works for this problem can be classified into two broad classes: sophisticated approximation schemes, and simple heuristic algorithms. An approximation scheme can compute, for any constant ɛ > 0, a path that is within a factor of (1 + ɛ) of the optimal solution, with a running time that is bounded by a polynomial in the input size of the given instance, with ɛ treated as a constant. Heuristic algorithms are normally simple and fast, without providing a priori theoretical guarantees of the computed path. Many heuristic algorithms for MCP have been proposed for both the special case of K = 2 and the general case of K 2. affe in [10] studied the MCP problem with K = 2 and presented simple and provably good approximation algorithms, using an optimization criterion that is formally defined in Section 2. This work was generalized to the general case of K 2 by Andrew and Kusuma in [1]. Chen et al. in [2] studied the MCP problem with K = 2 and proposed a polynomial time heuristic algorithm based on scaling and rounding of the second parameter so that the second parameter of each edge is approximated by a bounded integer. In [32], Yuan generalized the heuristic of [2] to the case of K 2 and proposed a limited granularity heuristic. For any given ɛ > 0, this heuristic algorithm has time complexity (mn( n ɛ )K 1 ) and can find a feasible path if there is a path whose last K 1 path weights are no more than (1 ɛ) of the corresponding constraints, but may fail to find a path when this condition does not hold. Korkmaz et al. in [14] proposed a randomized heuristic for the MCP problem, which may find a feasible path quickly, but may fail even when there is a feasible path. Liu et al. in [16] proposed a selection function approach to

2 2 study the tradeoff between the quality of the path and the time required to compute the path. Related works can be found in [11], [14], [20], [21], [22], [23] and the references therein. Many researchers have proposed to obtain a new edge weighting function using the K edge weights and use the shortest path with respect to this new edge weighting function as an approximation to the MCP problem. Works along this line can be found in [4], [12], [13], [27], [28], [29]. Researchers have also investigated integrated path metrics using a linear or nonlinear combination of the K path weights [15], [23], [24]. Most of the existing approximation schemes concentrate on the MCP problem with two additive QoS parameters. Warburton in [26] first developed a fully polynomial time approximation scheme (FPTAS) [5] for the MCP problem on an acyclic graph. Hassin in [9] presented an improved FPTAS. Lorenz and Raz in [17] presented an even better FPTAS with a time complexity of (mn(log log n + 1 ɛ )), where ɛ is the approximation parameter. Their FPTAS applies to general graphs, rather than just acyclic graphs. Goel et al. in [6] presented an approximation algorithm for the single source all destinations delay sensitive least cost path problem with a time complexity of ((m+n log n) H ɛ ), where H is the hop count of the longest computed path. Ergun et al. in [3] presented an FPTAS for the case of acyclic graphs with a time complexity of (m( n ɛ )). rda and Sprintson in [19] studied disjoint QoS paths. Xue et al. in [31] studied the MCP problem with K being any integer constant greater than or equal to 2. They presented an FPTAS for general graphs with a time complexity of ((m( n ɛ )K 1 ) and a very simple K- approximation algorithm by computing a shortest path with respect to a scaled -norm of the K edge weights. In this paper, we study the relationship between the optimization criterion used in [1], [10] and the optimization criterion used in [2], [16], [22], [23], [24], [27], [28], [29], [30], [31], [32], and present a class of provably good approximation algorithms for the MCP problem. We first prove that a good approximation according to the second optimization criterion is also a good approximation according to the first optimization criterion, but not vice versa. We then present a class of very simple K-approximation algorithms according to the second optimization criterion, based on the computation of a shortest path with respect to a single edge weighting function. ur results provide a theoretical support of many heuristic algorithms for the MCP problem that are based on a shortest path with respect to a single edge weighting function which is a linear combination of the K edge weights. The class of K-approximation algorithms presented in this paper contains, as special cases, the K-approximation algorithm of Xue et al. [31], the algorithm of affe [10], the algorithm of Andrew and Kusuma [1], along with many other algorithms which are not previously known. The rest of this paper is organized as follows. In Section 2, we define the problems and some notations. We also study the relationship between two optimization criteria used for solving the MCP problem. In Section 3, we present a class of K- approximation algorithms for MCP which are based on the computation of a shortest path with respect to a single edge weighting function. We conclude this paper in Section PRBLEM DEFINITINS AND CMPARISN F PTIMIZATIN CRITERIA We use an integer constant K 2 to denote the number of additive QoS parameters. Unless specified otherwise, all other constants, functions, and variables are assumed to have real values. All logarithms are based-2 logarithms. A polynomial time β-approximation algorithm for a minimization problem is an algorithm A that, for any instance of the problem, computes a solution that is at most β times the optimal solution of the instance, in time bounded by a polynomial in the input size of the instance [5]. We model a computer network using a K-edge weighted directed graph G = (V, E, ω), where V is the set of n vertices, E is the set of m edges, and ω = (ω 1,..., ω K ) is an edge weight vector so that ω k (e) 0 is the k th weight of edge e, e E, 1 k K. For a path π in G, the k th weight of π, denoted by ω k (π), is the sum of the k th weights over the edges on π: ω k (π) = e π ω k(e). Throughout this paper, we will use s V and t V to denote the source node and the destination node. We will use W = (W 1,..., W K ) to denote a constraint vector where each is a positive constant. For a path π connecting s to t, we are interested in the following two path metrics. f AFFE (π) = max{ω k (π), }. (2.1) f MCP (π) = max 1 k K ω k (π). (2.2) f AFFE (π) measures the sum (over k {1,..., K}) of the larger of the kth path weight ω k (π) and the kth constraint. This path metric was introduced by affe [10] and has also been used in [1]. f MCP (π) measures the maximum (over k {1,..., K}) of the ratio of the kth path weight ω k (π) over the kth constraint. This path metric has been used by researchers in [2], [16], [22], [23], [24], [27], [29], [30], [31], [32]. The decision version of the multi-constrained path (DMCP) problem is defined in the following. Definition 2.1 (DMCP(G, s, t, K, W, ω)): INSTANCE: a K-edge weighted directed graph G = (V, E, ω), with K nonnegative real-valued edge weights ω k (e), 1 k K, associated with each edge e E; a constraint vector W = (W 1,..., W K ) where each is a positive constant; and a source-destination node pair (s, t). QUESTIN: is there an s t path π such that ω k (π), 1 k K? In the above definition, the inequality ω k (π) is called the k th QoS constraint. A path π satisfying all K QoS constraints is called a feasible path or a feasible solution of DMCP(G, s, t, K, W, ω). It is clear that an s t path π is a feasible solution to DMCP(G, s, t, K, W, ω) if and only if f MCP (π) 1. We say that DMCP(G, s, t, K, W, ω) is feasible if it has a feasible path, and infeasible otherwise. We may simply use DMCP to denote DMCP(G, s, t, K, W, ω), without any confusion, the same rule can be applied to MCP and MCP defined in the sequel. The DMCP problem is known to be NP-complete [5], [25], for any integer K such that K 2. Therefore the following

3 3 optimization version of this problem has been studied in the literature [30], [31]. Definition 2.2 (MCP(G, s, t, K, W, ω)): INSTANCE: a K-edge weighted directed graph G = (V, E, ω), with K nonnegative real-valued edge weights ω k (e), 1 k K, associated with each edge e E; a constraint vector W = (W 1,..., W K ) where each is a positive constant; and a source-destination node pair (s, t). PRBLEM: find an s t path π such that f MCP (π ) f MCP (π) for any s t path π. We call π an optimal path or an optimal solution of MCP(G, s, t, K, W, ω), and call f MCP (π ) the optimal value of MCP(G, s, t, K, W, ω). It is clear that 1 if and only if DMCP(G, s, t, K, W, ω) is feasible. In [10], affe studied the following optimization version of the multi-constrained path problem. Definition 2.3 (MCP(G, s, t, K, W, ω)): INSTANCE: a K-edge weighted directed graph G = (V, E, ω), with K nonnegative real-valued edge weights ω k (e), 1 k K, associated with each edge e E; a constraint vector W = (W 1,..., W K ) where each is a positive constant; and a source-destination node pair (s, t). PRBLEM: find an s t path π such that f AFFE (π ) f AFFE (π) for any s t path π. We call π an optimal path or an optimal solution of MCP(G, s, t, K, W, ω), and call f AFFE (π ) the optimal value of MCP(G, s, t, K, W, ω). Clearly, = K when DMCP is feasible and > K otherwise. affe proposed to design efficient approximation algorithms for MCP, based on the shortest path with respect to a single edge weighting function. Indeed, affe in [10] (for the case of K = 2) and Andrew and Kusuma in [1] (for the case of K > 2) showed that for carefully chosen positive numbers α 1,..., α K, the shortest s t path π α with respect to the edge weighting function guarantees that ω α (e) = α k ωk(e), e E (2.3) f AFFE (π α ) (2 1 K ) ζopt. (2.4) In addition, with α1 = = αk = 1, the s t path π α with respect to ω α guarantees that f AFFE (π α ) 2. (2.5) In other words, one can obtain a 2-approximation to the MCP problem by computing a shortest path with respect to a single edge weighting function that is a linear combination of the K edge weights. The MCP problem has been studied by many researchers [2], [16], [22], [23], [27], [28], [29], [30], [31]. In a recent paper, Xue et al. [31] studied the MCP problem and presented a K-approximation algorithm based on the computation of a shortest path with respect to a single edge weighting function defined in the following. ω max (e) = ω k (e) max, e E. (2.6) 1 k K We call the edge weighting function ω α (e) the scaled 1- norm of the K edge weighting functions ω 1 (e),..., ω K (e), and call the edge weighting function ω max (e) the scaled - norm of the K edge weighting functions ω 1 (e),..., ω K (e), formally defined in the next section. n one hand, we know that the shortest path with respect to the scaled 1-norm is a 2-approximation to the MCP problem. n the other hand, we know that the shortest path with respect to the scaled - norm is a K-approximation to the MCP problem. A natural question to ask is the following. Should we strive to compute a path π which is a good approximation to MCP or should we strive to compute a path π which is a good approximation to MCP? The following theorem shows that a good approximation to MCP is also a good approximation to MCP, but a good approximation to MCP could be a very poor approximation to MCP. Theorem 2.1: Let β 1 be any given constant. 1) If s t path π is a β-approximation to MCP(G, s, t, K, W, ω), then π is also a max{1, β }-approximation to MCP(G, s, t, K, W, ω), where is the optimal value of MCP(G, s, t, K, W, ω). 2) Let η > 0 be an arbitrarily large constant and ɛ > 0 be an arbitrarily small constant. There exist a K- edge weighted graph G(V, E, ω 1,..., ω K ), QoS constraints W = (W 1,..., W K ), source-destination node pair (s, t), and an s t path π such that π is a (1 + ɛ) approximation to MCP(G, s, t, K, W, ω), but is not a η -approximation to MCP(G, s, t, K, W, ω) for any η < η, where [1, 2] is the optimal value of the corresponding MCP(G, s, t, K, W, ω) instance. PRF. Let π be a β-approximation to MCP. We have ω k (π) β, 1 k K. Therefore max{ω k (π), } max{β, 1}, 1 k K. (2.7) As a result, we have f AFFE (π) = KX max{ω k (π), } max{β K, 1} X. (2.8) It follows from the definition of f AFFE ( ) that for any s t path π we must have f AFFE (π) = max{ω k (π), }. (2.9) Inequalities (2.8) and (2.9) together imply that π is a max{1, β }-approximation to MCP. This proves our first claim. Next, we will construct an example to validate our second claim. The graph G (illustrated in Figure 1(a) for K = 3) has vertex set V = {s, t, x, y}, edge set E = {(s, x), (s, y), (x, t), (y, t)}, with edge weighting functions ω k so that ω 1 (s, x) = = ω K 1 (s, x) = 1 + ɛ,

4 + 4 s x t s & %&'() '()* x.0/213/215476! "#$ # t (0, 0, 0) y (0, 0, 0) y %& & ) ), - + (a) DMCP is infeasible (b) DMCP is feasible Fig. 1. A (1 + ɛ) approximation to MCP could be a very poor approximation to MCP. ω K (s, x) = 0; ω 1 (x, t) = = ω K 1 (x, t) = 0, ω K (x, t) = (1 + ɛ)δ; ω 1 (s, y) = = ω K (s, y) = 0; ω 1 (y, t) = = ω K 1 (y, t) = 1, ω K (y, t) = ηδ. We also assume (W 1,..., W K 1, W K ) = (1,..., 1, δ). The parameters η, ɛ and δ are chosen in the following way: η > 0 is a given arbitrarily large constant (compared with K and ɛ) and ɛ (0, 1] is an arbitrarily small constant such that η is much larger than 1+ɛ. After η and ɛ are fixed, we choose δ > 0 sufficiently small so that (1+ɛ)(K 1+δ) > K 1+ηδ. This is possible because (1 + ɛ)(k 1 + δ) lim = 1 + ɛ > 1. (2.10) δ 0 K 1 + ηδ There are exactly two s t paths in G: π 1 = s x t and π 2 = s y t. The path weights of π 1 are ω 1 (π 1 ) = = ω K 1 (π 1 ) = 1 + ɛ, ω K (π 1 ) = (1 + ɛ)δ. The path weights of π 2 are ω 1 (π 2 ) = = ω K 1 (π 2 ) = 1, ω K (π 2 ) = ηδ. Therefore we have f MCP (π 1 ) = 1 + ɛ, f AFFE (π 1 ) = (1 + ɛ)(k 1 + δ), f MCP (π 2 ) = η; f AFFE (π 2 ) = K 1 + ηδ. By our choice of η, ɛ and δ, π 1 is the optimal solution to MCP, and π 2 is the optimal solution to MCP. = 1+ɛ, = K 1+ηδ. However, π 2 is a very poor approximation to MCP, as f MCP (π 2) η 2 and η is a very large number. In particular, for any η < η, π 2 is not a η -approximation to MCP. In the above example, the DMCP instance is infeasible. Similar conclusions can be drawn if we add to graph G an edge (s, t) with weights ω 1 (s, t) = = ω K 1 (s, t) = 1, and ω K (s, t) = δ (illustrated in Figure 1(b) for K = 3), where the corresponding DMCP instance is feasible. In this case, the path π 3 = s t is the optimal path for both MCP and MCP. = 1, ζopt = K 1 + δ. The path π 2 is a (1 + ɛ)-approximation to MCP. However, = f MCP (π 2 ) = η, which is a very large number. f MCP (π 2) 3. A CLASS F K-APPRXIMATIN ALGRITHMS In this section, we will present a class of approximation algorithms for MCP(G, s, t, K, W, ω) each of which can find an s t path π in (Km + n log n) time such that ω k (π) K, for 1 k K. In other words, each algorithm in this class is a K-approximation algorithm for MCP(G, s, t, K, W, ω). ur class of K-approximation algorithms is based on the notion of scaled p-norm (defined in the following) in K dimensional Euclidean space R K. We first define scaled p- norm in Section 3-A. We then present a very general K- approximation algorithm in Section 3-B. We discuss special cases of this K-approximation algorithm in Section 3-C. A. Scaled p-norm Let p 1 be any real number. Let x = (x 1,..., x K ) be any point in R K, the K-dimensional Euclidean space. Let W = (W 1,..., W K ) be an ordered sequence of K positive real numbers. We define the W -scaled p-norm of x (denoted by x p, W ) by the following equation: [ K ( ) ] 1 p p xk x p, W =. (3.1) By letting p in (3.1), we obtain x, W = x k max. (3.2) 1 k K By letting p = 1 in (3.1), we have x 1, W = K x k. We call x 1, W the W -scaled 1-norm of x and call x, W the W -scaled -norm of x. It is a simple mathematical exercise [7], [8] that x, W x p, W x 1, W, 1 p. (3.3) B. A General K-Approximation Algorithm for MCP In this section, we present a very general K-approximation algorithm for MCP(G, s, t, K, W, ω). The algorithm is listed in the following as Algorithm 1. We will discuss important special cases of this algorithm in next section. Theorem 3.1: Algorithm 1 finds an s t path π R in (Km + n log n) time. Moreover, π R is a K-approximation to MCP(G, s, t, K, W, ω). In other words, ω k (π R ) K, 1 k K, where is the optimal value of MCP(G, s, t, K, W, ω).

5 5 Algorithm 1 General-MCP(G, s, t, K, W, ω) 1: Construct an auxiliary graph G R = (V, E, ω R ) where V and E are the same as in G and ω R is a new edge weighting function such that for each e E, ω R (e) satisfies the following inequality: (ω 1 (e),..., ω K (e)), W ω R (e) (ω 1 (e),..., ω K (e)) 1, W. 2: Compute a shortest s t path π R in G R, with respect to the edge weighting function ω R. utput π R. PRF. The graph G R can be constructed in (n + Km) time, as we need to spend (K) time to compute ω R (e) for each edge e E, leading to (Km) time for all edges. Using Dijkstra s shortest path algorithm, π R can be computed in (m + n log n) additional time. This proves the time complexity of the algorithm. Recall that is the optimal value of MCP(G, s, t, K, W, ω). Therefore there exists an s t path π opt such that ω k (π opt ), 1 k K. This implies e π opt ω k (e), 1 k K. (3.4) We can rewrite (3.4) as ω k (e) e π opt e π opt, 1 k K. (3.5) Summing (3.5) over all K possible values of k, we have ω k (e) K W. (3.6) k It follows from the definition of ω R that KX ω R ω k (e) (e) (ω 1(e),..., ω K(e)) 1, W =, e E. (3.7) Therefore (3.6) and (3.7) imply ω R (π opt ) = X e π opt ω R (e) X KX e π opt ω k (e) K. (3.8) Since π R is a shortest s t path in G R, we have (using inequality (3.8)) ω R (π R ) ω R (π opt ) K. (3.9) Using the definition of ω R ( ), we have e π max ω k(e) R = max 1 k K 1 k K ω k (e) ω k (e) max ω R (e) 1 k K = ω R (π R ) K. (3.10) This implies ω k (π R ) = ω k (e) K, 1 k K. (3.11) In other words, π R is a K-approximation to MCP(G, s, t, K, W, ω). C. Special Cases of the General K-Approximation Algorithm In Section 3-B, we have presented a general K- approximation algorithm for MCP(G, s, t, K, W, ω). That algorithm is based on computing a shortest s t path with respect to a new edge weighting function ω R (e), where (ω 1 (e),..., ω K (e)), W ω R (e) (ω 1 (e),..., ω K (e)) 1, W, e E. Here we discuss some important special choices of ω R ( ). Example 3.1: As our first special case, we choose ω R (e) = (ω 1 (e),..., ω K (e)), W. Since this choice of ω R ( ) satisfies the condition of Algorithm 1, we have Corollary 3.1: A K-approximation to MCP can be obtained by computing a shortest s t path with respect to the edge weighting function ω R (e) = (ω 1 (e),..., ω K (e)), W. This is the edge weighting function used by Xue et al. in [31]. This example shows that Algorithm 1 contains the K-approximation algorithm for MCP presented in [31] as a special case. Example 3.2: As our second special case, we choose ω R (e) = (ω 1 (e),..., ω K (e)) 1, W. Since this choice of ω R ( ) satisfies the condition of Algorithm 1, we have Corollary 3.2: A K-approximation to MCP can be obtained by computing a shortest s t path with respect to the edge weighting function ω R (e) = (ω 1 (e),..., ω K (e)) 1, W. This is the edge weighting function used by affe in [10] for K = 2 and by Andrew and Kusuma in [1] for K 2. This is representative of the algorithms for MCP based on the computation of a shortest path with respect to a single edge weighting function which is a linear or nonlinear combination of the K edge weights [1], [4], [10], [12], [13], [23], [27], [24], [29]. It has been shown in [1], [10] that the shortest path with respect to (ω 1 (e),..., ω K (e)) 1, W is a 2-approximation to MCP. According to Theorem 2.1, a 2-approximation to MCP could be a very poor approximation to MCP. Corollary 3.2 asserts that the shortest s t path with respect to (ω 1 (e),..., ω K (e)) 1, W is a good approximation to MCP as well. Therefore Corollary 3.2 reveals new properties of a known algorithm. Example 3.3: As our third special case, we choose ω R (e) = (ω 1 (e),..., ω K (e)) p, W, where p (1, ) is a fixed real number. According to (3.3), this choice of ω R ( ) satisfies the condition of Algorithm 1. Therefore we have Corollary 3.3: Let p (1, ) is a fixed real number. A K-approximation to MCP can be obtained by computing a shortest s t path with respect to the edge weighting function ω R (e) = (ω 1 (e),..., ω K (e)) p, W. Corollary 3.3 reveals a class of K-approximation algorithms for the MCP problem that we are not aware of before. Together with Corollaries 3.1 and 3.2, it says that a K- approximation to the MCP problem can be obtained by computing a shortest s t path with respect to the scaled p-norm of the K edge weights, for any given value of p in the interval [1, ]. We want to emphasize that it is not our goal to include as many algorithms as possible. It is our goal to reveal some intrinsic properties of the MCP

6 6 problem. We have proved that every scaled p-norm leads to a simple K-approximation algorithm for the MCP problem. It is interesting to find out which value of p leads to the best algorithm in this class, in terms of theoretical guarantees and practical implementations. This forms an important future research topic. 4. CNCLUSINS In this paper, we have studied the multi-constrained QoS routing problem where each edge has K 2 additive QoS parameters. We studied the relationship between two wellknown optimization criteria used in the literature. We then presented a class of K-approximation algorithms that are based on a shortest path with respect to a single edge weighting function. We have demonstrated that our class of algorithms contains some well-known algorithms as special cases. ur results provide a strong theoretical foundation for fast heuristic algorithms for the MCP problem based on the computation of a shortest path with respect to a single edge weighting function which is a linear combination of the K edge weights. ACKNWLEDGMENT The authors wish to thank the associate editor and three anonymous reviewers whose comments on an earlier version of this paper have helped to significantly improve the presentation of this paper. REFERENCES [1] L.L.H. Andrew and A.A.N.A. Kusuma; Generalised analysis of a QoSaware routing algorithm; IEEE Globecom 1998; pp [2] S. Chen and K. Nahrstedt; n finding multi-constrained paths; IEEE ICC 1998; pp [3] F. Ergun, R. Sinha and L. Zhang; An improved FPTAS for restricted shortest path; Information Processing Letters; Vol. 83(2002), pp [4] G. Feng, C. Douligeris, K. Makki, N. Pissinou; Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation; IEEE ICC 2002; pp [5] M.R. Garey and D.S. ohnson; Computers and Intractability: A Guide to the Theory of NP-Completeness; W.H. Freeman, [6] A. Goel, K.G. Ramakrishnan, D. Kataria and D. Logothetis; Efficient computation of delay-sensitive routes from one source to all destinations; IEEE Infocom 2001; pp [7] G.H. Golub and C.F. Van Loan; Matrix Computations; 2nd edition, The ohns Hopkins University Press, [8] G.H. Hardy,.E. Littlewood, G. Polya; Inequalities; Cambridge University Press, Cambridge, [9] R. Hassin; Approximation schemes for the restricted shortest path problem; Mathematics of perations Research; vol. 17(1992), pp [10].M. affe; Algorithms for finding paths with multiple constraints; Networks ournal; Vol. 14(1984), pp [11] X. ia; A distributed algorithm of delay bounded multicast routing for multimedia applications in wide area networks; IEEE/ACM Transactions on Networking; Vol. 6(1998), pp [12] A. uttner, B. Szviatovszki, I. Mecs and Z. Rajko; Lagrange relaxation based method for the QoS routing problem; IEEE Infocom 2001; pp [13] P. Khadivi, S. Samavi, T.D. Todd, H. Saidi; Multi-constraint QoS routing using a new single mixed metric; IEEE ICC 2004; pp [14] T. Korkmaz and M. Krunz; A randomized algorithm for finding a path subject to multiple QoS requirements; Computer Networks ournal; Vol. 36(2001), pp [15] T. Korkmaz and M. Krunz; Mult-constrained optimal path selection; IEEE Infocom 2001; pp [16] W. Liu, W. Lou and Y. Fang; An efficient quality of service routing algorithm for delay-sensitive applications; Computer Networks; Vol. 47(2005), pp [17] D.H. Lorenz and D. Raz; A simple efficient approximation scheme for the restricted shortest path problem; perations Research Letters; Vol. 28(2001), pp [18] Q. Ma and P. Steenkiste; Quality-of-service routing for traffic with performance guarantees; IWQoS 1997; May [19] A. rda and A. Sprintson; Efficient algorithms for computing disjoint QoS paths; IEEE Infocom 2004; pp [20] N.S.V. Rao and S.G. Batsell; QoS routing via multiple paths using bandwidth reservation; IEEE Infocom 1998; pp [21] S. Siachalou and L. Georgiadis; Efficient QoS routing; Computer Networks; Vol. 43(2003), pp [22] M. Song and S. Sahni; Approximation algorithms for multiconstrained quality-of-service routing; IEEE Transactions on Computers; Vol. 55(2006), pp [23] P. Van Meighem and F.A. Kuipers; Concept of exact QoS routing algorithms; IEEE/ACM Transactions on Networking; Vol. 12(2004), pp [24] P. Van Mieghem, H. De Neve and F.A. Kuipers; Hop-by-hop quality of service routing; Computer Networks; Vol. 37(2001), pp [25] Z. Wang and. Crowcroft; Quality-of-service routing for supporting multimedia applications; IEEE ournal on Selected Areas in Communications; Vol. 14(1996), pp [26] A. Warburton; Approximation of Pareto optima in multiple-objective, shortest path problem; perations Research; Vol. 35(1987), pp [27] Y. Xiao, K. Thulasiraman, G. Xue; QoS routing in communication networks: approximation algorithms based on the primal simplex method of linear programming; IEEE Transactions on Computers; Vol. 55(2006), pp [28] G. Xue; Primal-dual algorithms for computing weight-constrained shortest paths and weight-constrained minimum spanning trees; IEEE IPCCC 2000; pp [29] G. Xue; Minimum cost QoS multicast and unicast routing in communication networks; IEEE Transactions on Communications; Vol. 51(2003), pp [30] G. Xue, A. Sen and R. Banka; Routing with many additive QoS constraints; IEEE ICC 2003; pp [31] G. Xue, A. Sen, W. Zhang,. Tang and K. Thulasiraman; Finding a path subject to many additive QoS constraints; IEEE/ACM Transactions on Networking; accepted for publication. Available at xue/papers/tnet2007-qos01.pdf. [32] X. Yuan; Heuristic algorithms for multiconstrained quality-of-service routing; IEEE/ACM Transactions on Networking; Vol. 10(2002), pp

Multi-criteria approximation schemes for the resource constrained shortest path problem

Multi-criteria approximation schemes for the resource constrained shortest path problem Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract

More information

GEN-LARAC: A Generalized Approach to the Constrained Shortest Path Problem under Multiple Additive Constraints

GEN-LARAC: A Generalized Approach to the Constrained Shortest Path Problem under Multiple Additive Constraints GEN-LARAC: A Generalized Approach to the Constrained Shortest Path Problem under Multiple Additive Constraints Ying Xiao 1, Krishnaiyan Thulasiraman 1, and Guoliang Xue 2 1 School of Computer Science University

More information

Computing a Most Probable Delay Constrained Path: NP-Hardness and Approximation Schemes

Computing a Most Probable Delay Constrained Path: NP-Hardness and Approximation Schemes 1 Computing a Most Probable Delay Constrained Path: NP-Hardness and Approximation Schemes Ying Xiao, Krishnaiyan Thulasiraman, Fellow, IEEE, Xi Fang, Dejun Yang and Guoliang Xue, Fellow, IEEE Abstract

More information

Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem

Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem Applied Mathematics Volume 2012 Article ID 394721 8 pages doi:10.1155/2012/394721 Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem Yen Hung Chen

More information

QoS Routing Under Multiple Additive Constraints: A Generalization of the LARAC Algorithm

QoS Routing Under Multiple Additive Constraints: A Generalization of the LARAC Algorithm Received 30 November 2014; revised 9 February 2015; accepted 27 April 2015. Date of Publication 5 May 2015; date of current version 8 June 2016. Digital Object Identifier 10.1109/TETC.2015.2428654 QoS

More information

ALL-OPTICAL networks transmit information on a very

ALL-OPTICAL networks transmit information on a very IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 8, AUGUST 2006 45 An Improved Algorithm for Optimal Lightpath Establishment on a Tree Topology Guoliang Xue, Senior Member, IEEE, Weiyi Zhang,

More information

The Generalized Regenerator Location Problem

The Generalized Regenerator Location Problem The Generalized Regenerator Location Problem Si Chen Ivana Ljubić S. Raghavan College of Business and Public Affairs, Murray State University Murray, KY 42071, USA Faculty of Business, Economics, and Statistics,

More information

arxiv: v1 [cs.cg] 29 Jun 2012

arxiv: v1 [cs.cg] 29 Jun 2012 Single-Source Dilation-Bounded Minimum Spanning Trees Otfried Cheong Changryeol Lee May 2, 2014 arxiv:1206.6943v1 [cs.cg] 29 Jun 2012 Abstract Given a set S of points in the plane, a geometric network

More information

2 Notation and Preliminaries

2 Notation and Preliminaries On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that

More information

Duality of LPs and Applications

Duality of LPs and Applications Lecture 6 Duality of LPs and Applications Last lecture we introduced duality of linear programs. We saw how to form duals, and proved both the weak and strong duality theorems. In this lecture we will

More information

An Improved Approximation Algorithm for Computing Disjoint QoS Paths

An Improved Approximation Algorithm for Computing Disjoint QoS Paths An Improved Approximation Algorithm for Computing Disjoint QoS Paths Chao Peng Hong Shen Graduate School of Information Science Japan Advanced Institute of Science and Technology 1-1 Tatsunokuchi, Ishikawa,

More information

Week Cuts, Branch & Bound, and Lagrangean Relaxation

Week Cuts, Branch & Bound, and Lagrangean Relaxation Week 11 1 Integer Linear Programming This week we will discuss solution methods for solving integer linear programming problems. I will skip the part on complexity theory, Section 11.8, although this is

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information

Solutions to Exercises

Solutions to Exercises 1/13 Solutions to Exercises The exercises referred to as WS 1.1(a), and so forth, are from the course book: Williamson and Shmoys, The Design of Approximation Algorithms, Cambridge University Press, 2011,

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should

More information

Lecture 4. 1 FPTAS - Fully Polynomial Time Approximation Scheme

Lecture 4. 1 FPTAS - Fully Polynomial Time Approximation Scheme Theory of Computer Science to Msc Students, Spring 2007 Lecturer: Dorit Aharonov Lecture 4 Scribe: Ram Bouobza & Yair Yarom Revised: Shahar Dobzinsi, March 2007 1 FPTAS - Fully Polynomial Time Approximation

More information

Computing the Norm A,1 is NP-Hard

Computing the Norm A,1 is NP-Hard Computing the Norm A,1 is NP-Hard Dedicated to Professor Svatopluk Poljak, in memoriam Jiří Rohn Abstract It is proved that computing the subordinate matrix norm A,1 is NP-hard. Even more, existence of

More information

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru

More information

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM EXERCISES Prepared by Natashia Boland 1 and Irina Dumitrescu 2 1 Applications and Modelling 1.1

More information

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden March 9, 2017 1 Preamble Our first lecture on smoothed analysis sought a better theoretical

More information

Approximation Basics

Approximation Basics Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for

More information

Multicriteria approximation through decomposition

Multicriteria approximation through decomposition Multicriteria approximation through decomposition Carl Burch Sven Krumke y Madhav Marathe z Cynthia Phillips x Eric Sundberg { Abstract We propose a general technique called solution decomposition to devise

More information

The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and Split Graphs

The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and Split Graphs Chiang Mai J. Sci. 2013; 40(1) 8 3 Chiang Mai J. Sci. 2013; 40(1) : 83-88 http://it.science.cmu.ac.th/ejournal/ Contributed Paper The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and

More information

Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack

Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Hassene Aissi, Cristina Bazgan, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

The Maximum Flow Problem with Disjunctive Constraints

The Maximum Flow Problem with Disjunctive Constraints The Maximum Flow Problem with Disjunctive Constraints Ulrich Pferschy Joachim Schauer Abstract We study the maximum flow problem subject to binary disjunctive constraints in a directed graph: A negative

More information

The Multi-Path Utility Maximization Problem

The Multi-Path Utility Maximization Problem The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract

More information

Approximating the minimum quadratic assignment problems

Approximating the minimum quadratic assignment problems Approximating the minimum quadratic assignment problems Refael Hassin Asaf Levin Maxim Sviridenko Abstract We consider the well-known minimum quadratic assignment problem. In this problem we are given

More information

Routing. Topics: 6.976/ESD.937 1

Routing. Topics: 6.976/ESD.937 1 Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution

More information

Volume 35, Issue 4. Note on goodness-of-fit measures for the revealed preference test: The computational complexity of the minimum cost index

Volume 35, Issue 4. Note on goodness-of-fit measures for the revealed preference test: The computational complexity of the minimum cost index Volume 35, Issue 4 Note on goodness-of-fit measures for the revealed preference test: The computational complexity of the minimum cost index Kohei Shiozawa Graduate School of Economics, Osaka University

More information

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters IEEE/ACM TRANSACTIONS ON NETWORKING An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters Mehrnoosh Shafiee, Student Member, IEEE, and Javad Ghaderi, Member, IEEE

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

1.1 P, NP, and NP-complete

1.1 P, NP, and NP-complete CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Introduction to NP-complete Problems Date: 11/01/2008 Lecturer: Lap Chi Lau Scribe: Jerry Jilin Le This lecture gives a general introduction

More information

Truthful Auction for Cooperative Communications with Revenue Maximization

Truthful Auction for Cooperative Communications with Revenue Maximization Truthful Auction for Cooperative Communications with Maximization Dejun Yang, Xi Fang, and Guoliang Xue Abstract Auction theory has been applied to cooperative communications to either efficiently allocate

More information

Active Measurement for Multiple Link Failures Diagnosis in IP Networks

Active Measurement for Multiple Link Failures Diagnosis in IP Networks Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks

More information

Complexity of the min-max and min-max regret assignment problems

Complexity of the min-max and min-max regret assignment problems Complexity of the min-max and min-max regret assignment problems Hassene Aissi Cristina Bazgan Daniel Vanderpooten LAMSADE, Université Paris-Dauphine Place du Maréchal de Lattre de Tassigny, 75775 Paris

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Lecture Note: Rounding From pseudo-polynomial to FPTAS

Lecture Note: Rounding From pseudo-polynomial to FPTAS Lecture Note: Rounding From pseudo-polynomial to FPTAS for Approximation Algorithms course in CCU Bang Ye Wu CSIE, Chung Cheng University, Taiwan Rounding Rounding is a kind of techniques used to design

More information

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern

More information

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. 35, No., May 010, pp. 84 305 issn 0364-765X eissn 156-5471 10 350 084 informs doi 10.187/moor.1090.0440 010 INFORMS On the Power of Robust Solutions in Two-Stage

More information

Lectures 6, 7 and part of 8

Lectures 6, 7 and part of 8 Lectures 6, 7 and part of 8 Uriel Feige April 26, May 3, May 10, 2015 1 Linear programming duality 1.1 The diet problem revisited Recall the diet problem from Lecture 1. There are n foods, m nutrients,

More information

An Improved Approximation Algorithm for Virtual Private Network Design

An Improved Approximation Algorithm for Virtual Private Network Design An Improved Approximation Algorithm for Virtual Private Network Design Friedrich Eisenbrand Fabrizio Grandoni Abstract Virtual private network design deals with the reservation of capacities in a network,

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology 18.433: Combinatorial Optimization Michel X. Goemans February 28th, 2013 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory

More information

CO759: Algorithmic Game Theory Spring 2015

CO759: Algorithmic Game Theory Spring 2015 CO759: Algorithmic Game Theory Spring 2015 Instructor: Chaitanya Swamy Assignment 1 Due: By Jun 25, 2015 You may use anything proved in class directly. I will maintain a FAQ about the assignment on the

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

Cost of Not Arbitrarily Splitting in Routing

Cost of Not Arbitrarily Splitting in Routing Cost of Not Arbitrarily Splitting in Routing Yingjie Bi and Ao Tang School of Electrical and Computer Engineering, Cornell University yb236@cornelledu, atang@ececornelledu Abstract This paper studies routing

More information

Mathematical Preliminaries

Mathematical Preliminaries Chapter 33 Mathematical Preliminaries In this appendix, we provide essential definitions and key results which are used at various points in the book. We also provide a list of sources where more details

More information

MIT Algebraic techniques and semidefinite optimization February 14, Lecture 3

MIT Algebraic techniques and semidefinite optimization February 14, Lecture 3 MI 6.97 Algebraic techniques and semidefinite optimization February 4, 6 Lecture 3 Lecturer: Pablo A. Parrilo Scribe: Pablo A. Parrilo In this lecture, we will discuss one of the most important applications

More information

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden November 5, 2014 1 Preamble Previous lectures on smoothed analysis sought a better

More information

Linear Programming. Scheduling problems

Linear Programming. Scheduling problems Linear Programming Scheduling problems Linear programming (LP) ( )., 1, for 0 min 1 1 1 1 1 11 1 1 n i x b x a x a b x a x a x c x c x z i m n mn m n n n n! = + + + + + + = Extreme points x ={x 1,,x n

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 P and NP P: The family of problems that can be solved quickly in polynomial time.

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique

More information

The Knapsack Problem. 28. April /44

The Knapsack Problem. 28. April /44 The Knapsack Problem 20 10 15 20 W n items with weight w i N and profit p i N Choose a subset x of items Capacity constraint i x w i W wlog assume i w i > W, i : w i < W Maximize profit i x p i 28. April

More information

CHAPTER 3: INTEGER PROGRAMMING

CHAPTER 3: INTEGER PROGRAMMING CHAPTER 3: INTEGER PROGRAMMING Overview To this point, we have considered optimization problems with continuous design variables. That is, the design variables can take any value within a continuous feasible

More information

MULTIHOMING IN COMPUTER NETWORKS: A TOPOLOGY-DESIGN APPROACH. Ariel Orda Raphael Rom

MULTIHOMING IN COMPUTER NETWORKS: A TOPOLOGY-DESIGN APPROACH. Ariel Orda Raphael Rom MULTIHOMING IN COMPUTER NETWORKS: A TOPOLOGY-DESIGN APPROACH Ariel Orda Raphael Rom Department of Electrical Engineering Technion - Israel Institute of Technology Haifa, Israel 32000 Revised June 1989

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans April 5, 2017 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory

More information

Introduction to Algorithms

Introduction to Algorithms Introduction to Algorithms 6.046J/18.401J/SMA5503 Lecture 18 Prof. Erik Demaine Negative-weight cycles Recall: If a graph G = (V, E) contains a negativeweight cycle, then some shortest paths may not exist.

More information

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Gérard Cornuéjols 1 and Yanjun Li 2 1 Tepper School of Business, Carnegie Mellon

More information

Distributed Optimization. Song Chong EE, KAIST

Distributed Optimization. Song Chong EE, KAIST Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links

More information

Integer Equal Flows. 1 Introduction. Carol A. Meyers Andreas S. Schulz

Integer Equal Flows. 1 Introduction. Carol A. Meyers Andreas S. Schulz Integer Equal Flows Carol A Meyers Andreas S Schulz Abstract We examine an NP-hard generalization of the network flow problem known as the integer equal flow problem The setup is the same as a standard

More information

Multicommodity Flows and Column Generation

Multicommodity Flows and Column Generation Lecture Notes Multicommodity Flows and Column Generation Marc Pfetsch Zuse Institute Berlin pfetsch@zib.de last change: 2/8/2006 Technische Universität Berlin Fakultät II, Institut für Mathematik WS 2006/07

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs

More information

Theory of Computation Chapter 1: Introduction

Theory of Computation Chapter 1: Introduction Theory of Computation Chapter 1: Introduction Guan-Shieng Huang Sep. 20, 2006 Feb. 9, 2009 0-0 Text Book Computational Complexity, by C. H. Papadimitriou, Addison-Wesley, 1994. 1 References Garey, M.R.

More information

Scheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time

Scheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time 1 1 2 Scheduling Coflows in Datacenter Networs: Improved Bound for Total Weighted Completion Time Mehrnoosh Shafiee and Javad Ghaderi Abstract Coflow is a recently proposed networing abstraction to capture

More information

CS261: A Second Course in Algorithms Lecture #9: Linear Programming Duality (Part 2)

CS261: A Second Course in Algorithms Lecture #9: Linear Programming Duality (Part 2) CS261: A Second Course in Algorithms Lecture #9: Linear Programming Duality (Part 2) Tim Roughgarden February 2, 2016 1 Recap This is our third lecture on linear programming, and the second on linear programming

More information

APPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS

APPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS Computing and Informatics, Vol. 23, 2004, 37 49 APPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS Ning Chen, Jie Meng, Jiawei Rong, Hong Zhu Department of Computer Science, Fudan University

More information

The Steiner k-cut Problem

The Steiner k-cut Problem The Steiner k-cut Problem Chandra Chekuri Sudipto Guha Joseph (Seffi) Naor September 23, 2005 Abstract We consider the Steiner k-cut problem which generalizes both the k-cut problem and the multiway cut

More information

Duality Theory, Optimality Conditions

Duality Theory, Optimality Conditions 5.1 Duality Theory, Optimality Conditions Katta G. Murty, IOE 510, LP, U. Of Michigan, Ann Arbor We only consider single objective LPs here. Concept of duality not defined for multiobjective LPs. Every

More information

A Note on the Density of the Multiple Subset Sum Problems

A Note on the Density of the Multiple Subset Sum Problems A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,

More information

Matchings in hypergraphs of large minimum degree

Matchings in hypergraphs of large minimum degree Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains

More information

Optimal Fractal Coding is NP-Hard 1

Optimal Fractal Coding is NP-Hard 1 Optimal Fractal Coding is NP-Hard 1 (Extended Abstract) Matthias Ruhl, Hannes Hartenstein Institut für Informatik, Universität Freiburg Am Flughafen 17, 79110 Freiburg, Germany ruhl,hartenst@informatik.uni-freiburg.de

More information

Dynamic Programming: Shortest Paths and DFA to Reg Exps

Dynamic Programming: Shortest Paths and DFA to Reg Exps CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths

More information

Differential approximation results for the Steiner tree problem

Differential approximation results for the Steiner tree problem Differential approximation results for the Steiner tree problem Marc Demange, Jérôme Monnot, Vangelis Paschos To cite this version: Marc Demange, Jérôme Monnot, Vangelis Paschos. Differential approximation

More information

Contents. Introduction

Contents. Introduction Introduction Contents Chapter 1. Network Flows 1 1.1. Graphs 1 1.2. Shortest Paths 8 1.3. Maximum Flow 17 1.4. Min Cost Flows 22 List of frequently used Symbols 31 Bibliography 33 Index 37 iii i Introduction

More information

A Polynomial-Time Algorithm to Find Shortest Paths with Recourse

A Polynomial-Time Algorithm to Find Shortest Paths with Recourse A Polynomial-Time Algorithm to Find Shortest Paths with Recourse J. Scott Provan Department of Operations Research University of North Carolina Chapel Hill, NC 7599-380 December, 00 Abstract The Shortest

More information

Computational Complexity

Computational Complexity Computational Complexity Algorithm performance and difficulty of problems So far we have seen problems admitting fast algorithms flow problems, shortest path, spanning tree... and other problems for which

More information

On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach

On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach Anton Eremeev,2, Alexander Kel manov,3, and Artem Pyatkin,3 Sobolev Institute of Mathematics, 4 Koptyug Ave.,

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

1 Primals and Duals: Zero Sum Games

1 Primals and Duals: Zero Sum Games CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown

More information

Complexity analysis of job-shop scheduling with deteriorating jobs

Complexity analysis of job-shop scheduling with deteriorating jobs Discrete Applied Mathematics 117 (2002) 195 209 Complexity analysis of job-shop scheduling with deteriorating jobs Gur Mosheiov School of Business Administration and Department of Statistics, The Hebrew

More information

Improved Bounds for Flow Shop Scheduling

Improved Bounds for Flow Shop Scheduling Improved Bounds for Flow Shop Scheduling Monaldo Mastrolilli and Ola Svensson IDSIA - Switzerland. {monaldo,ola}@idsia.ch Abstract. We resolve an open question raised by Feige & Scheideler by showing that

More information

CS 583: Approximation Algorithms: Introduction

CS 583: Approximation Algorithms: Introduction CS 583: Approximation Algorithms: Introduction Chandra Chekuri January 15, 2018 1 Introduction Course Objectives 1. To appreciate that not all intractable problems are the same. NP optimization problems,

More information

NP-Completeness. f(n) \ n n sec sec sec. n sec 24.3 sec 5.2 mins. 2 n sec 17.9 mins 35.

NP-Completeness. f(n) \ n n sec sec sec. n sec 24.3 sec 5.2 mins. 2 n sec 17.9 mins 35. NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979. NP-Completeness 1 General Problems, Input Size and

More information

Provable Approximation via Linear Programming

Provable Approximation via Linear Programming Chapter 7 Provable Approximation via Linear Programming One of the running themes in this course is the notion of approximate solutions. Of course, this notion is tossed around a lot in applied work: whenever

More information

MINIMUM DIAMETER COVERING PROBLEMS. May 20, 1997

MINIMUM DIAMETER COVERING PROBLEMS. May 20, 1997 MINIMUM DIAMETER COVERING PROBLEMS Esther M. Arkin y and Refael Hassin z May 20, 1997 Abstract A set V and a collection of (possibly non-disjoint) subsets are given. Also given is a real matrix describing

More information

The maximum edge-disjoint paths problem in complete graphs

The maximum edge-disjoint paths problem in complete graphs Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

The maximum edge biclique problem is NP-complete

The maximum edge biclique problem is NP-complete The maximum edge biclique problem is NP-complete René Peeters Department of Econometrics and Operations Research Tilburg University The Netherlands April 5, 005 File No. DA5734 Running head: Maximum edge

More information

Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard

Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard Journal of Uncertain Systems Vol.9, No.2, pp.124-132, 2015 Online at: www.jus.org.uk Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard Sio-Long Lo Faculty

More information

Bounds on the Traveling Salesman Problem

Bounds on the Traveling Salesman Problem Bounds on the Traveling Salesman Problem Sean Zachary Roberson Texas A&M University MATH 613, Graph Theory A common routing problem is as follows: given a collection of stops (for example, towns, stations,

More information

Can Shortest-path Routing and TCP Maximize Utility

Can Shortest-path Routing and TCP Maximize Utility Can Shortest-path Routing and TCP Maximize Utility Jiantao Wang Lun Li Steven H. Low John C. Doyle California Institute of Technology, Pasadena, USA {jiantao@cds., lun@cds., slow@, doyle@cds.}caltech.edu

More information

Scheduling Parallel Jobs with Linear Speedup

Scheduling Parallel Jobs with Linear Speedup Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev, m.uetz}@ke.unimaas.nl

More information

Włodzimierz Ogryczak. Warsaw University of Technology, ICCE ON ROBUST SOLUTIONS TO MULTI-OBJECTIVE LINEAR PROGRAMS. Introduction. Abstract.

Włodzimierz Ogryczak. Warsaw University of Technology, ICCE ON ROBUST SOLUTIONS TO MULTI-OBJECTIVE LINEAR PROGRAMS. Introduction. Abstract. Włodzimierz Ogryczak Warsaw University of Technology, ICCE ON ROBUST SOLUTIONS TO MULTI-OBJECTIVE LINEAR PROGRAMS Abstract In multiple criteria linear programming (MOLP) any efficient solution can be found

More information

Lecture 18: P & NP. Revised, May 1, CLRS, pp

Lecture 18: P & NP. Revised, May 1, CLRS, pp Lecture 18: P & NP Revised, May 1, 2003 CLRS, pp.966-982 The course so far: techniques for designing efficient algorithms, e.g., divide-and-conquer, dynamic-programming, greedy-algorithms. What happens

More information

Week 4. (1) 0 f ij u ij.

Week 4. (1) 0 f ij u ij. Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known

More information

P versus NP. Math 40210, Fall November 10, Math (Fall 2015) P versus NP November 10, / 9

P versus NP. Math 40210, Fall November 10, Math (Fall 2015) P versus NP November 10, / 9 P versus NP Math 40210, Fall 2015 November 10, 2015 Math 40210 (Fall 2015) P versus NP November 10, 2015 1 / 9 Properties of graphs A property of a graph is anything that can be described without referring

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information