Multi-Constrained QoS Routing: A Norm Approach
|
|
- Benjamin Mitchell
- 5 years ago
- Views:
Transcription
1 1 Multi-Constrained QoS Routing: A Norm Approach Guoliang Xue, Senior Member, IEEE and S. Kami Makki, Member, IEEE Abstract A fundamental problem in quality-of-service (QoS) routing is the multi-constrained path (MCP) problem, where one seeks a source-destination path satisfying K 2 additive QoS constraints in a network with K additive QoS parameters. The MCP problem is known to be NP-complete. ne popular approach is to use the shortest path with respect to a single edge weighting function as an approximate solution to MCP. In a pioneering work, affe showed that the shortest path with respect to a scaled 1-norm of the K edge weights is a 2-approximation to MCP in the sense that the sum of the larger of the path weight and its corresponding constraint is within a factor of 2 from minimum. In a recent paper, Xue et al. showed that the shortest path with respect to a scaled -norm of the K edge weights is a K-approximation to MCP, in the sense that the largest ratio of the path weight over its corresponding constraint is within a factor of K from minimum. In this paper, we study the relationship between these two optimization criteria and present a class of provably good approximation algorithms to MCP. We first prove that a good approximation according to the second optimization criterion is also a good approximation according to the first optimization criterion, but not vice versa. We then present a class of very simple K-approximation algorithms according to the second optimization criterion, based on the computation of a shortest path with respect to a single edge weighting function. Index Terms QoS routing, multiple additive QoS parameters, approximation algorithms, scaled p-norm. 1. INTRDUCTIN A fundamental problem in quality-of-service (QoS) routing is the multi-constrained path (MCP) problem, where one seeks a source-destination path satisfying K 2 additive QoS constraints in a network with K additive QoS parameters, such as cost, delay, and reliability [2], [10], [18], [20], [25]. Commonly, the network is modeled by a directed graph where the n vertices represent computers or routers and the m edges represent links. To model multiple QoS parameters, each edge is associated with K edge weights, representing cost, delay, and reliability, etc., of the edge. Correspondingly, each path has multiple path weights associated with it, representing cost, delay, and reliability, etc., of the path. If an edge weight represents cost or delay of the edge, then the corresponding path weight is the sum of the weights associated with the edges on the path. For this reason, QoS parameters such as cost and delay are called additive parameters. If an edge weight represents the reliability of the edge, then the corresponding Guoliang Xue is a Full Professor in the Department of Computer Science and Engineering at Arizona State University, Tempe, AZ xue@asu.edu. The research of this author was supported in part by AR grant W911NF and NSF grants CCF and ANI S. Kami Makki is an Assistant Professor with the Department of Electrical Engineering & Computer Science at The University of Toledo, Toledo, H kmakki@eng.utoledo.edu. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research ffice or the U.S. Government. path weight is the product of the weights associated with the edges on the path. Since the logarithm of the product of N positive numbers is the sum of the logarithms of the N positive numbers, QoS parameters such as reliability are also called additive parameters. It is well known that the MCP problem is NP-complete as long as there are K 2 additive QoS parameters [25]. Another kind of QoS parameters are known as concave parameters (such as bandwidth) where the corresponding weight of a path is the smallest of the weights of the edges on the path [25]. Problems involving concave QoS parameters can be easily solved by considering a polynomial number of subgraphs each with only those edges whose weights are greater than or equal to a particular chosen value. Therefore the number of concave QoS parameters does not affect the computational complexity of the MCP problem (whether it is in P or NP-complete). If all QoS parameters are concave, or all except one of the QoS parameters are concave, the MCP problem is polynomial time solvable. Therefore in this paper we restrict our attention to additive parameters only. Due to its increasing important applications, the MCP problem has been studied by many researchers. Existing works for this problem can be classified into two broad classes: sophisticated approximation schemes, and simple heuristic algorithms. An approximation scheme can compute, for any constant ɛ > 0, a path that is within a factor of (1 + ɛ) of the optimal solution, with a running time that is bounded by a polynomial in the input size of the given instance, with ɛ treated as a constant. Heuristic algorithms are normally simple and fast, without providing a priori theoretical guarantees of the computed path. Many heuristic algorithms for MCP have been proposed for both the special case of K = 2 and the general case of K 2. affe in [10] studied the MCP problem with K = 2 and presented simple and provably good approximation algorithms, using an optimization criterion that is formally defined in Section 2. This work was generalized to the general case of K 2 by Andrew and Kusuma in [1]. Chen et al. in [2] studied the MCP problem with K = 2 and proposed a polynomial time heuristic algorithm based on scaling and rounding of the second parameter so that the second parameter of each edge is approximated by a bounded integer. In [32], Yuan generalized the heuristic of [2] to the case of K 2 and proposed a limited granularity heuristic. For any given ɛ > 0, this heuristic algorithm has time complexity (mn( n ɛ )K 1 ) and can find a feasible path if there is a path whose last K 1 path weights are no more than (1 ɛ) of the corresponding constraints, but may fail to find a path when this condition does not hold. Korkmaz et al. in [14] proposed a randomized heuristic for the MCP problem, which may find a feasible path quickly, but may fail even when there is a feasible path. Liu et al. in [16] proposed a selection function approach to
2 2 study the tradeoff between the quality of the path and the time required to compute the path. Related works can be found in [11], [14], [20], [21], [22], [23] and the references therein. Many researchers have proposed to obtain a new edge weighting function using the K edge weights and use the shortest path with respect to this new edge weighting function as an approximation to the MCP problem. Works along this line can be found in [4], [12], [13], [27], [28], [29]. Researchers have also investigated integrated path metrics using a linear or nonlinear combination of the K path weights [15], [23], [24]. Most of the existing approximation schemes concentrate on the MCP problem with two additive QoS parameters. Warburton in [26] first developed a fully polynomial time approximation scheme (FPTAS) [5] for the MCP problem on an acyclic graph. Hassin in [9] presented an improved FPTAS. Lorenz and Raz in [17] presented an even better FPTAS with a time complexity of (mn(log log n + 1 ɛ )), where ɛ is the approximation parameter. Their FPTAS applies to general graphs, rather than just acyclic graphs. Goel et al. in [6] presented an approximation algorithm for the single source all destinations delay sensitive least cost path problem with a time complexity of ((m+n log n) H ɛ ), where H is the hop count of the longest computed path. Ergun et al. in [3] presented an FPTAS for the case of acyclic graphs with a time complexity of (m( n ɛ )). rda and Sprintson in [19] studied disjoint QoS paths. Xue et al. in [31] studied the MCP problem with K being any integer constant greater than or equal to 2. They presented an FPTAS for general graphs with a time complexity of ((m( n ɛ )K 1 ) and a very simple K- approximation algorithm by computing a shortest path with respect to a scaled -norm of the K edge weights. In this paper, we study the relationship between the optimization criterion used in [1], [10] and the optimization criterion used in [2], [16], [22], [23], [24], [27], [28], [29], [30], [31], [32], and present a class of provably good approximation algorithms for the MCP problem. We first prove that a good approximation according to the second optimization criterion is also a good approximation according to the first optimization criterion, but not vice versa. We then present a class of very simple K-approximation algorithms according to the second optimization criterion, based on the computation of a shortest path with respect to a single edge weighting function. ur results provide a theoretical support of many heuristic algorithms for the MCP problem that are based on a shortest path with respect to a single edge weighting function which is a linear combination of the K edge weights. The class of K-approximation algorithms presented in this paper contains, as special cases, the K-approximation algorithm of Xue et al. [31], the algorithm of affe [10], the algorithm of Andrew and Kusuma [1], along with many other algorithms which are not previously known. The rest of this paper is organized as follows. In Section 2, we define the problems and some notations. We also study the relationship between two optimization criteria used for solving the MCP problem. In Section 3, we present a class of K- approximation algorithms for MCP which are based on the computation of a shortest path with respect to a single edge weighting function. We conclude this paper in Section PRBLEM DEFINITINS AND CMPARISN F PTIMIZATIN CRITERIA We use an integer constant K 2 to denote the number of additive QoS parameters. Unless specified otherwise, all other constants, functions, and variables are assumed to have real values. All logarithms are based-2 logarithms. A polynomial time β-approximation algorithm for a minimization problem is an algorithm A that, for any instance of the problem, computes a solution that is at most β times the optimal solution of the instance, in time bounded by a polynomial in the input size of the instance [5]. We model a computer network using a K-edge weighted directed graph G = (V, E, ω), where V is the set of n vertices, E is the set of m edges, and ω = (ω 1,..., ω K ) is an edge weight vector so that ω k (e) 0 is the k th weight of edge e, e E, 1 k K. For a path π in G, the k th weight of π, denoted by ω k (π), is the sum of the k th weights over the edges on π: ω k (π) = e π ω k(e). Throughout this paper, we will use s V and t V to denote the source node and the destination node. We will use W = (W 1,..., W K ) to denote a constraint vector where each is a positive constant. For a path π connecting s to t, we are interested in the following two path metrics. f AFFE (π) = max{ω k (π), }. (2.1) f MCP (π) = max 1 k K ω k (π). (2.2) f AFFE (π) measures the sum (over k {1,..., K}) of the larger of the kth path weight ω k (π) and the kth constraint. This path metric was introduced by affe [10] and has also been used in [1]. f MCP (π) measures the maximum (over k {1,..., K}) of the ratio of the kth path weight ω k (π) over the kth constraint. This path metric has been used by researchers in [2], [16], [22], [23], [24], [27], [29], [30], [31], [32]. The decision version of the multi-constrained path (DMCP) problem is defined in the following. Definition 2.1 (DMCP(G, s, t, K, W, ω)): INSTANCE: a K-edge weighted directed graph G = (V, E, ω), with K nonnegative real-valued edge weights ω k (e), 1 k K, associated with each edge e E; a constraint vector W = (W 1,..., W K ) where each is a positive constant; and a source-destination node pair (s, t). QUESTIN: is there an s t path π such that ω k (π), 1 k K? In the above definition, the inequality ω k (π) is called the k th QoS constraint. A path π satisfying all K QoS constraints is called a feasible path or a feasible solution of DMCP(G, s, t, K, W, ω). It is clear that an s t path π is a feasible solution to DMCP(G, s, t, K, W, ω) if and only if f MCP (π) 1. We say that DMCP(G, s, t, K, W, ω) is feasible if it has a feasible path, and infeasible otherwise. We may simply use DMCP to denote DMCP(G, s, t, K, W, ω), without any confusion, the same rule can be applied to MCP and MCP defined in the sequel. The DMCP problem is known to be NP-complete [5], [25], for any integer K such that K 2. Therefore the following
3 3 optimization version of this problem has been studied in the literature [30], [31]. Definition 2.2 (MCP(G, s, t, K, W, ω)): INSTANCE: a K-edge weighted directed graph G = (V, E, ω), with K nonnegative real-valued edge weights ω k (e), 1 k K, associated with each edge e E; a constraint vector W = (W 1,..., W K ) where each is a positive constant; and a source-destination node pair (s, t). PRBLEM: find an s t path π such that f MCP (π ) f MCP (π) for any s t path π. We call π an optimal path or an optimal solution of MCP(G, s, t, K, W, ω), and call f MCP (π ) the optimal value of MCP(G, s, t, K, W, ω). It is clear that 1 if and only if DMCP(G, s, t, K, W, ω) is feasible. In [10], affe studied the following optimization version of the multi-constrained path problem. Definition 2.3 (MCP(G, s, t, K, W, ω)): INSTANCE: a K-edge weighted directed graph G = (V, E, ω), with K nonnegative real-valued edge weights ω k (e), 1 k K, associated with each edge e E; a constraint vector W = (W 1,..., W K ) where each is a positive constant; and a source-destination node pair (s, t). PRBLEM: find an s t path π such that f AFFE (π ) f AFFE (π) for any s t path π. We call π an optimal path or an optimal solution of MCP(G, s, t, K, W, ω), and call f AFFE (π ) the optimal value of MCP(G, s, t, K, W, ω). Clearly, = K when DMCP is feasible and > K otherwise. affe proposed to design efficient approximation algorithms for MCP, based on the shortest path with respect to a single edge weighting function. Indeed, affe in [10] (for the case of K = 2) and Andrew and Kusuma in [1] (for the case of K > 2) showed that for carefully chosen positive numbers α 1,..., α K, the shortest s t path π α with respect to the edge weighting function guarantees that ω α (e) = α k ωk(e), e E (2.3) f AFFE (π α ) (2 1 K ) ζopt. (2.4) In addition, with α1 = = αk = 1, the s t path π α with respect to ω α guarantees that f AFFE (π α ) 2. (2.5) In other words, one can obtain a 2-approximation to the MCP problem by computing a shortest path with respect to a single edge weighting function that is a linear combination of the K edge weights. The MCP problem has been studied by many researchers [2], [16], [22], [23], [27], [28], [29], [30], [31]. In a recent paper, Xue et al. [31] studied the MCP problem and presented a K-approximation algorithm based on the computation of a shortest path with respect to a single edge weighting function defined in the following. ω max (e) = ω k (e) max, e E. (2.6) 1 k K We call the edge weighting function ω α (e) the scaled 1- norm of the K edge weighting functions ω 1 (e),..., ω K (e), and call the edge weighting function ω max (e) the scaled - norm of the K edge weighting functions ω 1 (e),..., ω K (e), formally defined in the next section. n one hand, we know that the shortest path with respect to the scaled 1-norm is a 2-approximation to the MCP problem. n the other hand, we know that the shortest path with respect to the scaled - norm is a K-approximation to the MCP problem. A natural question to ask is the following. Should we strive to compute a path π which is a good approximation to MCP or should we strive to compute a path π which is a good approximation to MCP? The following theorem shows that a good approximation to MCP is also a good approximation to MCP, but a good approximation to MCP could be a very poor approximation to MCP. Theorem 2.1: Let β 1 be any given constant. 1) If s t path π is a β-approximation to MCP(G, s, t, K, W, ω), then π is also a max{1, β }-approximation to MCP(G, s, t, K, W, ω), where is the optimal value of MCP(G, s, t, K, W, ω). 2) Let η > 0 be an arbitrarily large constant and ɛ > 0 be an arbitrarily small constant. There exist a K- edge weighted graph G(V, E, ω 1,..., ω K ), QoS constraints W = (W 1,..., W K ), source-destination node pair (s, t), and an s t path π such that π is a (1 + ɛ) approximation to MCP(G, s, t, K, W, ω), but is not a η -approximation to MCP(G, s, t, K, W, ω) for any η < η, where [1, 2] is the optimal value of the corresponding MCP(G, s, t, K, W, ω) instance. PRF. Let π be a β-approximation to MCP. We have ω k (π) β, 1 k K. Therefore max{ω k (π), } max{β, 1}, 1 k K. (2.7) As a result, we have f AFFE (π) = KX max{ω k (π), } max{β K, 1} X. (2.8) It follows from the definition of f AFFE ( ) that for any s t path π we must have f AFFE (π) = max{ω k (π), }. (2.9) Inequalities (2.8) and (2.9) together imply that π is a max{1, β }-approximation to MCP. This proves our first claim. Next, we will construct an example to validate our second claim. The graph G (illustrated in Figure 1(a) for K = 3) has vertex set V = {s, t, x, y}, edge set E = {(s, x), (s, y), (x, t), (y, t)}, with edge weighting functions ω k so that ω 1 (s, x) = = ω K 1 (s, x) = 1 + ɛ,
4 + 4 s x t s & %&'() '()* x.0/213/215476! "#$ # t (0, 0, 0) y (0, 0, 0) y %& & ) ), - + (a) DMCP is infeasible (b) DMCP is feasible Fig. 1. A (1 + ɛ) approximation to MCP could be a very poor approximation to MCP. ω K (s, x) = 0; ω 1 (x, t) = = ω K 1 (x, t) = 0, ω K (x, t) = (1 + ɛ)δ; ω 1 (s, y) = = ω K (s, y) = 0; ω 1 (y, t) = = ω K 1 (y, t) = 1, ω K (y, t) = ηδ. We also assume (W 1,..., W K 1, W K ) = (1,..., 1, δ). The parameters η, ɛ and δ are chosen in the following way: η > 0 is a given arbitrarily large constant (compared with K and ɛ) and ɛ (0, 1] is an arbitrarily small constant such that η is much larger than 1+ɛ. After η and ɛ are fixed, we choose δ > 0 sufficiently small so that (1+ɛ)(K 1+δ) > K 1+ηδ. This is possible because (1 + ɛ)(k 1 + δ) lim = 1 + ɛ > 1. (2.10) δ 0 K 1 + ηδ There are exactly two s t paths in G: π 1 = s x t and π 2 = s y t. The path weights of π 1 are ω 1 (π 1 ) = = ω K 1 (π 1 ) = 1 + ɛ, ω K (π 1 ) = (1 + ɛ)δ. The path weights of π 2 are ω 1 (π 2 ) = = ω K 1 (π 2 ) = 1, ω K (π 2 ) = ηδ. Therefore we have f MCP (π 1 ) = 1 + ɛ, f AFFE (π 1 ) = (1 + ɛ)(k 1 + δ), f MCP (π 2 ) = η; f AFFE (π 2 ) = K 1 + ηδ. By our choice of η, ɛ and δ, π 1 is the optimal solution to MCP, and π 2 is the optimal solution to MCP. = 1+ɛ, = K 1+ηδ. However, π 2 is a very poor approximation to MCP, as f MCP (π 2) η 2 and η is a very large number. In particular, for any η < η, π 2 is not a η -approximation to MCP. In the above example, the DMCP instance is infeasible. Similar conclusions can be drawn if we add to graph G an edge (s, t) with weights ω 1 (s, t) = = ω K 1 (s, t) = 1, and ω K (s, t) = δ (illustrated in Figure 1(b) for K = 3), where the corresponding DMCP instance is feasible. In this case, the path π 3 = s t is the optimal path for both MCP and MCP. = 1, ζopt = K 1 + δ. The path π 2 is a (1 + ɛ)-approximation to MCP. However, = f MCP (π 2 ) = η, which is a very large number. f MCP (π 2) 3. A CLASS F K-APPRXIMATIN ALGRITHMS In this section, we will present a class of approximation algorithms for MCP(G, s, t, K, W, ω) each of which can find an s t path π in (Km + n log n) time such that ω k (π) K, for 1 k K. In other words, each algorithm in this class is a K-approximation algorithm for MCP(G, s, t, K, W, ω). ur class of K-approximation algorithms is based on the notion of scaled p-norm (defined in the following) in K dimensional Euclidean space R K. We first define scaled p- norm in Section 3-A. We then present a very general K- approximation algorithm in Section 3-B. We discuss special cases of this K-approximation algorithm in Section 3-C. A. Scaled p-norm Let p 1 be any real number. Let x = (x 1,..., x K ) be any point in R K, the K-dimensional Euclidean space. Let W = (W 1,..., W K ) be an ordered sequence of K positive real numbers. We define the W -scaled p-norm of x (denoted by x p, W ) by the following equation: [ K ( ) ] 1 p p xk x p, W =. (3.1) By letting p in (3.1), we obtain x, W = x k max. (3.2) 1 k K By letting p = 1 in (3.1), we have x 1, W = K x k. We call x 1, W the W -scaled 1-norm of x and call x, W the W -scaled -norm of x. It is a simple mathematical exercise [7], [8] that x, W x p, W x 1, W, 1 p. (3.3) B. A General K-Approximation Algorithm for MCP In this section, we present a very general K-approximation algorithm for MCP(G, s, t, K, W, ω). The algorithm is listed in the following as Algorithm 1. We will discuss important special cases of this algorithm in next section. Theorem 3.1: Algorithm 1 finds an s t path π R in (Km + n log n) time. Moreover, π R is a K-approximation to MCP(G, s, t, K, W, ω). In other words, ω k (π R ) K, 1 k K, where is the optimal value of MCP(G, s, t, K, W, ω).
5 5 Algorithm 1 General-MCP(G, s, t, K, W, ω) 1: Construct an auxiliary graph G R = (V, E, ω R ) where V and E are the same as in G and ω R is a new edge weighting function such that for each e E, ω R (e) satisfies the following inequality: (ω 1 (e),..., ω K (e)), W ω R (e) (ω 1 (e),..., ω K (e)) 1, W. 2: Compute a shortest s t path π R in G R, with respect to the edge weighting function ω R. utput π R. PRF. The graph G R can be constructed in (n + Km) time, as we need to spend (K) time to compute ω R (e) for each edge e E, leading to (Km) time for all edges. Using Dijkstra s shortest path algorithm, π R can be computed in (m + n log n) additional time. This proves the time complexity of the algorithm. Recall that is the optimal value of MCP(G, s, t, K, W, ω). Therefore there exists an s t path π opt such that ω k (π opt ), 1 k K. This implies e π opt ω k (e), 1 k K. (3.4) We can rewrite (3.4) as ω k (e) e π opt e π opt, 1 k K. (3.5) Summing (3.5) over all K possible values of k, we have ω k (e) K W. (3.6) k It follows from the definition of ω R that KX ω R ω k (e) (e) (ω 1(e),..., ω K(e)) 1, W =, e E. (3.7) Therefore (3.6) and (3.7) imply ω R (π opt ) = X e π opt ω R (e) X KX e π opt ω k (e) K. (3.8) Since π R is a shortest s t path in G R, we have (using inequality (3.8)) ω R (π R ) ω R (π opt ) K. (3.9) Using the definition of ω R ( ), we have e π max ω k(e) R = max 1 k K 1 k K ω k (e) ω k (e) max ω R (e) 1 k K = ω R (π R ) K. (3.10) This implies ω k (π R ) = ω k (e) K, 1 k K. (3.11) In other words, π R is a K-approximation to MCP(G, s, t, K, W, ω). C. Special Cases of the General K-Approximation Algorithm In Section 3-B, we have presented a general K- approximation algorithm for MCP(G, s, t, K, W, ω). That algorithm is based on computing a shortest s t path with respect to a new edge weighting function ω R (e), where (ω 1 (e),..., ω K (e)), W ω R (e) (ω 1 (e),..., ω K (e)) 1, W, e E. Here we discuss some important special choices of ω R ( ). Example 3.1: As our first special case, we choose ω R (e) = (ω 1 (e),..., ω K (e)), W. Since this choice of ω R ( ) satisfies the condition of Algorithm 1, we have Corollary 3.1: A K-approximation to MCP can be obtained by computing a shortest s t path with respect to the edge weighting function ω R (e) = (ω 1 (e),..., ω K (e)), W. This is the edge weighting function used by Xue et al. in [31]. This example shows that Algorithm 1 contains the K-approximation algorithm for MCP presented in [31] as a special case. Example 3.2: As our second special case, we choose ω R (e) = (ω 1 (e),..., ω K (e)) 1, W. Since this choice of ω R ( ) satisfies the condition of Algorithm 1, we have Corollary 3.2: A K-approximation to MCP can be obtained by computing a shortest s t path with respect to the edge weighting function ω R (e) = (ω 1 (e),..., ω K (e)) 1, W. This is the edge weighting function used by affe in [10] for K = 2 and by Andrew and Kusuma in [1] for K 2. This is representative of the algorithms for MCP based on the computation of a shortest path with respect to a single edge weighting function which is a linear or nonlinear combination of the K edge weights [1], [4], [10], [12], [13], [23], [27], [24], [29]. It has been shown in [1], [10] that the shortest path with respect to (ω 1 (e),..., ω K (e)) 1, W is a 2-approximation to MCP. According to Theorem 2.1, a 2-approximation to MCP could be a very poor approximation to MCP. Corollary 3.2 asserts that the shortest s t path with respect to (ω 1 (e),..., ω K (e)) 1, W is a good approximation to MCP as well. Therefore Corollary 3.2 reveals new properties of a known algorithm. Example 3.3: As our third special case, we choose ω R (e) = (ω 1 (e),..., ω K (e)) p, W, where p (1, ) is a fixed real number. According to (3.3), this choice of ω R ( ) satisfies the condition of Algorithm 1. Therefore we have Corollary 3.3: Let p (1, ) is a fixed real number. A K-approximation to MCP can be obtained by computing a shortest s t path with respect to the edge weighting function ω R (e) = (ω 1 (e),..., ω K (e)) p, W. Corollary 3.3 reveals a class of K-approximation algorithms for the MCP problem that we are not aware of before. Together with Corollaries 3.1 and 3.2, it says that a K- approximation to the MCP problem can be obtained by computing a shortest s t path with respect to the scaled p-norm of the K edge weights, for any given value of p in the interval [1, ]. We want to emphasize that it is not our goal to include as many algorithms as possible. It is our goal to reveal some intrinsic properties of the MCP
6 6 problem. We have proved that every scaled p-norm leads to a simple K-approximation algorithm for the MCP problem. It is interesting to find out which value of p leads to the best algorithm in this class, in terms of theoretical guarantees and practical implementations. This forms an important future research topic. 4. CNCLUSINS In this paper, we have studied the multi-constrained QoS routing problem where each edge has K 2 additive QoS parameters. We studied the relationship between two wellknown optimization criteria used in the literature. We then presented a class of K-approximation algorithms that are based on a shortest path with respect to a single edge weighting function. We have demonstrated that our class of algorithms contains some well-known algorithms as special cases. ur results provide a strong theoretical foundation for fast heuristic algorithms for the MCP problem based on the computation of a shortest path with respect to a single edge weighting function which is a linear combination of the K edge weights. ACKNWLEDGMENT The authors wish to thank the associate editor and three anonymous reviewers whose comments on an earlier version of this paper have helped to significantly improve the presentation of this paper. REFERENCES [1] L.L.H. Andrew and A.A.N.A. Kusuma; Generalised analysis of a QoSaware routing algorithm; IEEE Globecom 1998; pp [2] S. Chen and K. Nahrstedt; n finding multi-constrained paths; IEEE ICC 1998; pp [3] F. Ergun, R. Sinha and L. Zhang; An improved FPTAS for restricted shortest path; Information Processing Letters; Vol. 83(2002), pp [4] G. Feng, C. Douligeris, K. Makki, N. Pissinou; Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation; IEEE ICC 2002; pp [5] M.R. Garey and D.S. ohnson; Computers and Intractability: A Guide to the Theory of NP-Completeness; W.H. Freeman, [6] A. Goel, K.G. Ramakrishnan, D. Kataria and D. Logothetis; Efficient computation of delay-sensitive routes from one source to all destinations; IEEE Infocom 2001; pp [7] G.H. Golub and C.F. Van Loan; Matrix Computations; 2nd edition, The ohns Hopkins University Press, [8] G.H. Hardy,.E. Littlewood, G. Polya; Inequalities; Cambridge University Press, Cambridge, [9] R. Hassin; Approximation schemes for the restricted shortest path problem; Mathematics of perations Research; vol. 17(1992), pp [10].M. affe; Algorithms for finding paths with multiple constraints; Networks ournal; Vol. 14(1984), pp [11] X. ia; A distributed algorithm of delay bounded multicast routing for multimedia applications in wide area networks; IEEE/ACM Transactions on Networking; Vol. 6(1998), pp [12] A. uttner, B. Szviatovszki, I. Mecs and Z. Rajko; Lagrange relaxation based method for the QoS routing problem; IEEE Infocom 2001; pp [13] P. Khadivi, S. Samavi, T.D. Todd, H. Saidi; Multi-constraint QoS routing using a new single mixed metric; IEEE ICC 2004; pp [14] T. Korkmaz and M. Krunz; A randomized algorithm for finding a path subject to multiple QoS requirements; Computer Networks ournal; Vol. 36(2001), pp [15] T. Korkmaz and M. Krunz; Mult-constrained optimal path selection; IEEE Infocom 2001; pp [16] W. Liu, W. Lou and Y. Fang; An efficient quality of service routing algorithm for delay-sensitive applications; Computer Networks; Vol. 47(2005), pp [17] D.H. Lorenz and D. Raz; A simple efficient approximation scheme for the restricted shortest path problem; perations Research Letters; Vol. 28(2001), pp [18] Q. Ma and P. Steenkiste; Quality-of-service routing for traffic with performance guarantees; IWQoS 1997; May [19] A. rda and A. Sprintson; Efficient algorithms for computing disjoint QoS paths; IEEE Infocom 2004; pp [20] N.S.V. Rao and S.G. Batsell; QoS routing via multiple paths using bandwidth reservation; IEEE Infocom 1998; pp [21] S. Siachalou and L. Georgiadis; Efficient QoS routing; Computer Networks; Vol. 43(2003), pp [22] M. Song and S. Sahni; Approximation algorithms for multiconstrained quality-of-service routing; IEEE Transactions on Computers; Vol. 55(2006), pp [23] P. Van Meighem and F.A. Kuipers; Concept of exact QoS routing algorithms; IEEE/ACM Transactions on Networking; Vol. 12(2004), pp [24] P. Van Mieghem, H. De Neve and F.A. Kuipers; Hop-by-hop quality of service routing; Computer Networks; Vol. 37(2001), pp [25] Z. Wang and. Crowcroft; Quality-of-service routing for supporting multimedia applications; IEEE ournal on Selected Areas in Communications; Vol. 14(1996), pp [26] A. Warburton; Approximation of Pareto optima in multiple-objective, shortest path problem; perations Research; Vol. 35(1987), pp [27] Y. Xiao, K. Thulasiraman, G. Xue; QoS routing in communication networks: approximation algorithms based on the primal simplex method of linear programming; IEEE Transactions on Computers; Vol. 55(2006), pp [28] G. Xue; Primal-dual algorithms for computing weight-constrained shortest paths and weight-constrained minimum spanning trees; IEEE IPCCC 2000; pp [29] G. Xue; Minimum cost QoS multicast and unicast routing in communication networks; IEEE Transactions on Communications; Vol. 51(2003), pp [30] G. Xue, A. Sen and R. Banka; Routing with many additive QoS constraints; IEEE ICC 2003; pp [31] G. Xue, A. Sen, W. Zhang,. Tang and K. Thulasiraman; Finding a path subject to many additive QoS constraints; IEEE/ACM Transactions on Networking; accepted for publication. Available at xue/papers/tnet2007-qos01.pdf. [32] X. Yuan; Heuristic algorithms for multiconstrained quality-of-service routing; IEEE/ACM Transactions on Networking; Vol. 10(2002), pp
Multi-criteria approximation schemes for the resource constrained shortest path problem
Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract
More informationGEN-LARAC: A Generalized Approach to the Constrained Shortest Path Problem under Multiple Additive Constraints
GEN-LARAC: A Generalized Approach to the Constrained Shortest Path Problem under Multiple Additive Constraints Ying Xiao 1, Krishnaiyan Thulasiraman 1, and Guoliang Xue 2 1 School of Computer Science University
More informationComputing a Most Probable Delay Constrained Path: NP-Hardness and Approximation Schemes
1 Computing a Most Probable Delay Constrained Path: NP-Hardness and Approximation Schemes Ying Xiao, Krishnaiyan Thulasiraman, Fellow, IEEE, Xi Fang, Dejun Yang and Guoliang Xue, Fellow, IEEE Abstract
More informationResearch Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem
Applied Mathematics Volume 2012 Article ID 394721 8 pages doi:10.1155/2012/394721 Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem Yen Hung Chen
More informationQoS Routing Under Multiple Additive Constraints: A Generalization of the LARAC Algorithm
Received 30 November 2014; revised 9 February 2015; accepted 27 April 2015. Date of Publication 5 May 2015; date of current version 8 June 2016. Digital Object Identifier 10.1109/TETC.2015.2428654 QoS
More informationALL-OPTICAL networks transmit information on a very
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 8, AUGUST 2006 45 An Improved Algorithm for Optimal Lightpath Establishment on a Tree Topology Guoliang Xue, Senior Member, IEEE, Weiyi Zhang,
More informationThe Generalized Regenerator Location Problem
The Generalized Regenerator Location Problem Si Chen Ivana Ljubić S. Raghavan College of Business and Public Affairs, Murray State University Murray, KY 42071, USA Faculty of Business, Economics, and Statistics,
More informationarxiv: v1 [cs.cg] 29 Jun 2012
Single-Source Dilation-Bounded Minimum Spanning Trees Otfried Cheong Changryeol Lee May 2, 2014 arxiv:1206.6943v1 [cs.cg] 29 Jun 2012 Abstract Given a set S of points in the plane, a geometric network
More information2 Notation and Preliminaries
On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that
More informationDuality of LPs and Applications
Lecture 6 Duality of LPs and Applications Last lecture we introduced duality of linear programs. We saw how to form duals, and proved both the weak and strong duality theorems. In this lecture we will
More informationAn Improved Approximation Algorithm for Computing Disjoint QoS Paths
An Improved Approximation Algorithm for Computing Disjoint QoS Paths Chao Peng Hong Shen Graduate School of Information Science Japan Advanced Institute of Science and Technology 1-1 Tatsunokuchi, Ishikawa,
More informationWeek Cuts, Branch & Bound, and Lagrangean Relaxation
Week 11 1 Integer Linear Programming This week we will discuss solution methods for solving integer linear programming problems. I will skip the part on complexity theory, Section 11.8, although this is
More informationTopic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007
CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation
More informationSolutions to Exercises
1/13 Solutions to Exercises The exercises referred to as WS 1.1(a), and so forth, are from the course book: Williamson and Shmoys, The Design of Approximation Algorithms, Cambridge University Press, 2011,
More informationChapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.
Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should
More informationLecture 4. 1 FPTAS - Fully Polynomial Time Approximation Scheme
Theory of Computer Science to Msc Students, Spring 2007 Lecturer: Dorit Aharonov Lecture 4 Scribe: Ram Bouobza & Yair Yarom Revised: Shahar Dobzinsi, March 2007 1 FPTAS - Fully Polynomial Time Approximation
More informationComputing the Norm A,1 is NP-Hard
Computing the Norm A,1 is NP-Hard Dedicated to Professor Svatopluk Poljak, in memoriam Jiří Rohn Abstract It is proved that computing the subordinate matrix norm A,1 is NP-hard. Even more, existence of
More informationApproximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko
Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru
More informationEXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling
SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM EXERCISES Prepared by Natashia Boland 1 and Irina Dumitrescu 2 1 Applications and Modelling 1.1
More informationCS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms
CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden March 9, 2017 1 Preamble Our first lecture on smoothed analysis sought a better theoretical
More informationApproximation Basics
Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for
More informationMulticriteria approximation through decomposition
Multicriteria approximation through decomposition Carl Burch Sven Krumke y Madhav Marathe z Cynthia Phillips x Eric Sundberg { Abstract We propose a general technique called solution decomposition to devise
More informationThe NP-Hardness of the Connected p-median Problem on Bipartite Graphs and Split Graphs
Chiang Mai J. Sci. 2013; 40(1) 8 3 Chiang Mai J. Sci. 2013; 40(1) : 83-88 http://it.science.cmu.ac.th/ejournal/ Contributed Paper The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and
More informationApproximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack
Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Hassene Aissi, Cristina Bazgan, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr
More informationCS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest
More informationThe Maximum Flow Problem with Disjunctive Constraints
The Maximum Flow Problem with Disjunctive Constraints Ulrich Pferschy Joachim Schauer Abstract We study the maximum flow problem subject to binary disjunctive constraints in a directed graph: A negative
More informationThe Multi-Path Utility Maximization Problem
The Multi-Path Utility Maximization Problem Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47906 {linx,shroff}@ecn.purdue.edu Abstract
More informationApproximating the minimum quadratic assignment problems
Approximating the minimum quadratic assignment problems Refael Hassin Asaf Levin Maxim Sviridenko Abstract We consider the well-known minimum quadratic assignment problem. In this problem we are given
More informationRouting. Topics: 6.976/ESD.937 1
Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution
More informationVolume 35, Issue 4. Note on goodness-of-fit measures for the revealed preference test: The computational complexity of the minimum cost index
Volume 35, Issue 4 Note on goodness-of-fit measures for the revealed preference test: The computational complexity of the minimum cost index Kohei Shiozawa Graduate School of Economics, Osaka University
More informationAn Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters
IEEE/ACM TRANSACTIONS ON NETWORKING An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters Mehrnoosh Shafiee, Student Member, IEEE, and Javad Ghaderi, Member, IEEE
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More information1.1 P, NP, and NP-complete
CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Introduction to NP-complete Problems Date: 11/01/2008 Lecturer: Lap Chi Lau Scribe: Jerry Jilin Le This lecture gives a general introduction
More informationTruthful Auction for Cooperative Communications with Revenue Maximization
Truthful Auction for Cooperative Communications with Maximization Dejun Yang, Xi Fang, and Guoliang Xue Abstract Auction theory has been applied to cooperative communications to either efficiently allocate
More informationActive Measurement for Multiple Link Failures Diagnosis in IP Networks
Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks
More informationComplexity of the min-max and min-max regret assignment problems
Complexity of the min-max and min-max regret assignment problems Hassene Aissi Cristina Bazgan Daniel Vanderpooten LAMSADE, Université Paris-Dauphine Place du Maréchal de Lattre de Tassigny, 75775 Paris
More informationThe minimum G c cut problem
The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected
More informationLecture Note: Rounding From pseudo-polynomial to FPTAS
Lecture Note: Rounding From pseudo-polynomial to FPTAS for Approximation Algorithms course in CCU Bang Ye Wu CSIE, Chung Cheng University, Taiwan Rounding Rounding is a kind of techniques used to design
More informationSpeeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees
Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern
More informationOn the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems
MATHEMATICS OF OPERATIONS RESEARCH Vol. 35, No., May 010, pp. 84 305 issn 0364-765X eissn 156-5471 10 350 084 informs doi 10.187/moor.1090.0440 010 INFORMS On the Power of Robust Solutions in Two-Stage
More informationLectures 6, 7 and part of 8
Lectures 6, 7 and part of 8 Uriel Feige April 26, May 3, May 10, 2015 1 Linear programming duality 1.1 The diet problem revisited Recall the diet problem from Lecture 1. There are n foods, m nutrients,
More informationAn Improved Approximation Algorithm for Virtual Private Network Design
An Improved Approximation Algorithm for Virtual Private Network Design Friedrich Eisenbrand Fabrizio Grandoni Abstract Virtual private network design deals with the reservation of capacities in a network,
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology 18.433: Combinatorial Optimization Michel X. Goemans February 28th, 2013 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory
More informationCO759: Algorithmic Game Theory Spring 2015
CO759: Algorithmic Game Theory Spring 2015 Instructor: Chaitanya Swamy Assignment 1 Due: By Jun 25, 2015 You may use anything proved in class directly. I will maintain a FAQ about the assignment on the
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationCost of Not Arbitrarily Splitting in Routing
Cost of Not Arbitrarily Splitting in Routing Yingjie Bi and Ao Tang School of Electrical and Computer Engineering, Cornell University yb236@cornelledu, atang@ececornelledu Abstract This paper studies routing
More informationMathematical Preliminaries
Chapter 33 Mathematical Preliminaries In this appendix, we provide essential definitions and key results which are used at various points in the book. We also provide a list of sources where more details
More informationMIT Algebraic techniques and semidefinite optimization February 14, Lecture 3
MI 6.97 Algebraic techniques and semidefinite optimization February 4, 6 Lecture 3 Lecturer: Pablo A. Parrilo Scribe: Pablo A. Parrilo In this lecture, we will discuss one of the most important applications
More informationCS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms
CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden November 5, 2014 1 Preamble Previous lectures on smoothed analysis sought a better
More informationLinear Programming. Scheduling problems
Linear Programming Scheduling problems Linear programming (LP) ( )., 1, for 0 min 1 1 1 1 1 11 1 1 n i x b x a x a b x a x a x c x c x z i m n mn m n n n n! = + + + + + + = Extreme points x ={x 1,,x n
More informationChapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.
Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 P and NP P: The family of problems that can be solved quickly in polynomial time.
More informationThe Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization
Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University
More informationNetwork Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini
In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique
More informationThe Knapsack Problem. 28. April /44
The Knapsack Problem 20 10 15 20 W n items with weight w i N and profit p i N Choose a subset x of items Capacity constraint i x w i W wlog assume i w i > W, i : w i < W Maximize profit i x p i 28. April
More informationCHAPTER 3: INTEGER PROGRAMMING
CHAPTER 3: INTEGER PROGRAMMING Overview To this point, we have considered optimization problems with continuous design variables. That is, the design variables can take any value within a continuous feasible
More informationMULTIHOMING IN COMPUTER NETWORKS: A TOPOLOGY-DESIGN APPROACH. Ariel Orda Raphael Rom
MULTIHOMING IN COMPUTER NETWORKS: A TOPOLOGY-DESIGN APPROACH Ariel Orda Raphael Rom Department of Electrical Engineering Technion - Israel Institute of Technology Haifa, Israel 32000 Revised June 1989
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans April 5, 2017 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory
More informationIntroduction to Algorithms
Introduction to Algorithms 6.046J/18.401J/SMA5503 Lecture 18 Prof. Erik Demaine Negative-weight cycles Recall: If a graph G = (V, E) contains a negativeweight cycle, then some shortest paths may not exist.
More informationDeciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point
Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Gérard Cornuéjols 1 and Yanjun Li 2 1 Tepper School of Business, Carnegie Mellon
More informationDistributed Optimization. Song Chong EE, KAIST
Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links
More informationInteger Equal Flows. 1 Introduction. Carol A. Meyers Andreas S. Schulz
Integer Equal Flows Carol A Meyers Andreas S Schulz Abstract We examine an NP-hard generalization of the network flow problem known as the integer equal flow problem The setup is the same as a standard
More informationMulticommodity Flows and Column Generation
Lecture Notes Multicommodity Flows and Column Generation Marc Pfetsch Zuse Institute Berlin pfetsch@zib.de last change: 2/8/2006 Technische Universität Berlin Fakultät II, Institut für Mathematik WS 2006/07
More informationCS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source
More information- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs
LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs
More informationTheory of Computation Chapter 1: Introduction
Theory of Computation Chapter 1: Introduction Guan-Shieng Huang Sep. 20, 2006 Feb. 9, 2009 0-0 Text Book Computational Complexity, by C. H. Papadimitriou, Addison-Wesley, 1994. 1 References Garey, M.R.
More informationScheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time
1 1 2 Scheduling Coflows in Datacenter Networs: Improved Bound for Total Weighted Completion Time Mehrnoosh Shafiee and Javad Ghaderi Abstract Coflow is a recently proposed networing abstraction to capture
More informationCS261: A Second Course in Algorithms Lecture #9: Linear Programming Duality (Part 2)
CS261: A Second Course in Algorithms Lecture #9: Linear Programming Duality (Part 2) Tim Roughgarden February 2, 2016 1 Recap This is our third lecture on linear programming, and the second on linear programming
More informationAPPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS
Computing and Informatics, Vol. 23, 2004, 37 49 APPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS Ning Chen, Jie Meng, Jiawei Rong, Hong Zhu Department of Computer Science, Fudan University
More informationThe Steiner k-cut Problem
The Steiner k-cut Problem Chandra Chekuri Sudipto Guha Joseph (Seffi) Naor September 23, 2005 Abstract We consider the Steiner k-cut problem which generalizes both the k-cut problem and the multiway cut
More informationDuality Theory, Optimality Conditions
5.1 Duality Theory, Optimality Conditions Katta G. Murty, IOE 510, LP, U. Of Michigan, Ann Arbor We only consider single objective LPs here. Concept of duality not defined for multiobjective LPs. Every
More informationA Note on the Density of the Multiple Subset Sum Problems
A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,
More informationMatchings in hypergraphs of large minimum degree
Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains
More informationOptimal Fractal Coding is NP-Hard 1
Optimal Fractal Coding is NP-Hard 1 (Extended Abstract) Matthias Ruhl, Hannes Hartenstein Institut für Informatik, Universität Freiburg Am Flughafen 17, 79110 Freiburg, Germany ruhl,hartenst@informatik.uni-freiburg.de
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths
More informationDifferential approximation results for the Steiner tree problem
Differential approximation results for the Steiner tree problem Marc Demange, Jérôme Monnot, Vangelis Paschos To cite this version: Marc Demange, Jérôme Monnot, Vangelis Paschos. Differential approximation
More informationContents. Introduction
Introduction Contents Chapter 1. Network Flows 1 1.1. Graphs 1 1.2. Shortest Paths 8 1.3. Maximum Flow 17 1.4. Min Cost Flows 22 List of frequently used Symbols 31 Bibliography 33 Index 37 iii i Introduction
More informationA Polynomial-Time Algorithm to Find Shortest Paths with Recourse
A Polynomial-Time Algorithm to Find Shortest Paths with Recourse J. Scott Provan Department of Operations Research University of North Carolina Chapel Hill, NC 7599-380 December, 00 Abstract The Shortest
More informationComputational Complexity
Computational Complexity Algorithm performance and difficulty of problems So far we have seen problems admitting fast algorithms flow problems, shortest path, spanning tree... and other problems for which
More informationOn a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach
On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach Anton Eremeev,2, Alexander Kel manov,3, and Artem Pyatkin,3 Sobolev Institute of Mathematics, 4 Koptyug Ave.,
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More information1 Primals and Duals: Zero Sum Games
CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown
More informationComplexity analysis of job-shop scheduling with deteriorating jobs
Discrete Applied Mathematics 117 (2002) 195 209 Complexity analysis of job-shop scheduling with deteriorating jobs Gur Mosheiov School of Business Administration and Department of Statistics, The Hebrew
More informationImproved Bounds for Flow Shop Scheduling
Improved Bounds for Flow Shop Scheduling Monaldo Mastrolilli and Ola Svensson IDSIA - Switzerland. {monaldo,ola}@idsia.ch Abstract. We resolve an open question raised by Feige & Scheideler by showing that
More informationCS 583: Approximation Algorithms: Introduction
CS 583: Approximation Algorithms: Introduction Chandra Chekuri January 15, 2018 1 Introduction Course Objectives 1. To appreciate that not all intractable problems are the same. NP optimization problems,
More informationNP-Completeness. f(n) \ n n sec sec sec. n sec 24.3 sec 5.2 mins. 2 n sec 17.9 mins 35.
NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979. NP-Completeness 1 General Problems, Input Size and
More informationProvable Approximation via Linear Programming
Chapter 7 Provable Approximation via Linear Programming One of the running themes in this course is the notion of approximate solutions. Of course, this notion is tossed around a lot in applied work: whenever
More informationMINIMUM DIAMETER COVERING PROBLEMS. May 20, 1997
MINIMUM DIAMETER COVERING PROBLEMS Esther M. Arkin y and Refael Hassin z May 20, 1997 Abstract A set V and a collection of (possibly non-disjoint) subsets are given. Also given is a real matrix describing
More informationThe maximum edge-disjoint paths problem in complete graphs
Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationThe maximum edge biclique problem is NP-complete
The maximum edge biclique problem is NP-complete René Peeters Department of Econometrics and Operations Research Tilburg University The Netherlands April 5, 005 File No. DA5734 Running head: Maximum edge
More informationComputing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard
Journal of Uncertain Systems Vol.9, No.2, pp.124-132, 2015 Online at: www.jus.org.uk Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard Sio-Long Lo Faculty
More informationBounds on the Traveling Salesman Problem
Bounds on the Traveling Salesman Problem Sean Zachary Roberson Texas A&M University MATH 613, Graph Theory A common routing problem is as follows: given a collection of stops (for example, towns, stations,
More informationCan Shortest-path Routing and TCP Maximize Utility
Can Shortest-path Routing and TCP Maximize Utility Jiantao Wang Lun Li Steven H. Low John C. Doyle California Institute of Technology, Pasadena, USA {jiantao@cds., lun@cds., slow@, doyle@cds.}caltech.edu
More informationScheduling Parallel Jobs with Linear Speedup
Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev, m.uetz}@ke.unimaas.nl
More informationWłodzimierz Ogryczak. Warsaw University of Technology, ICCE ON ROBUST SOLUTIONS TO MULTI-OBJECTIVE LINEAR PROGRAMS. Introduction. Abstract.
Włodzimierz Ogryczak Warsaw University of Technology, ICCE ON ROBUST SOLUTIONS TO MULTI-OBJECTIVE LINEAR PROGRAMS Abstract In multiple criteria linear programming (MOLP) any efficient solution can be found
More informationLecture 18: P & NP. Revised, May 1, CLRS, pp
Lecture 18: P & NP Revised, May 1, 2003 CLRS, pp.966-982 The course so far: techniques for designing efficient algorithms, e.g., divide-and-conquer, dynamic-programming, greedy-algorithms. What happens
More informationWeek 4. (1) 0 f ij u ij.
Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known
More informationP versus NP. Math 40210, Fall November 10, Math (Fall 2015) P versus NP November 10, / 9
P versus NP Math 40210, Fall 2015 November 10, 2015 Math 40210 (Fall 2015) P versus NP November 10, 2015 1 / 9 Properties of graphs A property of a graph is anything that can be described without referring
More informationA An Overview of Complexity Theory for the Algorithm Designer
A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula
More information