Approximating some network design problems with node costs

Size: px
Start display at page:

Download "Approximating some network design problems with node costs"

Transcription

1 Approximating some network design problems with node costs Guy Kortsarz Zeev Nutov July 3, 2009 Abstract We study several multi-criteria undirected network design problems with node costs and lengths. All these problems are related to the Multicommodity Buy at Bulk (MBB) problem in which we are given a graph G = (V,E), demands {d st : s,t V }, and a family {c v : v V } of subadditive cost functions. For every s,t V we seek to send d st flow units from s to t on a single path, so that v c v(f v ) is minimized, where f v the total amount of flow through v. In the Multicommodity Cost-Distance (MCD) problem we are also given lengths {l(v) : v V }, and seek a subgraph H of G that minimizes c(h)+ s,t V d st l H (s,t), where l H (s,t) is the minimum l-length of an st-path in H. The approximation for these two problems is equivalent up to a factor arbitrarily close to 2. We give an O(log 3 n)-approximation algorithm for both problems for the case of demands polynomial in n. The previously best known approximation ratio for these problems was O(log 4 n) [Chekuri et al., FOCS 2006] and [Chekuri et al., SODA 2007]. We also consider the Maximum Covering Tree (MaxCT) problem which is closely related to MBB: given a graph G = (V,E), costs {c(v) : v V }, profits {p(v) : v V }, and a bound C, find a subtree T of G with c(t) C and p(t) maximum. The best known approximation algorithm for MaxCT [Moss and Rabani, STOC 2001] computes a tree T with c(t) 2C and p(t) = Ω(opt/log n). We provide the first nontrivial lower bound on approximation by proving that the problem admits no better than Ω(1/(log log n)) approximation assuming NP Quasi(P). This holds true even if the solution is allowed to violate the budget by a universal constant ρ. Our result disproves a conjecture of [Moss and Rabani, STOC 2001]. Another related to MBB problem is the Shallow Light Steiner Tree (SLST) problem, in which we are given a graph G = (V,E), costs {c(v) : v V }, lengths {l(v) : v V }, a set U V of terminals, and a bound L. The goal is to find a subtree T of G containing U with diam l (T) L and c(t) minimum. We give an algorithm that computes a tree Rutgers University, Camden. Partially supported by NSF support grant award number guyk@camden.rutgers.edu The Open University of Israel. nutov@openu.ac.il 1

2 T with c(t) = O(log 2 n) opt and diam l (T) = O(log n) L. Previously, a polylogarithmic bicriteria approximation was known only for the case of edge costs and edge lengths. 1 Introduction Network design problems require finding a minimum cost (sub-)network that satisfies prescribed properties, often connectivity requirements. The most fundamental problems are the ones with 0, 1 connectivity requirements. Classic examples are: Shortest Path, Min-Cost Spanning Tree, Min-Cost Steiner Tree/Forest, Traveling Salesperson, and others. Examples of problems with high connectivity requirements are: Min-Cost k-flow, Min-Cost k-edge/node-connected Spanning Subgraph, Steiner Network, and others. All these problems also have practical importance in applications. Two main types of costs are considered in the literature: the edge costs and the node costs. We consider the latter, which is usually more general than the edge costs variants; indeed, for most undirected network design problems there is a very simple reduction that transforms edge costs to node costs, but the inverse is, in general, not true. The study of network design problems with node costs is already well motivated and established from both theoretical as well as practical considerations [11, 8, 13, 4, 5]. For example, in telecommunication networks, expensive equipment such as routers and switches are located at the nodes of the underlying network, and thus it is natural to model some of these problems by assigning costs on the nodes rather than to the edges. For some previous work on undirected network-design problems with node costs see the work of Klein and Ravi [11], Guha et al. [8], Moss and Rabani [13], and Chekuri et al. [4, 5]. We mostly focus on resolving some open problems posed in these papers. 1.1 Problems considered Given a length function l on edges/nodes of a graph H, let l H (s, t) denote the l-distance between s, t in H, that is, the minimum l-length of an st-path in H (including the lengths of the endpoints). Let diam l (H) = max s,t V(H) l H (s, t) be the l-diameter of H, that is the maximum l-distance between two nodes in H. We consider the following two related problems on undirected graphs. Multicommodity Buy at Bulk (MBB) Instance: A graph G = (V, E), a family {c v : v V } of sub-additive monotone non-decreasing cost functions, a set D of pairs from V, and positive demands {d st : {s, t} D}. Objective: Find a set {P st : {s, t} D} of st-paths so that v V c v (f v ) is minimized, where f v = {d st : {s, t} D, v P st }. 2

3 Multicommodity Cost-Distance (MCD) Instance: A graph G = (V, E), costs {c(v) : v V }, lengths {l(v) : v V }, a set D of pairs from V, and positive integral demands {d st : {s, t} D}. Objective: Find a subgraph H of G that minimizes w(h, D) = c(h) + {s,t} D d st l H (s, t) (1) As linear functions are subadditive, MCD is a special case of MBB. The following statement shows that up to a factor arbitrarily close to 2, MCD and MBB are equivalent w.r.t. approximation. Proposition 1.1 ([2]) If there exists a ρ-approximation algorithm for MCD then there exists a (2ρ + ε)-approximation algorithm for MBB for any ε > 0. We consider two other fundamental problems closely related to MBB (see an explanation below): Maximum Covering Tree (MaxCT) Instance: A graph G = (V, E), costs {c(v) : v E}, profits {p(v) : v V }, and a bounds C. Objective: Find a subtree T of G with c(t) C and p(t) maximum. Shallow-Light Steiner Tree (SLST) Instance: A graph G = (V, E), costs {c(v) : v V }, lengths {l(v) : v V }, a set U V of terminals, and a bound L. Objective: Find a subtree T of G containing U with diam l (T) L and c(t) minimum. Each one of the problems MBB and SLST has an edge version, where the costs/lengths are given on the edges. As was mentioned, the edge version admits an easy approximation ratio preserving reduction to the node version. 1.2 The unifying theme of the problems considered The following problem was defined in [9]: k-buy at Bulk Steiner Tree (k-bbst) Instance: A graph G = (V, E), costs {c(v) : v V }, lengths {l(v) : v V }, a set U V of terminals, a root r U, a diameter bound L, a cost bound c and an integer k. Objective: Find a subtree H of G containing r and at least k 1 additional terminals of U, of diameter L and cost c This problem is related to MBB as follows (this holds for both edge and node costs). Let T be an optimal k-bbst solution for an instance at hand. Thus c(t) = c and T has diameter L. 3

4 Theorem 1.2 [9] There exist two universal constants c 1, c 2 and a polynomial time algorithm that finds a a tree H containing at lest k/8 terminal with cost at most c 1 log 3 n c and diameter at most c 2 log n L Such an algorithm is called a (O(log 3 ), O(logn)) bicriteria approximation algorithm for k- BBST. Theorem 1.3 [5] The algorithm of Theorem 1.2 can be used to design a polynomial time combinatorial O(log 4 n)-ratio approximation algorithm for MBB The importance of Theorem 1.3 is that from a more practical point of view, the combinatorial algorithm is much faster than the algorithm of [5], which repeatedly solves large linear programs. It thus seems important to try and get a better bicriteria approximation for k-bbst than the one in Theorem 1.2. Improved bicriteria algorithm for k-bbst would imply a better combinatorial algorithm for MBB. Thus, if the cost returned is O(ρ 1 ) c and the diameter is O(ρ 2 L) the approximation ratio derived is O(log n) ρ 1 + O(log 3 n) ρ 2. Since we are facing difficulties in improving the results for k-bbst we study MaxCT and SLST which are closely related to, but are are relaxed variants of k-bbst. The hope that it may shed light on k-bbst. Also, MaxCT and SLST are interesting in their own right. Comparing MaxCT and k-bbst: If the costs are uniform, setting cost bound k is the same as seeking a tree spanning a subset of size k of the terminals, and maximizing the profit. However, the big difference between k-bbst and MaxCT is that there are no length constrains in MaxCT and that the primal-dual techniques of [13] do not seem suitable to handle lengths constrains. Comparing SLST and k-bbst: The SLST problem has lengths. And also, the goal is indeed to produce (given a cost and diameter bounds) a tree that is both shallow and light. What seems to make these two problems quite different is that SLST requires covering all terminals (and not only k as in k-bbst). The difference seems quite significant, and thus k-bbst seems significantly harder to handle than SLST. In summary, one may hope that techniques for MaxCT that (in the case of uniform costs) are able to find a tree with k terminals and low cost, but may not be suited to handle distances constrains, could somehow be combined with techniques that do produce a tree that is both shallow and light, but work only for the case k = U. 1.3 Related work We survey some results on relevant network design problems with node costs. Klein and Ravi [12] showed that the Node-Weighted Steiner Tree problem is Set-Cover hard, thus it admits no o(log n) approximation unless P=NP [15]. They also obtained a matching approximation ratio using a greedy merging algorithm. Guha et al. [8] showed O(log n) integrality gap of a natural LP-relaxation for the problem. The MBB problem is motivated by economies of scale that arise in a number of applications, especially in telecommunication. The problem 4

5 is studied as the fixed charge network flow problem in operations research. The first approximation algorithm for the problem is by Salman et al. [16]. For the multi-commodity version MBB the first non-trivial result is due to Charikar and Karagiazova [3] who obtained an O(log D exp(o( log n log log n)))-approximation, where D is the sum of the demands. In [4] an O(log 4 n)-approximation algorithm is given for the edge costs case, and further generalized to the node costs case in [5]. See [1] for an Ω(log 1/2 ε n)-hardness result. The MaxCT problem was introduced in [8] motivated by efficient recovery from power outage. In [8] a pseudo approximation algorithm is presented that returns a subtree T with c(t) 2C and p(t) = Ω(P/ log 2 n), where P is the maximum profit under budget cost C. This was improved in [13] to produce a tree T with c(t) 2C and p(t) = Ω(P/ log n). For a related minimization problem when one seeks to find a minimum cost tree T with p(t) P [13] gives an O(ln n)-approximation algorithm. 1.4 Our results The previously best known ratio for MCD/MBB was O(log 4 n) both for edge costs [4] and node costs [5], and this was also so for polynomial demands. We improve this result by using, among other things, a better LP-relaxation for the problem. Theorem 1.4 MCD/MBB with polynomial demands admits an O(log 3 n)-approximation algorithm. Our next result is for the MaxCT problem. In [13] it is conjectured that MaxCT admits an O(1) approximation algorithm (which would have been quite helpful for dealing with k-bbst). We disprove this conjecture. Theorem 1.5 MaxCT admits no constant approximation algorithm unless NP DTIME(n O(log n) ) even if the algorithm is allowed to use a budget of ρ B for any universal constant ρ. MaxCT admits no o(log log n) approximation algorithm unless NP DTIME(n polylog(n) ) even if the algorithm is allowed to use ρ B budget for any universal constant ρ. Our last result is for the SLST problem. For SLST with edge costs and edge lengths, the algorithm of [12] computes a tree T with c(t) = O(logn) opt and diam l (T) = O(log n) L. We consider the more general case of node costs and node lengths. Theorem 1.6 SLST with node costs and lengths admits an approximation algorithm that computes a tree T with c(t) = O(log 2 n) opt and diam l (T) = O(log n) L. Theorems 1.4 and 1.5 are proved in Sections 2 and 3. 5

6 2 Improved algorithm for MBB (Proof of Theorem 1.4) In this section we prove Theorem 1.4. We give an O(log 2 n log N)-approximation algorithm for MCD with running time polynomial in N, where N is the sum of the demands plus n. If N is polynomial in n, the running time is polynomial in n, and the approximation ratio is O(log 3 n). We may assume (by duplicating nodes) that all demands are 1. Then our problem is: Instance: A graph G = (V, E), costs {c(v) : v V }, lengths {l(v) : v V }, and a set D of node pairs. Objective: Find a subgraph H of G minimizing w(h, D) = c(h) + l H (s, t). {s,t} D For the latter problem, we give an O(log 2 n log D )-approximation algorithm. 2.1 Approximate greedy algorithm and junction trees We use a result about the performance of a Greedy Algorithm for the following type of problems: Covering Problem Instance: A groundset Π and functions ν, w on 2 Π with ν(π) = 0. Objective: Find P Π with ν(p) = ν(π) and with w(p) minimized. Let ρ > 1 and let opt be the optimal solution value for the Covering Problem. The ρ-greedy Algorithm starts with P = and iteratively adds subsets of Π P to P one after the other using the following rule. As long as ν(p) > ν(π) it adds to P a set R Π P so that σ P (R) = w(r) ν(p) ν(p + R) ρ opt ν(p) ν(π). (2) The following known statement follows by a standard set-cover analysis, c.f., [11]. Theorem 2.1 If ν is decreasing and w is increasing and subadditive, then the ρ-greedy Algorithm computes a solution P with w(p) ρ [ln(ν( ) ν(π)) + 1] opt. In our setting, Π is the family of all st-paths, {s, t} D. For a set R Π of paths connecting a set R of pairs in D, let ν(r) = D R be the number of pairs in D not connected by paths in R, and let w(r) = c(r) + {s,t} R l(p st ), where c(r) denotes the cost of the union of the paths in R, and P st is the shortest st-path in R. Note that ν(π) = 0 and ν( ) = D. We will show how to find such R satisfying (2) with ρ = O(log 2 n). W.l.o.g., we may consider the case P =. (Otherwise, we consider the residual instance obtained by excluding from D all pairs connected by P and setting P = ; it is easy to see that if R satisfies (2) for the residual instance, then this is also so for the original instance.) Assuming P =, (2) can be rewritten as: σ(r) = c(r) R + {s,t} R l(p st ) ρ opt R D 6. (3)

7 The quantity σ(r) in (3) is the density of R; it is a sum of cost-part c(r)/ R and the remaining length-part. The following key statement from [4] shows that with O(log n) loss in the length part of the density, we may restrict ourselves to very specific R, as given in the following definition; in [4] it is stated for edge-costs, but the generalization to node-costs is immediate. Definition 2.1 A tree T with a designated node r is a junction tree for a subset R D of node pairs in T if the unique paths in T between the pairs in R all contain r. Lemma 2.2 ([4], The Junction Tree Lemma) Let H be an optimal solution to an MCD instance with {0, 1} demands. Let C = c(h ) and let L = {s,t} D l H (s, t). Then there exists a junction tree T for a subset R Q of pairs, so that diam l (T) = O(log n) L/ D and c(t)/ R = O(C/ D ). If we could find a pair T, R as in Lemma 2.2 in polynomial time, then we would obtain an O(log D log n)-approximation algorithm, by Theorem 2.1. In [4] it is shown how to find such a pair that satisfies (3) with ρ = O(log 3 n). We will show how to find such a pair with ρ = O(log 2 n). Theorem 2.3 There exists a polynomial time algorithm that given an instance of MCD with {0, 1} demands computes a set R of paths connecting a subset R D of pairs satisfying (3) with ρ = O(log 2 n). Motivated by Lemma 2.2, the following LP was used in [4, 5]. Guess the common node r of the paths in R of the junction tree T. Let U be the union of pairs in D. Relax the integrality constraints by allowing fractional nodes and paths. For v V, x v is the fraction of v taken into the solution. For u U, y u is the total amount of flow v delivers to r. In the LP, we require y s = y t for every {s, t} D, so y s = y t amount of flow is delivered from s to t via r. For u U let Π u be the set of all ur-paths in Π, and thus Π = u U Π u. For P Π, f P is the amount of flow through P. Dividing all variables by R (note that this does not affect the objective value), gives the following LP: 2.2 The LP used (LP1) min s.t. v V c(v) x v + P Π l(p) f P u U y u = 1 {P Π u v P } f P x v v V, u U P Π u f P y u u U y s y t = 0 {s, t} D x v, f P, y u 0 v V, P Π, u U Let A log n L/ D be the bound on the lengths of the paths in R guaranteed by Lemma 2.2. We use almost the same LP as (LP1), except that we seek to minimize the cost only, and 7

8 restrict ourselves to paths of length at most A log n L/ D, which reflects better the statement in Lemma 2.2. For Π Π let Π = {P Π : l(p) A log n L/ D }. Again recall that y u is the flow delivered from u to r. The LP we use is: (LP2) min s.t. v V c(v) x v u U y u = 1 {P Π u v P } f P x v v V, u U P Π u f P y u u U y s y t = 0 {s, t} D x v, f P, y u 0 v V, P Π, u U Although the number of variables in (LP2) might be exponential, any basic feasible solution to (LP2) has O(N 2 ) non-zero variables. Lemma 2.4 LP(2) can be solved in time polynomial in n Proof: In [7] we give a proof via duality to a very similar LP. Here we show that another method is applicable (besides the duality arguments that still hold true). We transform our instance into a new one with lengths being integral and bounded by N 4, so that the loss in the approximation ratio is a constant, and hence is negligible in our context. By trying all nodes, we guess a node v that has the largest length among the nodes that carry a positive flow in some optimal solution H. Let M = l(v). Zero the length of all nodes u with l(u) < M/N 4. We claim that the decrease in the length part {s,t} Q l H (s, t) of w(h, Q) due to this modification is negligible. Note that the total demand that goes through one node is at most N 2. Thus if u is a node so that l(u) M/N 4, then the contribution of u to the length part is at most l(u) N 2 M/N 2, and the contribution of all such nodes is at most M/N. Since at least one unit of demand goes through v, {s,t} Q l H (s, t) M. Hence the loss is at most a fraction 1/N of the length part. Now, the minimum (non-zero) length of a node that contributes to the length part is at least M/N 4. Divide the length of every node by M/N 4 and round down the result to the nearest integer. It is easy to see that the rounding down only incurs a loss of factor 2 in the sum of the distances. Thus the total loss incurred is at most 2+1/N, as claimed. We show that (LP2) can be solved by writing an equivalent LP with polynomial number of variables and constraints. Recall that we assume that the lengths are integral and the largest node length is at most N 4. This implies that the maximum length of a path is N 5. Define a variable s(v, u, P, j) for every v V, u U, P Π u, and j N 5, so that s(v, u, P, j) = 1 if, and only if, v at distance j from u in the path P. Define f(v, u, j) = P Π u s(v, u, P, j) f P. Also f(u, j) = v f(v, u, j). Thus f(u, j) is the total amount of flow from u to r at distance j from u. The above variables are used to define an alternative LP. The flow conservation inequality is defined as follows. Every path in Π u in which v is at distance j has a node z prior to v of 8

9 distance j l(v) from u. Thus the conservation of flow equality is: The flow from u to r is f(v, u, j) = zv E f(z, u, j l(v)) v V, u U, j N 5. 1 j N 5,vr E f(u, j l(r)). It is not hard to verify, that the obtained LP is equivalent to (LP2). As its size is polynomial in N, it can be solved in time polynomial in N. Given a solution for the modified LP, the solution for (LP2) is derived by standard flow decomposition By Lemma 2.2 there exists a solution to (LP2) of value O(C/ D ). Indeed, let T, R, R be as in Lemma 2.2; in particular, c(t)/ R = O(C/ D ). For u T let P u be the unique ur-path in T. Define a feasible solution for (LP2) as follows: x v = 1/ R for every v T, y u = f Pu = 1/ R for every u that belongs to some pair in R, and x u, y u, f P are zero otherwise. It easy to see that this solution is feasible for (LP2), and its value (cost) is c(t)/ R = O(C/ D ). 2.3 Proof of Theorem 1.4 We now proceed similarly to [4, 5]. We may assume that max{1/y u : u U} is polynomial in n, see [5]. Partition U into O(logn) sets U j = {u U : 1/2 j+1 y u 1/2 j }. There is some U j that delivers Ω(1/ ln n) flow units to r. Focus on that U j. Clearly, U j = Θ(2 j )/ logn. Setting x v = min{θ(2 j ) x v, 1} for all v V and f P = min{θ(2 j ) f P, 1} for all P Π, gives a feasible solution for the following LP that requires from every node in U j to deliver a flow unit to r. (LP3) min s.t. v V c(v) x v + P Π l(p) f P {P Π u v P } f P x v v V, u U j P Π u f P 1 u U j x v, f P 0 v V, P Π We bound the value of the above solution x, f for (LP3). Since we have v V c(v)x v = O(C/ D ), c(v)x v = O(2j ) C/ D. v V We later see that, since U j = Θ(2 j / log n), an extra log n factor is invoked in the costdensity part of our solution; if, e.g., U j = 2 j would hold, this log n factor would have been saved. Our main point is that the length-part of the density does not depend on the size of U j. We show this as follows. All paths used in (LP2) are of length O(logn L/ D ). First, assure that P Π u f P is not too large. For any u U j the fractional values of {f P : P Π u} only affect u, namely, if u u then Π u Π u =. Therefore, if P Π u f P >> 1, we may 9

10 assure that the sum is at most 3/2 as follows. If a single path carries at least 1/2 a unit of flow then (scaling values by only 2) this path can be used as the solution for u. Else, any minimal collection of paths delivering at least one unit of flow, delivers at most 3/2 units of flow to r. Hence the contribution of a single node u to the fractional length-part is O(log n L/ D ) P Π u f P = O(log n L/ D ). Over all terminals, the contribution is O( U j log n L/ D ). Now, use the main theorem of [5]: Theorem 2.5 ([5]) There exists a polynomial time algorithm that finds an integral solution to (LP3) of value O(log n) times the optimal fractional value of (LP3). Hence we can find in polynomial time a tree T containing r and U j with c(t) = O(log n 2 j C/ D ) and u U j l T (u, r) = O( U j log 2 n L/ D ). Note that if the tree contains i terminals then it contains i/2 pairs. This is due to the constraint y s = y t. Since the tree spans Θ(2 j / log n) pairs, its cost-part density is O(log 2 n) C/ D. Clearly, the length-part density is O(log 2 n) L/ D. This finishes the proof of Theorem 2.3, and thus also the proof of Theorem 1.4 is complete. 3 A lower bound for MaxCT (Proof of Theorem 1.5) Here we prove the following statement that implies Theorem 1.5. Theorem 3.1 MaxCT admits no better than c-approximation algorithm, even if the algorithm is allowed to use budget ρ B for any universal constant ρ, unless NP DTIME(n O(ln c exp(9c)) ). Clearly, this implies that unless P = NP, MaxCT admits no constant approximation algorithm even if the solution may violate the budget by a constant. Also, unless NP DTIME(n polylog n ) the problem admits no µ log log n-ratio approximation for some universal constant µ, even if the algorithm uses budget ρ B for some universal constant ρ. Remark: The size of the instance produced is s = n O(lnc exp(9c)) and thus c = Θ(log log s). Therefore, it is not possible to get a stronger hardness than log log n unless we get a better gap in terms of c. 3.1 The gap of Max-Coverage without budget violating We first show the result assuming the solution does not violate the budget. The extra details for the case the solution violates the budget by ρ are quite simple and gives in the next subsection. For a graph H = (V, E) and X V let Γ(X) = Γ H (X) = {v V X : uv E for some u X} denote the set of neighbors of X in H. We say that A V covers B V if B Γ H (A ). 10

11 We now define the unweighted max-coverage problem. The problem is usually presented by an input that is a collection S of sets and a number opt and the goal is to find subcollection S of S, {S } = opt sets so that S i S S i is maximize. We present the problem via bipartite graphs. Max-Coverage Instance: A bipartite graph H = (A + B, E) whose optimum cover is of cost opt Objective: Find A of cost A = opt and maximize Γ H (A ) A is called the collection of sets and B the collection of em elements. We say that b B belongs to a A is (a, b) E. If b Gamma H (A ) we say that A covers b. In the set-cover problem the goal is to cover all elements with minimum size A (namely find a minimum size A so that Γ H (A ) = B) In [6] it is proved: Theorem 3.2 For any universal constant ǫ so that for every NP C language there is polynomial time a reduction from an instance I to an instance of Max-Coverage so that 1. For a yes instance there exists a subset A A, of size opt so that γ H (A ) = B 2. For every no instance subset of A of size opt can cover more than (1 1/e) B elements In addition there is an O(n loglog n ) time reduction from I to an instance of set cover so that: 1. For a yes instance there exists a subset A of size opt that covers all of B 2. For a no instance any subset of A that covers B has size at least (1 ǫ) ln n opt for any universal constant ǫ Corollary Unless P = NP Max-Coverage admits no polynomial time 1 1/e+ǫ approximation ratio 2. Unless NP DTIME(n O(log log n ), the set-cover problem can not be approximated within (1 ǫ) ln n ratio for any universal constant ǫ approximation algorithm The following claim is essentially identical to Proposition 5.2 in [6] and is given for completeness. Claim 3.4 Unless NP DTIME(n log log n ) for any universal constant 1 < a < lnn there exists an ǫ (that depends on a) so that no algorithm that produces a solution of size a opt and covers more than 1 e a + ǫ fraction of the remaining elements for Proof: If such an algorithm exists, apply it in iterations. Each iterations adds a opt to the solution size and a fraction of at least (1 e a +ǫ) of the elements are covered. Looking at the 11

12 decline of uncovered elements, their number is e a ǫ times the previous number of uncovered elements. Thus, l that satisfies (e a ǫ) l = 1/n is an upper bound on the number of iterations needed to reduce the number of uncovered elements to 0. As ln n l = a ln(1 ǫe a ), it follows that for some constant δ that depends on a, l (1 δ) ln n/a. Since at every iteration a opt sets are added to the solution, the total number of sets in the solution is at most (1 δ)opt contradicting Corollary The reduction Define a sequence of graphs G 1, G 2,... by induction (see Fig. 1). To obtain G 1, take H, add a root r, and connect r to every node in A. Let A 1 = A and B 1 = B. To obtain G i from G i 1, i 2, take G 1 and B copies of G i 1, each corresponding to a node in B 1, and for every copy identify its root with the node corresponding to it in B 1. As the construction resembles a tree, we borrow some terms from the terminology of trees. A copy of H has level i if its A sets have distance 2i 1 to the root r. The copies of H at level i are ordered arbitrarily. A typical copy of H at level i is denoted by H ij = (A ij, B ij, E ij ) with i the level of the copy and j the index of the copy. This means that the A ij sets are at distance 2i 1 from the root and the index j is the order statistic of the copy inside level i. Definition 3.1 The depth of the reduction for a chosen constant c: For any constant c, let Let A i = j A ij and B i = j B ij. h = h(c) = 4e 9c ln(2c) (4) An H ij is an ancestor of a terminal y if y belongs to the subgraph rooted by some v B ij ; such v is called the elements ancestor of y in level i and is denoted ans i (y). Note that ans i (y) is unique. The sets A ij, B ij are the ancestors sets of y in level i and are denoted by A i y, Bi y. We also say that y is a descendant of ans i (y) and A i y and By. i The terminals of G h are j B h,j, and each of them has profit 1; other nodes have profit 0. The cost of every node in A ij is 1/ B i 1 (so the nodes in A 1 = A 11 have cost 1), and the cost of any other node is 0. The cost bound is C = h opt. Fact 3.5 The size (and the construction time) of the construction is n O(h), where n = max{ A, B }. 3.3 Analysis While increasing the level by 1, the number Max-Coverage instances grows up by B but the node costs go down by B. Hence the total cost of every level i is A, and the total cost of 12

13 (a) r (b) r A 1 G 1 A 1 E B 1 1 H E B 1 1 G 2 A 2 E 2 B 2 Figure 1: (a) The graph G 1. (b) The graph G 2 ; if instead of copies of G 1 we attach to nodes in B 1 roots of the copies of G i 1, then we obtain G i. G is h A. We may assume that any solution T to the obtained instance of MaxCT contains r. Otherwise, we may add the shortest path from r to T; the cost added is negligible in our context. Hence a subgraph T of G is a perfect solution if T contains r, T is connected, and c(t) C = h opt. Lemma 3.6 (The YES-instance) The instance G admits a perfect feasible solution T (hence T contains all terminals). Proof: Consider the graph T induced in G by r and all the copies of A B so that A = opt and A set-covers B. This graph is clearly connected and contains all terminals as each A copy covers its copy of B. The cost of all copies of A at any level i is opt. Summing over all levels gives total cost c(t) = h opt = C, as claimed. We now deal with a no instance. Fix a feasible solution T for MaxCT. Our intent is to show that any solution for a NO-instance can cover at most 1/c fraction of the terminals with budget C. Intuitively, T has an average cost of opt to spend on every level i. Averaging over all (A ij, B ij, E ij ) copies, on average the tree T has to select at most opt sets of A ij (the cost of each each set is 1/ B i 1 and there are B i 1 copies of the max coverage instance on level i). Thus if the number of sets chosen at every A ij is opt the total cost would be opt h. Definition 3.2 Level i in G is cheap (w.r.t. T) if c(t A i ) < 2opt and is expensive otherwise. A copy H ij in level i is cheap if T A ij 8 c opt and is expensive otherwise. A terminal y is cheap if for at least h/4 of the cheap levels, (A y i, B y i, Ei i ) is cheap. A cheap level i for terminal y, indicates that T A y i 8 c opt (namely, the number of A y i selected is at most 4c times the expected average 2opt). But a single cheap level for a terminals does not make the terminals cheap. The terminal is cheap only if for at least h/4 of the cheap levels, its (A y i, B y i, E i i) copy is cheap. Because the total budget bound is C we get: 13

14 Fact 3.7 At most half the levels are expensive Claim 3.8 At most 1/2c of the terminals are expensive. Proof: Let s h/2 be the number of cheap levels. Let i be some cheap level. Pick a terminal y at random. Consider the unique ancestor Hy i of y in level i. Note that every Hy i has the same number of terminal ancestors. This follows by symmetry. Plus Hy i, Hi y do not share leaves. Thus by symmetry Hy i is a random copy of the (A ij, B ij, E ij ) at level i. By the definition of a cheap level, the average number of sets chosen over all A ij copies is at most 2opt. As Hy i is a random copy (namely, the sample space is uniform over all set-coverage copies in level i) the expected size of T A i y (which equals the above average) is bounded by 2opt. Using the Markov inequality (c.f., [14]). The event A i y T 8copt holds with probability at least 1 1/(4c). By the linearity of the expectation, this implies that the expected number of cheap levels i for y, namely, levels for which A i y T > 8 c opt, is at most s/(4c) with s the number of cheap levels. Thus, by the Markov inequality, the probability that at least s/2 of the Hy i in cheap levels i are expensive for y is at most 1/(2c). Therefore, with probability at least 1 1/(2c) at least s/2 h/4 of the Hy i (on cheap levels) are cheap for y. The last inequality follows as s is the number of cheap levels and there are at least h/2 cheap levels. Thus the probability of the event that a random y is cheap is at least 1 1/(2c). By symmetry (namely because this sample space is uniform) this probability is exactly the number of cheap y over the number of terminals. Thus the fraction of expensive terminals among all terminals is at most 1/(2c). Intuitively, we ignore the affect of expensive level (namely, assume that every element was covered in such levels). We also assume that expensive terminals belong to T. But we bound the number of cheap terminals in T. The number of expensive terminals is most 1/(2c) fraction of the terminals. Now, check what is the fraction of cheap terminals that can belong to T. Lemma 3.9 (The NO-instance) If Max-Coverage is a no instance T contains at most 1/2c of the cheap terminals. Proof: Consider any cheap level i and a cheap H ij at this level. By Corollary 3.4, for every cheap H ij, as A = A ij T 8 c opt, the set A only covers a subset B = Γ(A ) so that B ( 1 1 ) B. e 1+8c We ignore the ǫ in Corollary 3.4 and add 1 to the power of e. It is easy to see that the effect of ǫ is negligible compared to the +1 in the exponent of e. This gives 1/e 1+8c fraction of the elements descendants of H ij that do not belong to T. This is because every node b B ij has the same number of terminal descendants. Thus the fraction of b B ij lost (namely, that do 14

15 not belong to T) equals the fraction of terminals lost. In summary, at every cheap level i, for every cheap H ij a fraction of at least 1/e 1+8c of its descendants terminals do not belong to T ; indeed, ans i y T for those terminals. We now use Claim 3.8. Mark all H ij that belong to expensive levels and also all expensive H ij. By Claim 3.8, the path from every y G h T to r contains at least h/4 unmarked H ij ancestors. From this we deduce that the fraction of terminals in T is at most: (1 1/e 9c ) h/4. Recall that h = 4 2 9c ln(2c) by Definition 3.1 and so we get that: (1 1/2 9c ) h/4 < 1/(2c). The fraction of terminals that belong to T is at most the number of expensive terminals plus the number of terminals of T namely, at most 1/(2c) + 1/(2c) 1/c. The proof of Lemma 3.9 is now complete. Theorem 1.5 directly follows from Lemma 3.6 and Lemma The details needed to get a bicriteria lower bound We need to define: h = 4 2 9cρ ln(2c). There is no change in the analysis of a yes instance. A layer is called cheap if the cost used in this layer is at most 2cρ opt. For a no instance, A ij in a cheap layer is called cheap if T A ij 2ρ opt and expensive if T A ij 2 c ρ opt. The budget is still h opt. Note that at most 1/2c of the (A j,k, B jk, E jk ) copies at level j may be heavy (ρ is a multiplier both in the definition of a cheap level and in the definition of a heavy copy. The two terms cancel). However, the added ρ to the number of sets chosen in every copy. Thus means that the number of cheap terminals is at most (1 1/e 9cρ ) h/4. But the new definition of h cancels ρ and the claim follows. Thus ρ only influences the degree of the polylog in the quasi-polynomial time solution. Thus the rest of the details remain unchanged. 4 Algorithm for SLST As was mentioned, for SLST with edge costs/lengths the algorithm of [12] computes a tree T with c(t) = O(log n) opt and diam l (T) = O(log n) L. This is done as follows. Let C = opt. Maintain a disjoint partition of the terminals into pairwise disjoint clusters; each cluster has a unique center. Initialize every terminal as a cluster of size 1. Then iterate as follows. Let S be the set of cluster centers. Throughout, only terminals will be centers. For s, t S let c(s, t) be the minimum cost of an st-path among st-paths of length at most L. Although computing c(s, t) is an NP-hard problem, for any ε > 0 we can approximate it using the FPTAS of [10], which computes a path P st with l(p st ) L and c(p st ) (1 + ε)c(s, t). Now, construct an auxiliary complete graph on S with the costs of every edge st being c(p st ). As all terminals 15

16 belong to the solution, by the so called Pairing Lemma (see [12]) there exists a matching on the centers of cost at most (1 + ε)c, with at most one cluster center unmatched. Compute this perfect matching. Replace every edge st in the matching by the corresponding path P st in G and merge the corresponding two clusters together, making its center to be one of s, t. At every iteration, the cost invested is at most (1 + ε)c, the radius of each cluster is increased by at most L, and the number of clusters is roughly halved. The later implies that the number of iterations is O(log n), and the (O(log n), O(log n)) bicriteria approximation follows. In our case of node-costs we use the decomposition of the optimum tree T into disjoint spiders. W.l.o.g., via standard reductions (see [11]), we assume that the terminals are the leaves of T. Definition 4.1 A tree T is a spider if it has at most one node of degree 3. A spider decomposition D of a tree T rooted at r is a collection of node-disjoint spiders, so that each of them is a rooted subtree of T, and the sets of leaves of the spiders in D partition the set of leaves of T. Lemma 4.1 ([11]) Any tree T rooted at r admits a spider decomposition so that every spider has at least two leaves, or in the decomposition there is exactly one spider with one leaf and root r. The problem of finding the cheapest spider decomposition of a graph is at least as hard as the set-cover problem. Instead, we approximate the cost of the best spider decomposition and at the same time control the length invoked. Lemma 4.2 For any ε > 0 there exists a polynomial algorithm that computes a collection of rooted trees of total cost O(log n) opt containing all terminals, so that each tree has l-radius at most (1 + ε)l, and so that every tree, except of maybe one, contains at least two terminals. Proof: While there are at least two terminals not belonging to any tree, iteratively find a tree F with at least 2 terminals of radius (1 + ε)l whose cost-density, (which is its cost over the number of terminals in it) is at most (1+ε) times the one of the best spider decomposition of any optimum solution. We stress that the density in question is only with respect to non-covered terminals (only terminals not covered by previous spiders are considered). Then we remove the covered terminals, and iterate. Finding a tree of low density is done as follows. Guess the root v and the number q of terminals. For every terminal t approximate using [10], the min-cost of a v to t path of length at most L. The candidate tree for v and q is the union of the q paths from v to its best q terminals. Compute the density of the candidate tree for v, q. Then among the trees computed return one with the minimum density. The paths of the tree may intersect but since we are comparing against a spider, whose paths are node disjoint (except for the root), the resulting tree has cost density no larger than 1 + ε times the density of the best spider. An analysis similar to the classical set-cover analysis shows that the total cost of the resulting decomposition is O(log n) times the cost of the minimum cost spider decomposition which is O(log n) opt. 16

17 The other parts of the algorithm are similar to the algorithm of [12] for the edge cost case. Maintain a disjoint partition of the terminals into pairwise disjoint clusters; each cluster has a unique center. Initialize every terminal as a cluster of size 1. Then iterate as follows. Let S be the set of cluster centers. Given ε > 0, compute a family of trees as in Lemma 4.2, considering only the set S of centers as terminals, and for every spider, merge the clusters of the centers it contains; the center of the new cluster is set to be one of these centers. At every iteration, the cost invested is at most (1+ε)C O(logn), the radius of each cluster is increased by at most L, and the number of clusters is roughly halved. The later implies that the number of iterations is O(log n), and the (O(log 2 n), O(logn)) bicriteria approximation follows. References [1] M. Andrews. Hardness of buy-at-bulk network design. In Proc. FOCS, pages , [2] M. Andrews and L. Zhang. Approximation algorithms for access network design. Algorithmica, 34(2): , [3] M. Charikar and A. Karagiozova. On non-uniform multicommodity buy-at-bulk network design. In Proc. STOC, pages , [4] C. Chekuri, M. T. Hajiaghayi, G. Kortsarz, and M. R. Salavatipour. Approximation algorithms for non-uniform buy-at-bulk network design. In Proc FOCS, pages , [5] C. Chekuri, M. T. Hajiaghayi, G. Kortsarz, and M. R. Salavatipour. Approximation algorithms for node-weighted buy-at-bulk network design. In SODA, pages , [6] U. Feige. A threshold of for approximating set cover. J. ACM, 45: , [7] M. Feldman, G. Kortsarz, and Z. Nutov. Improved approximating algorithms for directed steiner forest. In SODA, pages , [8] S. Guha, A. Moss, J. S. Naor, and B. Schieber. Efficient recovery from power outage. In Proc. STOC, pages , [9] M. T. Hajiaghayi, G. Kortsarz, and M. R. Salavatipour. Approximating buy-at-bulk k- Steiner tree. In Proc APPROX, pages , [10] R. Hassin. Approximation schemes for the restricted shortest path problem. Math. Oper. Res., 17(1):36 42,

18 [11] C. Klein and R. Ravi. A nearly best-possible approximation algorithm for node-weighted steiner trees. Journal of Algorithms, 19(1): , [12] M. V. Marathe, R. Ravi, R. Sundaram, S. S. Ravi, D. J. Rosenkrantz, and H. B. Hunt, III. Bicriteria network design problems. J. Algorithms, 28(1): , [13] A. Moss and Y. Rabani. Approximation algorithms for constrained node weighted Steiner tree problems. In Proc. STOC, pages , [14] R. Motwani and P. Raghavan. Randomized Algorithms. CRC Press, [15] R. Raz and S. Safra. A sub-constant error-probability low-degree test, and a sub-constant error-probability PCP characterization of NP. In Proc. STOC, pages , [16] F. S. Salman, J. Cheriyan, R. Ravi, and S. Subramanian. Approximating the single-sink link-installation problem in network design. SIAM J. on Optimization, 11(3): ,

Approximating Minimum-Power Degree and Connectivity Problems

Approximating Minimum-Power Degree and Connectivity Problems Approximating Minimum-Power Degree and Connectivity Problems Guy Kortsarz Vahab S. Mirrokni Zeev Nutov Elena Tsanko Abstract Power optimization is a central issue in wireless network design. Given a graph

More information

Improved Approximating Algorithms for Directed Steiner Forest

Improved Approximating Algorithms for Directed Steiner Forest Improved Approximating Algorithms for Directed Steiner Forest Moran Feldman Guy Kortsarz Zeev Nutov Abstract We consider the k-directed Steiner Forest (k-dsf) problem: Given a directed graph G = (V, E)

More information

On Fixed Cost k-flow Problems

On Fixed Cost k-flow Problems On Fixed Cost k-flow Problems MohammadTaghi Hajiaghayi 1, Rohit Khandekar 2, Guy Kortsarz 3, and Zeev Nutov 4 1 University of Maryland, College Park, MD. hajiagha@cs.umd.edu. 2 Knight Capital Group, Jersey

More information

Project Summary. Approximating Network Design Problems on Directed and Undirected Graphs

Project Summary. Approximating Network Design Problems on Directed and Undirected Graphs Project Summary Approximating Network Design Problems on Directed and Undirected Graphs Network design on directed graphs are problems that require to select a minimum cost directed subgraph of a given

More information

Approximating minimum cost connectivity problems

Approximating minimum cost connectivity problems Approximating minimum cost connectivity problems Guy Kortsarz Zeev Nutov Rutgers University, Camden The Open University of Israel guyk@camden.rutgers.edu nutov@openu.ac.il 1 Introduction We survey approximation

More information

Steiner Forest Orientation Problems

Steiner Forest Orientation Problems Steiner Forest Orientation Problems Marek Cygan Guy Kortsarz Zeev Nutov November 20, 2011 Abstract We consider connectivity problems with orientation constraints. Given a directed graph D and a collection

More information

Steiner Forest Orientation Problems

Steiner Forest Orientation Problems Steiner Forest Orientation Problems Marek Cygan Guy Kortsarz Zeev Nutov November 23, 2011 Abstract We consider connectivity problems with orientation constraints. Given a directed graph D and a collection

More information

A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2

A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2 A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2 Guy Even Jon Feldman Guy Kortsarz Zeev Nutov October 20, 2008 Abstract We present a 1.8-approximation algorithm for

More information

On the Fixed Cost k-flow Problem and related problems

On the Fixed Cost k-flow Problem and related problems On the Fixed Cost k-flow Problem and related problems MohammadTaghi Hajiaghayi 1, Rohit Khandekar 2, Guy Kortsarz 3, and Zeev Nutov 4 1 University of Maryland, College Park, MD. hajiagha@cs.umd.edu. 2

More information

Approximation algorithms for cycle packing problems

Approximation algorithms for cycle packing problems Approximation algorithms for cycle packing problems Michael Krivelevich Zeev Nutov Raphael Yuster Abstract The cycle packing number ν c (G) of a graph G is the maximum number of pairwise edgedisjoint cycles

More information

An Improved Approximation Algorithm for Requirement Cut

An Improved Approximation Algorithm for Requirement Cut An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an

More information

Approximating connectivity augmentation problems

Approximating connectivity augmentation problems Approximating connectivity augmentation problems Zeev Nutov The Open University of Israel Let G = (V, E) be an undirected graph and let S V. The S-connectivity λ S G (u, v) of a node pair (u, v) in G is

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

Approximating Minimum-Power Edge-Covers and 2, 3-Connectivity

Approximating Minimum-Power Edge-Covers and 2, 3-Connectivity Approximating Minimum-Power Edge-Covers and 2, 3-Connectivity Guy Kortsarz Rutgers University, Camden guyk@camden.rutgers.edu Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract Given a

More information

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover duality 1 Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover Guy Kortsarz duality 2 The set cover problem with uniform costs Input: A universe U and a collection of subsets

More information

Capacitated Network Design Problems: Hardness, Approximation Algorithms, and Connections to Group Steiner Tree

Capacitated Network Design Problems: Hardness, Approximation Algorithms, and Connections to Group Steiner Tree Capacitated Network Design Problems: Hardness, Approximation Algorithms, and Connections to Group Steiner Tree MohammadTaghi Hajiaghayi 1, Rohit Khandekar 2, GuyKortsarz 3, and Zeev Nutov 4 1 University

More information

Approximating connectivity augmentation problems

Approximating connectivity augmentation problems Approximating connectivity augmentation problems Zeev Nutov Department of Computer Science The Open University of Israel nutov@openu.ac.il. Abstract Let G = (V, E) be an undirected graph and let S V. The

More information

Hardness of Embedding Metric Spaces of Equal Size

Hardness of Embedding Metric Spaces of Equal Size Hardness of Embedding Metric Spaces of Equal Size Subhash Khot and Rishi Saket Georgia Institute of Technology {khot,saket}@cc.gatech.edu Abstract. We study the problem embedding an n-point metric space

More information

A 1.8 Approximation Algorithm for Augmenting Edge-Connectivity of a Graph from 1 to 2

A 1.8 Approximation Algorithm for Augmenting Edge-Connectivity of a Graph from 1 to 2 A 1.8 Approximation Algorithm for Augmenting Edge-Connectivity of a Graph from 1 to 2 GUY EVEN Tel-Aviv University JON FELDMAN Google, NY GUY KORTSARZ Rutgers University, Camden and ZEEV NUTOV The Open

More information

A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2

A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2 A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2 Guy Even Jon Feldman Guy Kortsarz Zeev Nutov May 31, 2008 Abstract We present a 1.8-approximation algorithm for the

More information

Approximating maximum satisfiable subsystems of linear equations of bounded width

Approximating maximum satisfiable subsystems of linear equations of bounded width Approximating maximum satisfiable subsystems of linear equations of bounded width Zeev Nutov The Open University of Israel Daniel Reichman The Open University of Israel Abstract We consider the problem

More information

LP-relaxations for Tree Augmentation

LP-relaxations for Tree Augmentation LP-relaxations for Tree Augmentation Guy Kortsarz 1 and Zeev Nutov 2 1 Rutgers University Camden, NJ. guyk@camden.rutgers.edu 2 The Open University of Israel. nutov@openu.ac.il Abstract. In the Tree Augmentation

More information

Lecture 15 (Oct 6): LP Duality

Lecture 15 (Oct 6): LP Duality CMPUT 675: Approximation Algorithms Fall 2014 Lecturer: Zachary Friggstad Lecture 15 (Oct 6): LP Duality Scribe: Zachary Friggstad 15.1 Introduction by Example Given a linear program and a feasible solution

More information

Approximability of Packing Disjoint Cycles

Approximability of Packing Disjoint Cycles Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca

More information

FPT hardness for Clique and Set Cover with super exponential time in k

FPT hardness for Clique and Set Cover with super exponential time in k FPT hardness for Clique and Set Cover with super exponential time in k Mohammad T. Hajiaghayi Rohit Khandekar Guy Kortsarz Abstract We give FPT-hardness for setcover and clique with super exponential time

More information

Partitioning Metric Spaces

Partitioning Metric Spaces Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals

More information

arxiv: v3 [cs.ds] 10 Apr 2013

arxiv: v3 [cs.ds] 10 Apr 2013 An LMP O(log n)-approximation Algorithm for Node Weighted Prize Collecting Steiner Tree Jochen Könemann, Sina Sadeghian, Laura Sanità. arxiv:1302.2127v3 [cs.ds] 10 Apr 2013 Abstract In the node-weighted

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization 2017-2018 1 Maximum matching on bipartite graphs Given a graph G = (V, E), find a maximum cardinal matching. 1.1 Direct algorithms Theorem 1.1 (Petersen, 1891) A matching M is

More information

Approximation Algorithms and Hardness of Integral Concurrent Flow

Approximation Algorithms and Hardness of Integral Concurrent Flow Approximation Algorithms and Hardness of Integral Concurrent Flow Parinya Chalermsook Julia Chuzhoy Alina Ene Shi Li May 16, 2012 Abstract We study an integral counterpart of the classical Maximum Concurrent

More information

The Steiner k-cut Problem

The Steiner k-cut Problem The Steiner k-cut Problem Chandra Chekuri Sudipto Guha Joseph (Seffi) Naor September 23, 2005 Abstract We consider the Steiner k-cut problem which generalizes both the k-cut problem and the multiway cut

More information

New algorithms for Disjoint Paths and Routing Problems

New algorithms for Disjoint Paths and Routing Problems New algorithms for Disjoint Paths and Routing Problems Chandra Chekuri Dept. of Computer Science Univ. of Illinois (UIUC) Menger s Theorem Theorem: The maximum number of s-t edgedisjoint paths in a graph

More information

Monotone Submodular Maximization over a Matroid

Monotone Submodular Maximization over a Matroid Monotone Submodular Maximization over a Matroid Yuval Filmus January 31, 2013 Abstract In this talk, we survey some recent results on monotone submodular maximization over a matroid. The survey does not

More information

Iterative rounding approximation algorithms for degree-bounded node-connectivity network design

Iterative rounding approximation algorithms for degree-bounded node-connectivity network design Iterative rounding approximation algorithms for degree-bounded node-connectivity network design Takuro Fukunaga Graduate School of Informatics, Kyoto University, Japan Email: takuro@amp.i.kyoto-u.ac.jp

More information

Increasing the Span of Stars

Increasing the Span of Stars Increasing the Span of Stars Ning Chen Roee Engelberg C. Thach Nguyen Prasad Raghavendra Atri Rudra Gynanit Singh Department of Computer Science and Engineering, University of Washington, Seattle, WA.

More information

Lecture 11 October 7, 2013

Lecture 11 October 7, 2013 CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover

More information

From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem

From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem Jochen Könemann 1, Stefano Leonardi 2, Guido Schäfer 2, and Stefan van Zwam 3 1 Department of Combinatorics

More information

arxiv: v1 [cs.ds] 20 Nov 2016

arxiv: v1 [cs.ds] 20 Nov 2016 Algorithmic and Hardness Results for the Hub Labeling Problem Haris Angelidakis 1, Yury Makarychev 1 and Vsevolod Oparin 2 1 Toyota Technological Institute at Chicago 2 Saint Petersburg Academic University

More information

Disjoint Bases in a Polymatroid

Disjoint Bases in a Polymatroid Disjoint Bases in a Polymatroid Gruia Călinescu Chandra Chekuri Jan Vondrák May 26, 2008 Abstract Let f : 2 N Z + be a polymatroid (an integer-valued non-decreasing submodular set function with f( ) =

More information

On the Complexity of Budgeted Maximum Path Coverage on Trees

On the Complexity of Budgeted Maximum Path Coverage on Trees On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of

More information

An Improved Approximation Algorithm for Virtual Private Network Design

An Improved Approximation Algorithm for Virtual Private Network Design An Improved Approximation Algorithm for Virtual Private Network Design Friedrich Eisenbrand Fabrizio Grandoni Abstract Virtual private network design deals with the reservation of capacities in a network,

More information

Order of Authors: Guy Kortsarz, Ph. D.; Guy Kortsarz, Ph. D.; Vahab Mirrokni, Ph. D.; Zeev Nutov, Ph. D.; Elena Tsanko, M. Sc.

Order of Authors: Guy Kortsarz, Ph. D.; Guy Kortsarz, Ph. D.; Vahab Mirrokni, Ph. D.; Zeev Nutov, Ph. D.; Elena Tsanko, M. Sc. Editorial Manager(tm) for Algorithmica Manuscript Draft Manuscript Number: ALGO Title: Approximating Minimum-Power Degree and Connectivity Problems Article Type: Original Research Keywords: Power; Graphs;

More information

1 Primals and Duals: Zero Sum Games

1 Primals and Duals: Zero Sum Games CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown

More information

Label Cover Algorithms via the Log-Density Threshold

Label Cover Algorithms via the Log-Density Threshold Label Cover Algorithms via the Log-Density Threshold Jimmy Wu jimmyjwu@stanford.edu June 13, 2017 1 Introduction Since the discovery of the PCP Theorem and its implications for approximation algorithms,

More information

Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007

Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 So far in this course, we have been proving upper bounds on the approximation factors

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should

More information

Distributed primal-dual approximation algorithms for network design problems

Distributed primal-dual approximation algorithms for network design problems Distributed primal-dual approximation algorithms for network design problems Zeev Nutov The Open University of Israel nutov@openu.ac.il Amir Sadeh The Open University of Israel amirsadeh@yahoo.com Abstract

More information

3.4 Relaxations and bounds

3.4 Relaxations and bounds 3.4 Relaxations and bounds Consider a generic Discrete Optimization problem z = min{c(x) : x X} with an optimal solution x X. In general, the algorithms generate not only a decreasing sequence of upper

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information

Efficient Approximation for Restricted Biclique Cover Problems

Efficient Approximation for Restricted Biclique Cover Problems algorithms Article Efficient Approximation for Restricted Biclique Cover Problems Alessandro Epasto 1, *, and Eli Upfal 2 ID 1 Google Research, New York, NY 10011, USA 2 Department of Computer Science,

More information

Transactions on Algorithms. Two-stage Robust Network Design with Exponential Scenarios

Transactions on Algorithms. Two-stage Robust Network Design with Exponential Scenarios Transactions on Algorithms Two-stage Robust Networ Design with Exponential Scenarios Journal: Transactions on Algorithms Manuscript ID: draft Manuscript Type: Original Article Date Submitted by the Author:

More information

Hardness of Directed Routing with Congestion

Hardness of Directed Routing with Congestion Hardness of Directed Routing with Congestion Julia Chuzhoy Sanjeev Khanna August 28, 2006 Abstract Given a graph G and a collection of source-sink pairs in G, what is the least integer c such that each

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we

More information

More on NP and Reductions

More on NP and Reductions Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 127, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM 501 Advanced Data

More information

Machine Minimization for Scheduling Jobs with Interval Constraints

Machine Minimization for Scheduling Jobs with Interval Constraints Machine Minimization for Scheduling Jobs with Interval Constraints Julia Chuzhoy Sudipto Guha Sanjeev Khanna Joseph (Seffi) Naor Abstract The problem of scheduling jobs with interval constraints is a well-studied

More information

The Polymatroid Steiner Problems

The Polymatroid Steiner Problems The Polymatroid Steiner Problems G. Calinescu 1 and A. Zelikovsky 2 1 Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616. E-mail: calinesc@iit.edu. 2 Department of Computer

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

A better approximation ratio for the Vertex Cover problem

A better approximation ratio for the Vertex Cover problem A better approximation ratio for the Vertex Cover problem George Karakostas Dept. of Computing and Software McMaster University October 5, 004 Abstract We reduce the approximation factor for Vertex Cover

More information

Capacitated Network Design on Undirected Graphs

Capacitated Network Design on Undirected Graphs Capacitated Network Design on Undirected Graphs Deeparnab Chakrabarty, Ravishankar Krishnaswamy, Shi Li, and Srivatsan Narayanan Abstract. In this paper, we study the approximability of the capacitated

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem

An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem Zeev Nutov, László A. Végh January 12, 2016 We study the tree augmentation problem: Tree Augmentation Problem (TAP) Instance:

More information

Lecture 21 November 11, 2014

Lecture 21 November 11, 2014 CS 224: Advanced Algorithms Fall 2-14 Prof. Jelani Nelson Lecture 21 November 11, 2014 Scribe: Nithin Tumma 1 Overview In the previous lecture we finished covering the multiplicative weights method and

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

Network Design and Game Theory Spring 2008 Lecture 6

Network Design and Game Theory Spring 2008 Lecture 6 Network Design and Game Theory Spring 2008 Lecture 6 Guest Lecturer: Aaron Archer Instructor: Mohammad T. Hajiaghayi Scribe: Fengming Wang March 3, 2008 1 Overview We study the Primal-dual, Lagrangian

More information

On Lagrangian Relaxation and Subset Selection Problems

On Lagrangian Relaxation and Subset Selection Problems On agrangian Relaxation and Subset Selection Problems (Extended Abstract) Ariel Kulik Hadas Shachnai Abstract We prove a general result demonstrating the power of agrangian relaxation in solving constrained

More information

Dominating Set. Chapter 7

Dominating Set. Chapter 7 Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Prize-collecting Survivable Network Design in Node-weighted Graphs. Chandra Chekuri Alina Ene Ali Vakilian

Prize-collecting Survivable Network Design in Node-weighted Graphs. Chandra Chekuri Alina Ene Ali Vakilian Prize-collecting Survivable Network Design in Node-weighted Graphs Chandra Chekuri Alina Ene Ali Vakilian Survivable Network Design (SNDP) Collection of l pairs: s 1, t 1,, (s l, t l ) r(s i, t i ): requirement

More information

Multi-criteria approximation schemes for the resource constrained shortest path problem

Multi-criteria approximation schemes for the resource constrained shortest path problem Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract

More information

The min cost flow problem Course notes for Search and Optimization Spring 2004

The min cost flow problem Course notes for Search and Optimization Spring 2004 The min cost flow problem Course notes for Search and Optimization Spring 2004 Peter Bro Miltersen February 20, 2004 Version 1.3 1 Definition of the min cost flow problem We shall consider a generalization

More information

The min cost flow problem Course notes for Optimization Spring 2007

The min cost flow problem Course notes for Optimization Spring 2007 The min cost flow problem Course notes for Optimization Spring 2007 Peter Bro Miltersen February 7, 2007 Version 3.0 1 Definition of the min cost flow problem We shall consider a generalization of the

More information

The Generalized Regenerator Location Problem

The Generalized Regenerator Location Problem The Generalized Regenerator Location Problem Si Chen Ivana Ljubić S. Raghavan College of Business and Public Affairs, Murray State University Murray, KY 42071, USA Faculty of Business, Economics, and Statistics,

More information

Approximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs

Approximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs Approximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs Haim Kaplan Tel-Aviv University, Israel haimk@post.tau.ac.il Nira Shafrir Tel-Aviv University, Israel shafrirn@post.tau.ac.il

More information

New Hardness Results for Undirected Edge Disjoint Paths

New Hardness Results for Undirected Edge Disjoint Paths New Hardness Results for Undirected Edge Disjoint Paths Julia Chuzhoy Sanjeev Khanna July 2005 Abstract In the edge-disjoint paths (EDP) problem, we are given a graph G and a set of source-sink pairs in

More information

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 Lecture 20: LP Relaxation and Approximation Algorithms Lecturer: Yuan Zhou Scribe: Syed Mahbub Hafiz 1 Introduction When variables of constraints of an

More information

An approximation algorithm for the minimum latency set cover problem

An approximation algorithm for the minimum latency set cover problem An approximation algorithm for the minimum latency set cover problem Refael Hassin 1 and Asaf Levin 2 1 Department of Statistics and Operations Research, Tel-Aviv University, Tel-Aviv, Israel. hassin@post.tau.ac.il

More information

5 Flows and cuts in digraphs

5 Flows and cuts in digraphs 5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices

More information

P,NP, NP-Hard and NP-Complete

P,NP, NP-Hard and NP-Complete P,NP, NP-Hard and NP-Complete We can categorize the problem space into two parts Solvable Problems Unsolvable problems 7/11/2011 1 Halting Problem Given a description of a program and a finite input, decide

More information

4. Duality Duality 4.1 Duality of LPs and the duality theorem. min c T x x R n, c R n. s.t. ai Tx = b i i M a i R n

4. Duality Duality 4.1 Duality of LPs and the duality theorem. min c T x x R n, c R n. s.t. ai Tx = b i i M a i R n 2 4. Duality of LPs and the duality theorem... 22 4.2 Complementary slackness... 23 4.3 The shortest path problem and its dual... 24 4.4 Farkas' Lemma... 25 4.5 Dual information in the tableau... 26 4.6

More information

CO759: Algorithmic Game Theory Spring 2015

CO759: Algorithmic Game Theory Spring 2015 CO759: Algorithmic Game Theory Spring 2015 Instructor: Chaitanya Swamy Assignment 1 Due: By Jun 25, 2015 You may use anything proved in class directly. I will maintain a FAQ about the assignment on the

More information

The 2-valued case of makespan minimization with assignment constraints

The 2-valued case of makespan minimization with assignment constraints The 2-valued case of maespan minimization with assignment constraints Stavros G. Kolliopoulos Yannis Moysoglou Abstract We consider the following special case of minimizing maespan. A set of jobs J and

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

The maximum edge-disjoint paths problem in complete graphs

The maximum edge-disjoint paths problem in complete graphs Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY Approximation Algorithms Seminar 1 Set Cover, Steiner Tree and TSP Siert Wieringa siert.wieringa@tkk.fi Approximation Algorithms Seminar 1 1/27 Contents Approximation algorithms for: Set Cover Steiner

More information

Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem

Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem Applied Mathematics Volume 2012 Article ID 394721 8 pages doi:10.1155/2012/394721 Research Article Polynomial Time Approximation Schemes for the Constrained Minimum Spanning Tree Problem Yen Hung Chen

More information

Linear Programming. Scheduling problems

Linear Programming. Scheduling problems Linear Programming Scheduling problems Linear programming (LP) ( )., 1, for 0 min 1 1 1 1 1 11 1 1 n i x b x a x a b x a x a x c x c x z i m n mn m n n n n! = + + + + + + = Extreme points x ={x 1,,x n

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees

Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern

More information

APPROXIMATION ALGORITHMS RESOLUTION OF SELECTED PROBLEMS 1

APPROXIMATION ALGORITHMS RESOLUTION OF SELECTED PROBLEMS 1 UNIVERSIDAD DE LA REPUBLICA ORIENTAL DEL URUGUAY IMERL, FACULTAD DE INGENIERIA LABORATORIO DE PROBABILIDAD Y ESTADISTICA APPROXIMATION ALGORITHMS RESOLUTION OF SELECTED PROBLEMS 1 STUDENT: PABLO ROMERO

More information

On Allocating Goods to Maximize Fairness

On Allocating Goods to Maximize Fairness On Allocating Goods to Maximize Fairness Deeparnab Chakrabarty Julia Chuzhoy Sanjeev Khanna September 23, 2009 Abstract We consider the Max-Min Allocation problem: given a set A of m agents and a set I

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

arxiv: v1 [cs.ds] 29 Aug 2015

arxiv: v1 [cs.ds] 29 Aug 2015 APPROXIMATING (UNWEIGHTED) TREE AUGMENTATION VIA LIFT-AND-PROJECT, PART I: STEMLESS TAP JOSEPH CHERIYAN AND ZHIHAN GAO arxiv:1508.07504v1 [cs.ds] 9 Aug 015 Abstract. In Part I, we study a special case

More information

Lectures 6, 7 and part of 8

Lectures 6, 7 and part of 8 Lectures 6, 7 and part of 8 Uriel Feige April 26, May 3, May 10, 2015 1 Linear programming duality 1.1 The diet problem revisited Recall the diet problem from Lecture 1. There are n foods, m nutrients,

More information

Approximating Graph Spanners

Approximating Graph Spanners Approximating Graph Spanners Michael Dinitz Johns Hopkins University Joint work with combinations of Robert Krauthgamer (Weizmann), Eden Chlamtáč (Ben Gurion), Ran Raz (Weizmann), Guy Kortsarz (Rutgers-Camden)

More information

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

On Column-restricted and Priority Covering Integer Programs

On Column-restricted and Priority Covering Integer Programs On Column-restricted and Priority Covering Integer Programs Deeparnab Chakrabarty Elyot Grant Jochen Könemann November 24, 2009 Abstract In a 0,1-covering integer program (CIP), the goal is to pick a minimum

More information

Exact and Approximate Equilibria for Optimal Group Network Formation

Exact and Approximate Equilibria for Optimal Group Network Formation Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.

More information