arxiv: v2 [cs.ds] 27 Aug 2016

Size: px
Start display at page:

Download "arxiv: v2 [cs.ds] 27 Aug 2016"

Transcription

1 ariv: v2 [cs.ds] 27 Aug 2016 Recoverable robust spanning tree problem under interval uncertainty representations Mikita Hradovich, Adam Kasperski, Pawe l Zieliński Faculty of Fundamental Problems of Technology, Wroc law University of Technology, Wroc law, Poland Faculty of Computer Science and Management, Wroc law University of Technology, Wroc law, Poland {mikita.hradovich,adam.kasperski,pawel.zielinski}@pwr.edu.pl Abstract This paper deals with the recoverable robust spanning tree problem under interval uncertainty representations. A strongly polynomial time, combinatorial algorithm for the recoverable spanning tree problem is first constructed. This problem generalizes the incremental spanning tree problem, previously discussed in literature. The algorithm built is then applied to solve the recoverable robust spanning tree problem, under the traditional interval uncertainty representation, in polynomial time. Moreover, the algorithm allows to obtain several approximation results for the recoverable robust spanning tree problem under the Bertsimas and Sim interval uncertainty representation and the interval uncertainty representation with a budget constraint. Keywords: robust optimization; interval data; recovery; spanning tree 1 Introduction Let G = (V,E), V = n, E = m, be an undirected graph and let Φ be the set of all spanning trees of G. In the minimum spanning tree problem, a cost is specified for each edge, and we seek a spanning tree in G of the minimum total cost. This problem is well known and can be solved efficiently by using several polynomial time algorithms (see, e.g., [1, 18]). In this paper, we first study the recoverable spanning tree problem (Rec ST for short). Namely, for each edge e E, we are given a first stage cost C e and a second stage cost c e (recovery stage cost). Given a spanning tree Φ, let Φ k be the set of all spanning trees Φ such that \ k (the recovery set), where k is a fixed integer in [0,n 1], called the recovery parameter. Note that Φ k can be seen as a neighborhood of containing all spanning trees which can be obtained from by exchanging up to k edges. The Rec ST problem can be stated formally as follows: Rec ST : min Φ ( e C e + min Φ k ) c e. (1) e We thus seek a first stage spanning tree Φ and a second stage spanning tree Φ k, so that the total cost of and for C e and c e, respectively, is minimum. Notice that Rec ST 1

2 generalizes the following incremental spanning tree problem, investigated in [8]: Inc ST : min Φ k c e, (2) where Φ is a given spanning tree. So, we wish to find an improved spanning tree with the minimum cost, within a neighborhood of determined by Φ k. Several interesting practical applications of the incremental network optimization were presented in [8]. It is worth pointing out that Inc ST can be seen as the Rec ST problem with a fixed first stage spanning tree, whereas in Rec ST both the first and the second stage trees are unknown. It has been shown in [8] that Inc ST can be solved in strongly polynomial time by applying the Lagrangian relaxation technique. On the other hand, no strongly polynomial time combinatorial algorithm for Rec ST has been known to date. Thus proposing such an algorithm for this problem is one of the main results of this paper. The Rec ST problem, beside being an interesting problem per se, has an important connection with a more general problem. Namely, it is an inner problem in the recoverable robust model with uncertain recovery costs, discussed in [4, 5, 6, 7, 15, 17]. Indeed, the recoverable spanning tree problem can be generalized by considering its robust version. Suppose that the second stage costs c e, e E, are uncertain and let U contain all possible realizations of the second stage costs, called scenarios. We will denote by c S e the second stage cost of edge e E under scenario S U, where S = (c S e) e E is a cost vector. In the recoverable robust spanning tree problem (Rob Rec ST for short), we choose an initial spanning tree in the first stage, with the cost equal to e C e. Then, after scenario S U reveals, can be modified by exchanging at most k edges, obtaining a new spanning tree Φ k. The second stage cost of under scenario S U is equal to e cs e. Our goal is to find a pair of trees and such that \ k, which minimizes the sum of the first and the second stage costs e C e + e cs e in the worst case. The Rob Rec ST problem is defined formally as follows: ( ) Rob Rec ST : min C e +max min c S Φ S U Φ k e. (3) e If C e = 0 for each e E and k = 0, then Rob Rec ST is equivalent to the following min-max spanning tree problem, examined in [2, 13, 12], in which we seek a spanning tree that minimizes the largest cost over all scenarios: Min-Max ST : min max c S e. (4) Φ S U If C e = 0 for each e E and k = n 1, then Rob Rec ST becomes the following adversarial problem [17] in which an adversary wants to find a scenario which leads to the greatest increase in the cost of the minimum spanning tree: Adv ST : max min c S e. (5) S U Φ We now briefly recall the known complexity results on Rob Rec ST. It turns out that its computational complexity highly relies on the way of defining the scenario set U. There are two popular methods of representing U, namely the discrete and interval uncertainty representations. For the discrete uncertainty representation (see, e.g., [13]), scenario set, e e e e 2

3 denoted by U D, contains K explicitly listed scenarios, i.e. U D = {S 1,S 2,...,S K }. In this case, the Rob Rec ST problem is known to be NP-hard for K = 2 and any constant k [11]. Furthermore, it becomes strongly NP-hard and not at all approximable when both K and k are a part of the input [11]. It is worthwhile to mention that Min-Max ST is NP hard even when K = 2 and becomes strongly NP-hard and not approximable within O(log 1 ǫ n) for any ǫ > 0 unless NP DTIME(n polylogn ), when K is a part of input [13, 12]. It admits an FPTAS, when K is a constant [2] and is approximable within O(log 2 n), when K is a part of the input [12]. The Adv ST problem, under scenario set U D, is polynomially solvable, since it boils down to solving K traditional minimum spanning tree problems. For the interval uncertainty representation, which is considered in this paper, one assumes that the second stage cost of each edge e E is known to belong to the closed interval [c e,c e +d e ], where c e is a nominal cost of e E and d e 0 is the maximum deviation of the cost of e from its nominal value. In the traditional case U, denoted by U I, is the Cartesian product of all these intervals [13], i.e. U I = {S = (c S e) e E : c S e [c e,c e +d e ],e E}. (6) In [4] a polynomial algorithm for the recoverable robust matroid basis problem under scenario set U I was constructed, provided that the recovery parameter k is constant. In consequence, Rob Rec ST under U I is also polynomially solvable for constant k. Unfortunately, the algorithm proposed in [4] is exponential in k. Interestingly, the corresponding recoverable robust version of the shortest path problem (Φ is replaced with the set of all s t paths in G) has been proven to be strongly NP-hard and not at all approximable even if k = 2 [5]. It has been recently shown in [10] that Rob Rec ST under U I is polynomially solvable when k is a part of the input. In order to prove this result, a technique called the iterative relaxation of a linear programming formulation, whose framework was described in [14], has been applied This technique, however, does not imply directly a strongly polynomial algorithm for Rob Rec ST, since it requires the solution of a linear program. In [3] apopularand commonly used modification of thescenario set U I hasbeen proposed. The new scenario set, denoted as U1 I(Γ), is a subset of UI such that under each scenario in U1 I(Γ), the costs of at most Γ edges are greater than their nominal values c e, where Γ is assumed to be a fixed integer in [0,m]. Scenario set U1 I (Γ) is formally defined as follows: U I 1 (Γ) = {S = (cs e ) e E : c S e [c e,c e +δ e d e ],δ e {0,1},e E, e Eδ e Γ}. (7) The parameter Γ allows us to model the degree of uncertainty. When Γ = 0, then we get Rec ST (Rob Rec ST with one scenario S = (c e ) e E ). On the other hand, when Γ = m, then we get Rob Rec ST under the traditional interval uncertainty U I. It turns out that the Adv ST problem under U1 I (Γ) is strongly NP-hard (it is equivalent to the problem of finding Γ most vital edges) [17, 16, 9]. Consequently, the more general Rob Rec ST problem is also strongly NP-hard. Interestingly, the corresponding Min-Max ST problem with U1 I(Γ) is polynomially solvable [3]. et another interesting way of defining scenario set, which allows us to control the amount of uncertainty, is called the scenario set with a budget constraint (see, e.g,. [17]). This scenario set, denoted as U2 I (Γ), is defined as follows: U I 2 (Γ) = {S = (cs e ) e E : c S e = c e +δ e,δ e [0,d e ],e E, e Eδ e Γ}, (8) 3

4 whereγ 0isaafixedparameterthat canbeseenasabudgetofanadversary, andrepresents the maximum total increase of the edge costs from their nominal values. Obviously, if Γ is sufficientlylarge, thenu2 I(Γ)reducestothetraditionalinterval uncertaintyrepresentation UI. Thecomputational complexity of Rob Rec STforscenarioset U2 I isstill open. Weonly know that its special cases, namely Min-Max ST and Adv ST, are polynomially solvable [17]. In this paper we will construct a combinatorial algorithm for Rec ST with strongly polynomial running time. We will apply this algorithm for solving Rob Rec ST under scenario set U I in strongly polynomial time. Moreover, we will show how the algorithm for Rec ST can beused to obtain several approximation results for Rob Rec ST, underscenario sets U1 I(Γ) and UI 2 (Γ). This paper is organized as follows. Section 2 contains the main result of this paper a combinatorial algorithm for Rec ST with strongly polynomial running time. Section 3 discusses Rob Rec ST under the interval uncertainty representations U I, U1 I(Γ), and U2 I(Γ). 2 The recoverable spanning tree problem In this section we construct a combinatorial algorithm for Rec ST with strongly polynomial running time. Since = n 1 for each Φ, Rec ST (see (1)) is equivalent to the following mathematical programming problem: min C e + e e s.t. L,, Φ, c e (9) where L = n 1 k. Problem (9) can be expressed as the following MIP model: Opt = min C e x e + e y e (10) e E e Ec s.t. x e = n 1, (11) e E e E(U) x e U 1, U V, (12) y e = n 1, (13) e E e E(U) y e U 1, U V, (14) x e z e 0, e E, (15) y e z e 0, e E, (16) z e L, (17) e E x e,y e,z e 0, integer e E, (18) where E(U) stands for the set of edges that have both endpoints in U V. We first apply the Lagrangian relaxation (see, e.g., [1]) to (10)-(18) by relaxing the cardinality constraint (17) 4

5 with a nonnegative multiplier θ. We also relax the integrality constraints (18). We thus get the following linear program (with the corresponding dual variables which will be used later): φ(θ) = min C e x e + c e y e θ e +θl (19) e E e E e Ez s.t. x e = n 1, [µ], e E e E(U) y e = n 1, e E e E(U) x e ( U 1), U V, [w U ], [ν], y e ( U 1), U V, [v U ], x e z e 0, e E, [α e ], y e z e 0, e E, [β e ], x e,y e,z e 0, e E. For any θ 0, the Lagrangian function φ(θ) is a lower bound on Opt. It is well-known that φ(θ) is concave and piecewise linear. By the optimality test (see, e.g., [1]), we obtain the following theorem: Theorem 1. Let (x e,y e,z e ) e E be an optimal solution to (19) for some θ 0, feasible to (11)-(18) and satisfying the complementary slackness condition θ( e E z e L) = 0. Then (x e,y e,z e ) e E is optimal to (10)-(18). Let (,),, Φ, be a pair of spanning trees of G (a pair for short). This pair corresponds to a feasible 0 1 solution to (19), defined as follows: x e = 1 for e, y e = 1 for e, and z e = 1 for e ; the values of the remaining variables are set to 0. From now on, by a pair (,) we also mean a feasible solution to (19) defined as above. Given a pair (,) with the corresponding solution (x e,y e,z e ) e E, let us define the partition (E,E,E Z,E W ) of the set of the edges E in the following way: E = {e E : x e = 1,y e = 0}, E = {e E : y e = 1,x e = 0}, E Z = {e E : x e = 1,y e = 1} and E W = {e E : x e = 0,y e = 0}. Thus equalities: = E E Z, = E E Z and E Z = hold. Our goal is to establish some sufficient optimality conditions for a given pair (,) in the problem (19). The dual to (19) has the following form: φ D (θ) = max U V s.t. ( U 1)w U +(n 1)µ U V( U 1)v U +(n 1)ν +θl (20) {U V :e E(U)} {U V :e E(U)} w U +µ C e α e, e E, v U +ν c e β e, e E, α e +β e θ, e E, w U,v U 0, U V, α e,β e 0, e E. 5

6 Lemma 1. The dual problem (20) can be rewritten as follows: ( ) φ D (θ) = min (C e α e )+min (c e β e ) +θl. (21) max {α e 0,β e 0:α e+β e θ, e E} Φ e Φ e Proof. Fix some α e and β e such that α e +β e θ for each e E in (20). For these constant values of α e and β e, e E, using the dual to (20), we arrive to min Φ e (C e α e ) + min Φ e (c e β e )+θl and the lemma follows. Lemma 1 allows us to establish the following result: Theorem 2 (Sufficient pair optimality conditions). A pair (, ) is optimal to (19) for a fixed θ 0 if there exist α e 0, β e 0 such that α e +β e = θ for each e E and (i) is a minimum spanning tree for the costs C e α e, is a minimum spanning tree for the costs c e β e, (ii) α e = 0 for each e E, β e = 0 for each e E. Proof. By the primal-dual relation, the inequality φ D (θ) φ(θ) holds. Using (21), we obtain φ D (θ) (C e α e )+ (c e β e )+θl = C e + c e + (C e +c e θ)+θl e e e E e E e E Z = C e + C e + c e + c e θ E Z +θl e E e E Z e E e E Z = e C e + e c e θ E Z +θl = φ(θ). The Weak Duality Theorem implies the optimality of (,) in (19) for a fixed θ 0. Lemma 2. A pair (,), which satisfies the sufficient pair optimality conditions for θ = 0, can be computed in polynomial time. Proof. Let be a minimum spanning tree for the costs C e and be a minimum spanning tree for the costs c e, e E. Since θ = 0, we set α e = 0, β e = 0 for each e E. It is clear that (, ) satisfies the sufficient pair optimality conditions. Assume that (,) satisfies the sufficient pair optimality conditions for some θ 0. If, for this pair, E Z L and θ( E Z L) = 0, then we are done, because by Theorem 1, the pair(,)isoptimalto(10)-(18). Supposethat E Z < L((,)isnotfeasibleto(10)-(18)). We will now show a polynomial time procedure for finding a new pair (, ), which satisfies the sufficient pair optimality conditions and E Z = E Z + 1. This implies a polynomial time algorithm for the problem (10)-(18), since it is enough to start with a pair satisfying the sufficient pair optimality conditions for θ = 0 (see Lemma 2) and repeat the procedure at most L times, i.e. until E Z = L. Given a spanning tree T in G = (V,E) and edge e = {k,l} T, let us denote by P T (e) the unique path in T connecting nodes k and l. It is well known that for any f P T (e), T = T {e}\{f} is also a spanning tree in G. We will say that T is the result of a move on T. 6

7 Consider a pair (, ) that satisfies the sufficient pair optimality conditions for some fixed θ 0. Set C e = C e α e and c e = c e β e for every e E, where α e and β e, e E, are the numbers which satisfy the conditions in Theorem 2. Thus, by Theorem 2(i) and the path optimality conditions (see, e.g., [1]), we get the following conditions which must be satisfied by (,): for every e / C e C f for every f P (e), (22a) for every e / c e c f for every f P (e). (22b) We now build a so-called admissible graph G A = (V A,E A ) in two steps. We first associate with each edge e E a node v e and include it to V A, V A = E. We then add arc (v e,v f ) to E A if e /, f P (e) and Ce = Cf. This arc is called an -arc. We also add arc (v f,v e ) to E A if e /, f P (e) and c e = c f. This arc is called an -arc. We say that v e V A is admissible if e E, or v e is reachable from a node v g V A, such that g E, by a directed path in G A. In the second step we remove from G A all the nodes which are not admissible, together with their incident arcs. An example of an admissible graph is shown in Figure 1. Each node of this admissible graph is reachable from some node v g, g E. Note that the arcs (v e7,v e6 ) and (v e7,v e10 ) are not present in G A, because v e7 is not reachable from any node v g, g E. These arcs have been removed from G A in the second step. Observe that each -arc (v e,v f ) E A represents a move on, namely = {e}\{f} is a spanning tree in G. Similarly, each -arc (v e,v f ) E A represents a move on, namely = {f}\{e} is a spanning tree in G. Notice that the cost, with respect to Ce, of is the same as and the cost, with respect to c e, of is the same as. So, the moves indicated by -arcs and -arcs preserve the optimality of and, respectively. Observe that e / or e, which implies e / E. Also f or f /, which implies f / E. Hence, no arc in E A can start in a node corresponding to an edge in E and no arc in E A can end in a node corresponding to an edge in E. Observe also that (v e,v f ) E A can be both -arc and -arc only if e E and f E. Such a case is shown in Figure 1 (see the arc (v e1,v e2 )). Since each arc (v e,v f ) E A represents a move on or, e and f cannot both belong to E W or E Z. (a) e 6 (2;3) e 1 (2;2) e 3 (2;2) e10 e 7 e 5 (2;2) (2;3) (2;3) e 4 (1;5) e 8 (2;3) e (5;0) 9 e 2 (2;2) v e6 E v e2 E v e1 E (Ce;c ; e) (b) v e8 E W v e3 E Z v e5 E v e10 E Z Figure 1: (a) A pair (,) such that = {e 2,e 3,e 4,e 6,e 10 } and = {e 1,e 3,e 5,e 9,e 10 }. (b) The admissible graph G A for (,). We will consider two cases: E {e E : v e V A } ande {e E : v e V A } =. The first case means that there is a directed path from v e, e E, to a node v f, f E, 7

8 PSfrag replacements in the admissible graph G A and in the second case no such a path exists. We will show that in the first case it is possible to find a new pair (, ) which satisfies the sufficient pair optimality conditions and E Z = E Z +1. The idea will be to perform a sequence of moves on and, indicated by the arcs on some suitably chosen path from v e, e E, to v f, f E in the admissible graph G A. Let us formally handle this case. Lemma 3. If E {e E : v e V A }, then there exists a pair (, ) with E Z = E Z +1, which satisfies the sufficient pair optimality conditions for θ. Proof. We begin by introducing the notion of a cycle graph G(T) = (V T,A T ), corresponding to a given spanning tree T of graph G = (V,A). We build G(T) as follows: we associate with each edge e E a node v e and include it to V T, E = V T ; then we add arc (v e,v f ) to A T if e T and f P T (e). An example is shown in Figure 2. (a) (b) f 1 e 2 v e1 v e2 f 2 f 3 f 4 e 1 v f1 v f6 v f7 v f5 v f2 v f3 v f4 f 5 e 3 f 6 f 7 v e3 Figure 2: (a) A graph G with a spanning tree T (the solid lines). (b) The cycle graph G(T). Claim 1. Given a spanning tree T of G, let F = {(v e1,v f1 ),(v e2,v f2 ),...,(v el,v fl )} be a subset of arcs of G(T), where all v ei and v fi (resp. e i and f i ), i [l], are distinct. If T = T {e 1 PSfrag,...,ereplacements l } \ {f 1,...,f l } is not a spanning tree, then G(T) contains a subgraph depicted in Figure 3, where {j 1,...,j κ } [l]. v ej1 v fj1 v ej2 v fj2 v fjκ v ejκ v fj3 v ej3 Figure 3: A subgraph of G(T) from Claim 1. Let us illustrate Claim 1 by using the sample graph in Figure 2. Suppose that F = {(v e1,v f5 ),(v e2,v f2 ),(v e3,v f3 )}. Then T = T {e 1,e 2,e 3,}\{f 5,f 2,f 3 } is not a spanning tree and G(T) contains the subgraph composed of the following arcs (see Figure 2): (v e1,v f2 ),(v e2,v f2 ),(v e2,v f3 ),(v e3,v f3 ),(v e3,v f5 ),(v e1,v f5 ). Proof of Claim 1. WeformT byperformingasequenceofmoves consistinginaddingedgese i and removing edges f i P T (e i ), i [l]. Suppose that, at some step, a cycle appears, which is formed by some edges from {e 1,...,e l } and the remaining edges of T (not removed from T). Such a cycle must appear, since otherwise T would be a spanning tree. Let us relabel the edges so that {e 1,...,e s } are on this cycle, i.e. the first s moves consisting in adding 8

9 e i and removing f i create the cycle, i [s]. An example of such a situation for s = 4 is shown in Figure 4. The cycle is formed by the edges e 1,...,e 4 and the paths P v2 v 3, P v4 v 5 and P v1 v 6 in T. Consider the edge e 1 = {v 1,v 2 }. Because T is a spanning tree, P T (e 1 ) P v2 v 3 P T (e 2 ) P T (e 3 ) P v4 v 5 P T (e 4 ) P v1 v 6. Observe that f 1 P T (e 1 ) cannot belong to any of P v2 v 3, P v4 v 5 and P v1 v 6. If it would be contained in one of these paths, then no cycle would be created. Hence, f 1 must belong to P T (e 2 ) P T (e 3 ) P T (e 4 ). The above argument is general and, by using it, we can show that for each i [s], f i P T (e j ) for some j [s]\{i}. (a) f 2 (b) P v2v 3 P T (e 2 ) v f1 v e1 f 1 2 P T (e 1 ) f 1 2 P T (e 2 ) v 2 v 3 e 1 e 2 v 1 v f2 e 3 P v1v 6 v 4 P T (e 3 ) f 3 v e2 f 2 2 P T (e 2 ) f 2 2 P T (e 3 ) v 6 e 4 v 5 P T (e 4 ) f 4 P v4v 5 v f3 v e3 f 3 2 P T (e 3 ) f 3 2 P T (e 2 ) Figure 4: Illustration for the proof of Claim 1. (a) The bold lines represent paths in T (not necessarily disjoint); f 1 P T (e 2 ) P T (e 3 ) P T (e 4 ). (b) The subgraph G (T) with the corresponding cycle. We are now ready to build a subgraph depicted in Figure 3. Consider a subgraph G (T) of the cycle graph G(T) built as follows. The nodes of G (T) are v e1,...,v es,v f1,...,v fs. Observe that G (T) has exactly 2s nodes, since all the edges e 1,...,e s,f 1,...,f s are distinct by the assumption of the claim. For each i [s] we add to G (T) two arcs, namely (v ei,v fi ), f i P T (e i ) and (v ej,v fi ), f i P T (e j ) for j [s] \ {i} (see Figure 4). The resulting graph G (T) is bipartite and has exactly 2s arcs. In consequence G (T) (and thus G(T)) must contain a cycle which is of the form depicted in Figure 3. After this preliminary step, we can now return to the main proof. If E {e E : v e V A }, then, by the construction of the admissible graph, there exists a directed path in G A from a node v e, e E, to a node v f, f E. Let P be a shortest such a path from v e to v f, i.e. a path consisting of the fewest number of arcs, called an augmenting path. We need to consider the following cases: 1. The augmenting path P is of the form: E v e E v f If (v e,v f ) is -arc, then = {e}\{f} is an updated spanning tree of G such that = E Z +1. Furthermore is a minimum spanning tree for the costs C e and the new pair (,) satisfies the sufficient pair optimality conditions (E E, so 9

10 condition (ii) in Theorem 2 is not violated). If (v e,v f ) is -arc, then = {f}\{e} is an updated spanning tree of G such that = E Z +1. Also is a minimum spanning tree for the costs c e and the new pair (, ) satisfies the sufficient pair optimality conditions. An example can be seen in Figure 1. There is a path v e1 v e2 in the admissible graph. The arc (v e1,v e2 ) is both -arc and -arc. We can thus choose one of the two possible moves = {e 1 } \ {e 2 } or = {e 2 } \ {e 1 }, which results in (,) or (,). 2. The augmenting path P is of the form: E E Z E W E Z E W E Z E W E Z E (a) v e1 vf1 ve2 vf2 ve3 vf3 vel vfl vel+1 (b) E v fl Let = {e 1,...,e l }\{f 1,...,f l }. Let = {e 2,...,e l+1 }\{f 1,...f l } for case (a), and = {e 2,...,e l }\{f 1,...f l 1 } for case (b). We now have to show that the resultingpair(, )isapairofspanningtrees. Supposethat isnotaspanningtree. Observe that the -arcs (v e1,v f1 ),...,(v el,v fl ) belong to the cycle graph G(). Thus, by Claim 1, the cycle graph G() must contain a subgraph depicted in Figure 3, where {j 1,...,j κ } [l]. An easy verification shows that all edges e i,f i, i {j 1,...,j κ } must have the same costs with respect to Ce. Indeed, if some costs are different, then there exists an edge exchange which decreases the cost of. This contradicts our assumption that is a minimum spanning tree with respect to Ce. Finally, there must be an arc (v ei,v fi ) in the subgraph such that i < i. Since Ce i = C f, the arc (v i e i,v fi ) is present in the admissible graph G A. This leads to a contradiction with our assumption that P is an augmenting path. Now supposethat is not a spanningtree. We consider only the case (a) since the proof of case (b) is just the same. For a convenience, let us number the nodes v ei on P from i = 0 to l, so that = {e 1,...,e l }\{f 1,...,f l }. The arcs (v e1,v f1 ),...,(v el,v fl ), which correspond to the -arcs (v f1,v e1 ),...,(v fl,v el ) of P, belong to the cycle graph G(). Hence, by Claim 1, G() must contain a subgraph depicted in Figure 3, where {i 1,...,i κ } [l]. The rest of the proof is similar to the proof for. Namely, the edges e i and f i for i {i 1,...,i κ } must have the same costs with respect to c e. Also, there must exist an arc (v ei,v fi ) in the subgraph such that i > i. In consequence, the arc (v fi,v ei ) belongs to the admissible graph, which contradicts the assumption that P is an augmenting path. An example of the case (a) is shown in Figure 5. Thus = {e 1,e 2,e 3,e 4 } \ {f 1,f 2,f 3,f 4 } and = {e 2,e 3,e 4,e 5 } \ {f 1,f 2,f 3,f 4 }. An example of the case (b) is shown in Figure 6. In this example is the same as in the previous case and = {e 2,e 3,e 4 }\{f 1,f 2,f 3 }. It is easy to verify that E Z = = E Z + 1 holds (see also the examples in Figures 5 and 6). The spanning trees and are optimal for the costs C e and c e, respectively. Furthermore, E E and E E, so (, ) satisfies the sufficient pair optimality conditions (the condition (ii) in Theorem 2 is not violated). 10

11 (Ce;c e) (0,2) f 1 (2,0) f 2 (2,0) (2,0) f 3 f 4 (0,1) e 5 (1,0) e 1 e 2 e 3 e 4 (2,0) (0,2) (0,2) (0,2) E E Z E W E Z E W E Z E W E v e1 v f1 v e2 v f2 v e3 v f3 Z E v e4 v f4 v e5 Figure 5: A pair (,) and the corresponding admissible graph for the case 2a. (Ce;c e) (0,2) (1,0) e 1 f 1 (2,0) e 2 f 2 (2,0) e 3 f 3 (2,0) f 4 e 4 (1,2) (0,2) (0,2) (0,2) E Z E W E Z E W E Z E v e1 v W E f1 v e2 v f2 v e3 v f3 v e4 v f4 E Figure 6: A pair (,) and the corresponding admissible graph for the case 2b. 3. The augmenting path P is of the form E E W E Z E W E Z E W E Z E W E (a) v e1 vf1 ve2 vf2 ve3 vf3... vel vfl vel+1 (b) E v fl Let = {f 1,...,f l }\{e 2,...,e l+1 } for the case (a) and = {f 1,...,f l 1 }\ {e 2,...e l } for the case (b). Let = {f 1,...,f l } \ {e 1,...e l }. The proof that and are spanning trees follows by the same arguments as for the symmetric case described in point 2. An example of the case (a) is shown in Figure 7. Thus = {f 1,f 2,f 3,f 4 } \{e 2,e 3,e 4,e 5 } and = {f 1,f 2,f 3,f 4 } \ {e 1,e 2,e 3,e 4 }. An example for the case (b) is shown in Figure 8. The spanning tree is the same as in the previous case and = {f 1,f 2,f 3 } \ {e 2,e 3,e 4 }. The equality E Z = = E Z +1 holds. Also, the trees and are optimal for the costs C e and c e, respectively, E E, E E, so (, ) satisfies the sufficient pair optimality conditions. 11

12 (Ce;c e) (0,0) f 1 (0,2) f 2 (0,2) (0,2) f 3 f 4 (1,0) e 5 (2,1) e 1 e 2 e 3 e 4 (0,0) (2,0) (2,0) (2,0) E v E W E Z E W E Z E W E Z E e1 v f1 v e2 v f2 v W E e3 v f3 v e4 v f4 v e5 Figure 7: A pair (,) and the corresponding admissible graph for the case 3a. (Ce;c e) (0,0) e 1 (2,1) f 1 (0,2) e 2 f 2 (0,2) (0,2) f 3 e 3 f 4 e 4 (2,0) (2,0) (2,0) E v E W E Z E W E Z E W E e1 v f1 v e2 v f2 v Z E e3 v f3 v e4 v f4 Figure 8: A pair (,) and the corresponding admissible graph for the case 3b. We now turn to the case E {e E : v e V A } =. Fix δ > 0 (the precise value of δ will be specified later) and set: C e (δ) = C e δ, c e (δ) = c e v e V A, (23a) C e (δ) = C e, c e (δ) = c e δ v e / V A. (23b) Lemma 4. There exists a sufficiently small δ > 0 such that the costs C e (δ) and c e (δ) satisfy the path optimality conditions for and, respectively, i.e: for every e / C e (δ) C f (δ) for every f P (e), (24a) for every e / c e (δ) c f (δ) for every f P (e). (24b) Proof. If C e > C f (resp. c e > c f ), e /,f P (e) (resp. e /,f P (e)), then there is δ > 0, such that after setting the new costs (23) the inequality C e (δ) C f (δ) (resp. c e (δ) c f (δ)) holds. Hence, one can choose a sufficiently small δ > 0 such that after setting 12

13 the new costs (23), all the strong inequalities are not violated. Therefore, for such a chosen δ it remains to show that all originally tight inequalities in (22) are preserved for the new costs. Consider a tight inequality of the form: C e = C f, e /, f P (e). (25) On the contrary, suppose that C e (δ) < C f (δ). This is only possible when C e (δ) = C e δ and C f (δ) = C f. Hence and from the construction of the new costs, we have v f / V A (see (23b)) and v e V A (see (23a)). By (25), we obtain (v e,v f ) E A. Thus v f V A, a contradiction. Consider a tight inequality of the form: c e = c f, e /, f P (e). (26) On the contrary, suppose that c e (δ) < c f (δ). This is only possible when c e (δ) = c e δ and c f (δ) = c f. Thus we deduce that v e / V A and v f V A (see (23)). From (26), it follows that (v f,v e ) E A and so v e V A, a contradiction. We are now ready to give the precise value of δ. We do this by increasing the value of δ until some inequalities, originally not tight in (22), become tight. Namely, let δ > 0 be the smallest value of δ for which an inequality originally not tight becomes tight. Obviously, it occurs when C e δ = C f for e /, f P (e) or c f δ = c e for f /, e P (f). By (23), v e V A and v f / V A. Accordingly, if δ = δ, then at least one arc is added to G A. Observe also that no arc can be removed from G A - the admissibility of the nodes remains unchanged. It follows from the fact that each tight inequality for v e V A and v f V A is still tight. This leads to the following lemma. Lemma 5. If E {e E : v e V A } =, then (,) satisfies the sufficient pair optimality conditions for each θ [θ,θ+δ ]. Proof. Set θ = θ + δ, δ [0,δ ]. Lemma 4 implies that is optimal for C e (δ) and is optimal for c e (δ). From (23) and the definition of the costs C e and c e, it follows that C e (δ) = C e α e and c e (δ) = c e β e, where α e = α e + δ and β e = β e for each v e V A, α e = α e and β e = β e +δ for each v e / V A. Notice that α e+β e = α e +β e +δ = θ+δ = θ for each e E. By (23), c e (δ) = c e for each e E (recall that e E implies v e V A ), and thus β e = 0 for each e E. Since E {e E : v e V A } =, C e (δ) = C e = C e holds for each e E, and so α e = 0 for each e E. We thus have shown that there exist α e,β e 0 such that α e + β e = θ for each e E satisfying the conditions (i) and (ii) in Theorem 2, which completes the proof. We now describe a polynomial procedure that, for a given pair (,) satisfying the sufficient pairoptimality conditionsforsomeθ 0, findsanewpairofspanningtrees (, ), which also satisfies the sufficient pair optimality conditions with E Z = E Z +1. We start by building the admissible graph G A = (V A,E A ) for (,). If this graph contains an augmenting path, then by Lemma 3, we are done. Otherwise, we determine δ and modify the costs by using (23). Lemma 5 shows that (,) satisfies the sufficient pair optimality conditions for θ + δ. For δ some new arcs are added to the admissible graph G A (all the previous arcs must be still present in G A ). Thus G A is updated and we set C e := C e (δ ), c e := c e(δ ) for each e E, and θ := θ+δ. We repeat this until there is an augmenting path in G A = (V A,E A ). Note that such a path must appear after at most m = E iterations, 13

14 (C e;c e) (a) θ = 0 e 4 (0,9) e 1 (2,5) e 5 e 3 (8,3) (1,2) e 2 (0,6) e 6 (8,3) e 8 e 7 (2,3) e 9 (3,2) e 10 (5,9) (7,2) e 11 E v e8 E v e11 E v e3 E W v e7 e 4 (0,8) (7,3) e 1 (2,4) e e 5 8 e 3 (7,3) e E (b) 7 (1,3) (1,0) v e8 e 9 e 2 (3,1) E (0,5) e e 10 6 (5,8) v δ = 1;θ = 1 e11 (6,2) E e 11 v e3 E W v e7 E Z v e5 e 4 (0,7) (6,3) e 1 (2,3) e e 5 8 e 3 (6,3) e E (c) 7 (0,3) (1,-1) (0,1) v e8 e 9 e 2 (3,0) E (0,4) e v e 10 6 (5,7) e11 δ = 1;θ = 2 (5,2) E e 11 v e3 E W v e7 E v e10 E W v e1 E Z v e5 E v e6 Figure 9: Sample computations, = {e 2,e 4,e 5,e 6,e 9,e 10 } and = {e 2,e 3,e 5,e 8,e 9,e 11 }. which follows from the fact that at some step a node v e such that e E must appear in G A. Sample computations are shown in Figure 9. We start with the pair (,), where = {e 2,e 4,e 5,e 6,e 9,e 10 } and = {e 2,e 3,e 5,e 8,e 9,e 11 }, which satisfies the sufficient pair optimality conditions for θ = 0 (see Figure 9a). Observe that in this case it is enough to check that is optimal for the costs C e = C e and is optimal for the costs c e = c e, e E. For θ = 0, the admissible graph does not contain any augmenting path. We thus have to modify the costs C e and c e, according to (23). For δ = 1, a new inequality becomes tight and one arc is added to the admissible graph (see Figure 9b). The admissible graph still does not have an augmenting path, so we have to again modify the costs. For δ = 1 some new inequalities become tight and three arcs are added to the admissible graph (see Figure 9c). Now the admissible graph has two augmenting paths (cases 1 and 3a, see the proof of Lemma 3). Choosing one of them, and performing the modification described in the proof of Lemma 3 we get a new pair (, ) with E Z = E Z +1. Let us now estimate the running time of the procedure. The admissible graph has at most m nodes and at most mn arcs. It can be built in O(nm) time. The augmenting path in the admissible graph can be found in O(nm) time by applying the breath first search. Also the number of inequalities which must be analyzed to find δ is O(nm). Since we have to update the cost of each arc of the admissible graph at most m times, until an augmenting path appears, the required time of the procedure is O(m 2 n). We thus get the following result. 14

15 Theorem 3. The Rec ST problem is solvable in O(Lm 2 n) time, where L = n 1 k. 3 The recoverable robust spanning tree problem In this section we are concerned with the Rob Rec ST problem under the interval uncertainty representation, i.e. for the scenario sets U I, U1 I(Γ), and UI 2 (Γ). Using the polynomial algorithm for Rec ST, constructed in Section 2, we will provide a polynomial algorithm for Rob Rec ST under U I and some approximation algorithms for a wide class of Rob Rec ST under U1 I(Γ) and UI 2 (Γ). The idea will be to solve Rec ST for a suitably chosen second stage costs. Let F() = e C e +max min f(,s), S U Φ k where f(,s) = e cs e. It is worth pointing out that under scenario sets UI and U2 I(Γ), the value of F(), for a given spanning tree, can be computed in polynomial time [8, 17]. On the other hand, computing F() under U1 I (Γ) turns out to be strongly NP-hard [17, 9]. Given scenario S = (c S e ) e E, consider the following Rec ST problem: ( ) min C e + min f(,s). (27) Φ Φ k e e Problem (27) is equivalent to the formulation (1) for S = (c e ) e E and it is polynomially solvable, according to the result obtained in Section 2. As in the previous section, we denote by pair (,) a solution to (27), where Φ and Φ k. Given S, we call (,) an optimal pair under S if (,) is an optimal solution to (27). The Rob Rec ST problem with scenario set U I can be rewritten as follows: ( ) ( ) min C e + max min c S Φ S U I Φ k e = min C e + min (c e +d e ). (28) Φ Φ k e Thus (28) is (27) for S = (c e +d e ) e E U I. Hence and from Theorem 3 we immediately get the following theorem: Theorem 4. For scenario set U I, the Rob Rec ST problem is solvable in O((n 1 k)m 2 n) time. We now address Rob Rec ST under U I 1 (Γ) and UI 2 (Γ). Suppose that c e α(c e + d e ) for each e E, where α (0,1] is a given constant. This inequality means that for each edge e E the nominal cost c e is positive and c e +d e is at most 1/α greater than c e. It is reasonable to assume that this condition will be true in many practical applications for not very large value of 1/α. Lemma 6. Suppose that c e α(c e +d e ) for each e E, where α (0,1], and let ( ˆ,Ŷ) be an optimal pair under S = (c e ) e E. Then for the scenario sets U1 I(Γ) and UI 2 (Γ) the inequality F( ˆ) 1 αf() holds for any Φ. Proof. We give the proof only for the scenario set U1 I(Γ). The proof for UI 2 (Γ) is the same. Let Φ. The following inequality is satisfied: F() = e C e + max min f(,s) = C e +f(,s ) e +f( S U1 I(Γ) Φ k e e C,S). e e E 15

16 Clearly, (, ) is a feasible pair to (27) under S. From the definition of ( ˆ,Ŷ) we get F() e ˆ C e +f(ŷ,s) = e ˆ C e + e Ŷ c e e ˆ C e + e Ŷ α(c e +d e ) = e ˆC e +αf(ŷ,s), where S = (c e +d e ) e E. Hence F() ˆC e +α max f(ŷ,s) C e +α max S U1 I e (Γ) e ˆ min S U1 I(Γ) Φ kˆ f(,s) (29) α and the lemma follows. e ˆC e + max S U I 1 (Γ) min Φ kˆ f(,s) = αf( ˆ) The condition c e α(c e +d e ), e E, in Lemma 6, can be weakened and, in consequence, the set of instances to which the approximation ratio of the algorithm applies can be extended. Indeed, from inequality (29) it follows that the bounds of the uncertainty intervals are only required to meet the condition e Ŷ c e α e Ŷ (c e + d e ). This condition can be verified efficiently, since Ŷ can be computed in polynomial time. We now focus on Rob Rec ST for U2 I(Γ). Define D = e E d e and suppose that D > 0 (if D = 0, then the problem is equivalent to Rec ST for the second stage costs c e, e E). Consider scenario S under which c S e = min{c e + d e,c e + Γ de D } for each e E. Obviously, S U2 I(Γ), since e E δ e e E Γde D Γ. The following theorem provides another approximation result for Rob Rec ST with scenario set U2 I(Γ): Lemma 7. Let ( ˆ,Ŷ) be an optimal pair under S. Then the following implications are true for scenario set U I 2 (Γ): (i) If Γ βd, β (0,1], then F( ˆ) 1 βf() for any Φ. (ii) If Γ γf( ˆ), γ [0,1) then F( ˆ) 1 1 γf() for any Φ. Proof. Let Φ. Since S U2 I (Γ), we get F() = e C e + max min f(,s) e + min f(,s S U2 I(Γ) Φ k Φ e C ). (30) k We first prove implication (i). By (30) and the definition of ( ˆ,Ŷ), we obtain F() e ˆ e ˆ C e +f(ŷ,s ) = e ˆ C e + e Ŷ C e + e Ŷ min{c e +d e,c e +βd e } = e ˆ min{c e +d e,c e +Γ d e D } C e + e Ŷ (c e +βd e ) e ˆC e +βf(ŷ,s), where S = (c e +d e ) e E. The rest of the proof is the same as in the proof of Lemma 6. We now prove implication (ii). By (30) and the definition of ( ˆ,Ŷ), we have F() e ˆ C e +f(ŷ,s ) e ˆ C e +f(ŷ,s) ˆC e + max f(ŷ,s) Γ S U2 I (Γ) e ˆC e + max min f(,s) Γ = F( ˆ) Γ. S U2 I e (Γ) Φ kˆ 16

17 If Γ γf( ˆ). Then F() F( ˆ) γf( ˆ) = (1 γ)f( ˆ) and F( ˆ) 1 1 γ F(). Note that the value of F( ˆ) under U2 I (Γ) can be computed in polynomial time [17]. In consequence, the constants β and γ can be efficiently determined for every particular instance of the problem. Clearly, we can assume that d e Γ for each e E, which implies D mγ, where m = E. Hence, we can assume that Γ 1 md for every instance of the problem. We thus get from Lemma 7 (implication (i)) that F( ˆ) mf() for any Φ and the problem is approximable within m. If α, β and γ are the constants from Lemmas 6 and 7, then the following theorem summarizes the approximation results: Theorem 5. Rob Rec ST is approximable within 1 α under scenario set UI 1 (Γ) and it is approximable within min{ 1 β, 1 α, 1 1 γ } under scenario set UI 2 (Γ). Observe that Lemma 6 and Lemma 7 hold of any sets Φ and Φ k (the particular structure of these sets is not exploited). Hence the approximation algorithms can be applied to any problem for which the recoverable version (27) is polynomially solvable. 4 Conclusions In this paper we have studied the recoverable robust spanning tree problem (Rob Rec ST) under various interval uncertainty representations. The main result is the polynomial time combinatorial algorithm for the recoverable spanning tree. We have applied this algorithm for solving Rob Rec ST under the traditional uncertainty representation (see, e.g., [13]) in polynomial time. Moreover, we have used the algorithm for providing several approximation results forrec STwith thescenario set introducedby Bertsimas andsim [3] andthescenario set with a budged constraint (see, e.g,. [17]). There is a number of open questions concerning the considered problem. Perhaps, the most interesting one is to resolve the complexity of the robust problem under the interval uncertainty representation with budget constraint. It is possible that this problem may be solved in polynomial time by some extension of the algorithm constructed in this paper. One can also try to extend the algorithm for the more general recoverable matroid base problem, which has also been shown to be polynomially solvable in [10]. Acknowledgements The second and the third authors were supported by the National Center for Science (Narodowe Centrum Nauki), grant 2013/09/B/ST6/ References [1] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network Flows: theory, algorithms, and applications. Prentice Hall, Englewood Cliffs, New Jersey, [2] H. Aissi, C. Bazgan, and D. Vanderpooten. Approximation of min-max and min-max regret versions of some combinatorial optimization problems. European Journal of Operational Research, 179: ,

18 [3] D. Bertsimas and M. Sim. Robust discrete optimization and network flows. Mathematical Programming, 98:49 71, [4] C. Büsing. Recoverable robustness in combinatorial optimization. PhD thesis, Technical University of Berlin, Berlin, [5] C. Büsing. Recoverable robust shortest path problems. Networks, 59: , [6] C. Büsing, A. M. C. A. Koster, and M. Kutschka. Recoverable robust knapsacks: the discrete scenario case. Optimization Letters, 5: , [7] A. Chassein and M. Goerigk. On the recoverable robust traveling salesman problem. Optimization Letters, DOI /s , [8] O. Şeref, R. K. Ahuja, and J. B. Orlin. Incremental network optimization: theory and algorithms. Operations Research, 57: , [9] N. G. Frederickson and R. Solis-Oba. Increasing the weight of minimum spanning trees. Journal of Algorithms, 33: , [10] M. Hradovich, A. Kasperski, and P. Zieliński. The recoverable robust spanning tree problem with interval costs is polynomially solvable. Optimization Letters, DOI /s x, [11] A. Kasperski, A. Kurpisz, and P. Zieliński. Recoverable robust combinatorial optimization problems. In Operations Research Proceedings 2012, pages , [12] A. Kasperski and P. Zieliński. On the approximability of robust spanning problems. Theoretical Computer Science, 412: , [13] P. Kouvelis and G. u. Robust Discrete Optimization and its Applications. Kluwer Academic Publishers, [14] L. C. Lau, R. Ravi, and M. Singh. Iterative Methods in Combinatorial Optimization. Cambridge University Press, [15] C. Liebchen, M. E. Lübbecke, R. H. Möhring, and S. Stiller. The concept of recoverable robustness, linear programming recovery, and railway applications. In Robust and Online Large-Scale Optimization, volume 5868 of Lecture Notes in Computer Science, pages Springer-Verlag, [16] K. Lin and M. S. Chern. The most vital edges in the minimum spanning tree problem. Information Processing Letters, 45:25 31, [17] E. Nasrabadi and J. B. Orlin. Robust optimization with incremental recourse. CoRR, abs/ , [18] C. H. Papadimitriou and K. Steiglitz. Combinatorial optimization: algorithms and complexity. Dover Publications Inc.,

arxiv: v2 [cs.ds] 7 Mar 2016

arxiv: v2 [cs.ds] 7 Mar 2016 The robust recoverable spanning tree problem with interval costs is polynomially solvable arxiv:1602.07422v2 [cs.ds] 7 Mar 2016 Mikita Hradovich, Adam Kasperski, Pawe l Zieliński Faculty of Fundamental

More information

The recoverable robust spanning tree problem with interval costs is polynomially solvable

The recoverable robust spanning tree problem with interval costs is polynomially solvable Optim Lett (2017) 11:17 30 DOI 10.1007/s11590-016-1057-x ORIGINAL PAPER The recoverable robust spanning tree problem with interval costs is polynomially solvable Mikita Hradovich 1 Adam Kasperski 2 Paweł

More information

Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack

Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Approximation complexity of min-max (regret) versions of shortest path, spanning tree, and knapsack Hassene Aissi, Cristina Bazgan, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr

More information

Robust Combinatorial Optimization under Budgeted-Ellipsoidal Uncertainty

Robust Combinatorial Optimization under Budgeted-Ellipsoidal Uncertainty EURO Journal on Computational Optimization manuscript No. (will be inserted by the editor) Robust Combinatorial Optimization under Budgeted-Ellipsoidal Uncertainty Jannis Kurtz Received: date / Accepted:

More information

Pseudo-polynomial algorithms for min-max and min-max regret problems

Pseudo-polynomial algorithms for min-max and min-max regret problems Pseudo-polynomial algorithms for min-max and min-max regret problems Hassene Aissi Cristina Bazgan Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr

More information

Lecture #21. c T x Ax b. maximize subject to

Lecture #21. c T x Ax b. maximize subject to COMPSCI 330: Design and Analysis of Algorithms 11/11/2014 Lecture #21 Lecturer: Debmalya Panigrahi Scribe: Samuel Haney 1 Overview In this lecture, we discuss linear programming. We first show that the

More information

Approximating min-max (regret) versions of some polynomial problems

Approximating min-max (regret) versions of some polynomial problems Approximating min-max (regret) versions of some polynomial problems Hassene Aissi, Cristina Bazgan, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr

More information

Duality of LPs and Applications

Duality of LPs and Applications Lecture 6 Duality of LPs and Applications Last lecture we introduced duality of linear programs. We saw how to form duals, and proved both the weak and strong duality theorems. In this lecture we will

More information

Recoverable Robust Knapsacks: Γ -Scenarios

Recoverable Robust Knapsacks: Γ -Scenarios Recoverable Robust Knapsacks: Γ -Scenarios Christina Büsing, Arie M. C. A. Koster, and Manuel Kutschka Abstract In this paper, we investigate the recoverable robust knapsack problem, where the uncertainty

More information

arxiv: v1 [cs.dm] 27 Jan 2014

arxiv: v1 [cs.dm] 27 Jan 2014 Randomized Minmax Regret for Combinatorial Optimization Under Uncertainty Andrew Mastin, Patrick Jaillet, Sang Chin arxiv:1401.7043v1 [cs.dm] 27 Jan 2014 January 29, 2014 Abstract The minmax regret problem

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

The Maximum Flow Problem with Disjunctive Constraints

The Maximum Flow Problem with Disjunctive Constraints The Maximum Flow Problem with Disjunctive Constraints Ulrich Pferschy Joachim Schauer Abstract We study the maximum flow problem subject to binary disjunctive constraints in a directed graph: A negative

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization 2017-2018 1 Maximum matching on bipartite graphs Given a graph G = (V, E), find a maximum cardinal matching. 1.1 Direct algorithms Theorem 1.1 (Petersen, 1891) A matching M is

More information

arxiv: v1 [cs.ds] 17 Jul 2013

arxiv: v1 [cs.ds] 17 Jul 2013 Bottleneck combinatorial optimization problems with uncertain costs and the OWA criterion arxiv:137.4521v1 [cs.ds] 17 Jul 213 Adam Kasperski Institute of Industrial Engineering and Management, Wroc law

More information

A tabu search algorithm for the minmax regret minimum spanning tree problem with interval data

A tabu search algorithm for the minmax regret minimum spanning tree problem with interval data Noname manuscript No. (will be inserted by the editor) A tabu search algorithm for the minmax regret minimum spanning tree problem with interval data Adam Kasperski Mariusz Makuchowski Pawe l Zieliński

More information

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. 35, No., May 010, pp. 84 305 issn 0364-765X eissn 156-5471 10 350 084 informs doi 10.187/moor.1090.0440 010 INFORMS On the Power of Robust Solutions in Two-Stage

More information

Complexity of the min-max and min-max regret assignment problems

Complexity of the min-max and min-max regret assignment problems Complexity of the min-max and min-max regret assignment problems Hassene Aissi Cristina Bazgan Daniel Vanderpooten LAMSADE, Université Paris-Dauphine Place du Maréchal de Lattre de Tassigny, 75775 Paris

More information

Min-max-min Robust Combinatorial Optimization Subject to Discrete Uncertainty

Min-max-min Robust Combinatorial Optimization Subject to Discrete Uncertainty Min-- Robust Combinatorial Optimization Subject to Discrete Uncertainty Christoph Buchheim Jannis Kurtz Received: date / Accepted: date Abstract We consider combinatorial optimization problems with uncertain

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

Computer Science & Engineering 423/823 Design and Analysis of Algorithms

Computer Science & Engineering 423/823 Design and Analysis of Algorithms Bipartite Matching Computer Science & Engineering 423/823 Design and s Lecture 07 (Chapter 26) Stephen Scott (Adapted from Vinodchandran N. Variyam) 1 / 36 Spring 2010 Bipartite Matching 2 / 36 Can use

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Exact Algorithms for Dominating Induced Matching Based on Graph Partition

Exact Algorithms for Dominating Induced Matching Based on Graph Partition Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,

More information

On The Recoverable Robust Traveling Salesman Problem

On The Recoverable Robust Traveling Salesman Problem On The Recoverable Robust Traveling Salesman Problem André Chassein and Marc Goerigk Fachbereich Mathematik, Technische Universität Kaiserslautern, Germany Abstract We consider an uncertain traveling salesman

More information

Maximum flow problem

Maximum flow problem Maximum flow problem 7000 Network flows Network Directed graph G = (V, E) Source node s V, sink node t V Edge capacities: cap : E R 0 Flow: f : E R 0 satisfying 1. Flow conservation constraints e:target(e)=v

More information

arxiv: v2 [cs.ds] 27 Nov 2014

arxiv: v2 [cs.ds] 27 Nov 2014 Single machine scheduling problems with uncertain parameters and the OWA criterion arxiv:1405.5371v2 [cs.ds] 27 Nov 2014 Adam Kasperski Institute of Industrial Engineering and Management, Wroc law University

More information

Min-max-min robustness: a new approach to combinatorial optimization under uncertainty based on multiple solutions 1

Min-max-min robustness: a new approach to combinatorial optimization under uncertainty based on multiple solutions 1 Min-max- robustness: a new approach to combinatorial optimization under uncertainty based on multiple solutions 1 Christoph Buchheim, Jannis Kurtz 2 Faultät Mathemati, Technische Universität Dortmund Vogelpothsweg

More information

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. xx, No. x, Xxxxxxx 00x, pp. xxx xxx ISSN 0364-765X EISSN 156-5471 0x xx0x 0xxx informs DOI 10.187/moor.xxxx.xxxx c 00x INFORMS On the Power of Robust Solutions in

More information

Restricted b-matchings in degree-bounded graphs

Restricted b-matchings in degree-bounded graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-009-1. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

Lecture 10 February 4, 2013

Lecture 10 February 4, 2013 UBC CPSC 536N: Sparse Approximations Winter 2013 Prof Nick Harvey Lecture 10 February 4, 2013 Scribe: Alexandre Fréchette This lecture is about spanning trees and their polyhedral representation Throughout

More information

2 Notation and Preliminaries

2 Notation and Preliminaries On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

Algorithms: Lecture 12. Chalmers University of Technology

Algorithms: Lecture 12. Chalmers University of Technology Algorithms: Lecture 1 Chalmers University of Technology Today s Topics Shortest Paths Network Flow Algorithms Shortest Path in a Graph Shortest Path Problem Shortest path network. Directed graph G = (V,

More information

Decomposing planar cubic graphs

Decomposing planar cubic graphs Decomposing planar cubic graphs Arthur Hoffmann-Ostenhof Tomáš Kaiser Kenta Ozeki Abstract The 3-Decomposition Conjecture states that every connected cubic graph can be decomposed into a spanning tree,

More information

3.4 Relaxations and bounds

3.4 Relaxations and bounds 3.4 Relaxations and bounds Consider a generic Discrete Optimization problem z = min{c(x) : x X} with an optimal solution x X. In general, the algorithms generate not only a decreasing sequence of upper

More information

Algorithms and Theory of Computation. Lecture 11: Network Flow

Algorithms and Theory of Computation. Lecture 11: Network Flow Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a

More information

FRACTIONAL PACKING OF T-JOINS. 1. Introduction

FRACTIONAL PACKING OF T-JOINS. 1. Introduction FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum

More information

Introduction to Linear and Combinatorial Optimization (ADM I)

Introduction to Linear and Combinatorial Optimization (ADM I) Introduction to Linear and Combinatorial Optimization (ADM I) Rolf Möhring based on the 20011/12 course by Martin Skutella TU Berlin WS 2013/14 1 General Remarks new flavor of ADM I introduce linear and

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

3.10 Lagrangian relaxation

3.10 Lagrangian relaxation 3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the

More information

INVERSE SPANNING TREE PROBLEMS: FORMULATIONS AND ALGORITHMS

INVERSE SPANNING TREE PROBLEMS: FORMULATIONS AND ALGORITHMS INVERSE SPANNING TREE PROBLEMS: FORMULATIONS AND ALGORITHMS P. T. Sokkalingam Department of Mathematics Indian Institute of Technology, Kanpur-208 016, INDIA Ravindra K. Ahuja Dept. of Industrial & Management

More information

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves

More information

On the Complexity of Budgeted Maximum Path Coverage on Trees

On the Complexity of Budgeted Maximum Path Coverage on Trees On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of

More information

7. Lecture notes on the ellipsoid algorithm

7. Lecture notes on the ellipsoid algorithm Massachusetts Institute of Technology Michel X. Goemans 18.433: Combinatorial Optimization 7. Lecture notes on the ellipsoid algorithm The simplex algorithm was the first algorithm proposed for linear

More information

Approximation Algorithms for Re-optimization

Approximation Algorithms for Re-optimization Approximation Algorithms for Re-optimization DRAFT PLEASE DO NOT CITE Dean Alderucci Table of Contents 1.Introduction... 2 2.Overview of the Current State of Re-Optimization Research... 3 2.1.General Results

More information

Lecture notes on the ellipsoid algorithm

Lecture notes on the ellipsoid algorithm Massachusetts Institute of Technology Handout 1 18.433: Combinatorial Optimization May 14th, 007 Michel X. Goemans Lecture notes on the ellipsoid algorithm The simplex algorithm was the first algorithm

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Agenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming

Agenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming Agenda We ve done Greedy Method Divide and Conquer Dynamic Programming Now Flow Networks, Max-flow Min-cut and Applications c Hung Q. Ngo (SUNY at Buffalo) CSE 531 Algorithm Analysis and Design 1 / 52

More information

The maximum edge-disjoint paths problem in complete graphs

The maximum edge-disjoint paths problem in complete graphs Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk

More information

a 1 a 2 a 3 a 4 v i c i c(a 1, a 3 ) = 3

a 1 a 2 a 3 a 4 v i c i c(a 1, a 3 ) = 3 AM 221: Advanced Optimization Spring 2016 Prof. Yaron Singer Lecture 17 March 30th 1 Overview In the previous lecture, we saw examples of combinatorial problems: the Maximal Matching problem and the Minimum

More information

6. Linear Programming

6. Linear Programming Linear Programming 6-1 6. Linear Programming Linear Programming LP reduction Duality Max-flow min-cut, Zero-sum game Integer Programming and LP relaxation Maximum Bipartite Matching, Minimum weight vertex

More information

Bulletin of the Transilvania University of Braşov Vol 8(57), No Series III: Mathematics, Informatics, Physics,

Bulletin of the Transilvania University of Braşov Vol 8(57), No Series III: Mathematics, Informatics, Physics, Bulletin of the Transilvania University of Braşov Vol 8(57), No. - 05 Series III: Mathematics, Informatics, Physics, -8 MAXIMUM CUTS FOR A MINIMUM FLOW Eleonor CIUREA Abstract In this paper we resolve

More information

Fast algorithms for even/odd minimum cuts and generalizations

Fast algorithms for even/odd minimum cuts and generalizations Fast algorithms for even/odd minimum cuts and generalizations András A. Benczúr 1 and Ottilia Fülöp 2 {benczur,otti}@cs.elte.hu 1 Computer and Automation Institute, Hungarian Academy of Sciences, and Department

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded

More information

CSCE423/823. Introduction. Flow Networks. Ford-Fulkerson Method. Edmonds-Karp Algorithm. Maximum Bipartite Matching 2/35 CSCE423/823.

CSCE423/823. Introduction. Flow Networks. Ford-Fulkerson Method. Edmonds-Karp Algorithm. Maximum Bipartite Matching 2/35 CSCE423/823. 1/35 2pt 0em Computer Science & Engineering 423/823 Design and s Lecture 07 (Chapter 26) Stephen Scott (Adapted from Vinodchandran N. Variyam) 2/35 Can use a directed graph as a flow network to model:

More information

Spanning Trees with many Leaves in Regular Bipartite Graphs.

Spanning Trees with many Leaves in Regular Bipartite Graphs. Spanning Trees with many Leaves in Regular Bipartite Graphs. Emanuele G. Fusco and Angelo Monti Dipartimento di Informatica Sapienza, Università di Roma, via Salaria, 113-00198 Rome, Italy {fusco, monti}@di.uniroma1.it

More information

Solution of Large-scale LP Problems Using MIP Solvers: Repeated Assignment Problem

Solution of Large-scale LP Problems Using MIP Solvers: Repeated Assignment Problem The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 190 197 Solution of Large-scale LP Problems

More information

1 Matchings in Non-Bipartite Graphs

1 Matchings in Non-Bipartite Graphs CS 598CSC: Combinatorial Optimization Lecture date: Feb 9, 010 Instructor: Chandra Chekuri Scribe: Matthew Yancey 1 Matchings in Non-Bipartite Graphs We discuss matching in general undirected graphs. Given

More information

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM EXERCISES Prepared by Natashia Boland 1 and Irina Dumitrescu 2 1 Applications and Modelling 1.1

More information

Discrete (and Continuous) Optimization WI4 131

Discrete (and Continuous) Optimization WI4 131 Discrete (and Continuous) Optimization WI4 131 Kees Roos Technische Universiteit Delft Faculteit Electrotechniek, Wiskunde en Informatica Afdeling Informatie, Systemen en Algoritmiek e-mail: C.Roos@ewi.tudelft.nl

More information

Complexity of determining the most vital elements for the 1-median and 1-center location problems

Complexity of determining the most vital elements for the 1-median and 1-center location problems Complexity of determining the most vital elements for the -median and -center location problems Cristina Bazgan, Sonia Toubaline, and Daniel Vanderpooten Université Paris-Dauphine, LAMSADE, Place du Maréchal

More information

EFFICIENT ALGORITHMS FOR THE REVERSE SHORTEST PATH PROBLEM ON TREES UNDER THE HAMMING DISTANCE

EFFICIENT ALGORITHMS FOR THE REVERSE SHORTEST PATH PROBLEM ON TREES UNDER THE HAMMING DISTANCE Yugoslav Journal of Operations Research 27 (2017), Number 1, 46 60 DOI: 10.2298/YJOR150624009T EFFICIENT ALGORITHMS FOR THE REVERSE SHORTEST PATH PROBLEM ON TREES UNDER THE HAMMING DISTANCE Javad TAYYEBI*

More information

Approximation of min-max and min-max regret versions of some combinatorial optimization problems

Approximation of min-max and min-max regret versions of some combinatorial optimization problems Approximation of min-max and min-max regret versions of some combinatorial optimization problems Hassene Aissi Cristina Bazgan Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {aissi,bazgan,vdp}@lamsade.dauphine.fr

More information

Robust Combinatorial Optimization under Convex and Discrete Cost Uncertainty

Robust Combinatorial Optimization under Convex and Discrete Cost Uncertainty EURO Journal on Computational Optimization manuscript No. (will be inserted by the editor) Robust Combinatorial Optimization under Convex and Discrete Cost Uncertainty Christoph Buchheim Jannis Kurtz Received:

More information

On decomposing graphs of large minimum degree into locally irregular subgraphs

On decomposing graphs of large minimum degree into locally irregular subgraphs On decomposing graphs of large minimum degree into locally irregular subgraphs Jakub Przyby lo AGH University of Science and Technology al. A. Mickiewicza 0 0-059 Krakow, Poland jakubprz@agh.edu.pl Submitted:

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information

Alternating paths revisited II: restricted b-matchings in bipartite graphs

Alternating paths revisited II: restricted b-matchings in bipartite graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-2005-13. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

New Integer Programming Formulations of the Generalized Travelling Salesman Problem

New Integer Programming Formulations of the Generalized Travelling Salesman Problem American Journal of Applied Sciences 4 (11): 932-937, 2007 ISSN 1546-9239 2007 Science Publications New Integer Programming Formulations of the Generalized Travelling Salesman Problem Petrica C. Pop Department

More information

A simple LP relaxation for the Asymmetric Traveling Salesman Problem

A simple LP relaxation for the Asymmetric Traveling Salesman Problem A simple LP relaxation for the Asymmetric Traveling Salesman Problem Thành Nguyen Cornell University, Center for Applies Mathematics 657 Rhodes Hall, Ithaca, NY, 14853,USA thanh@cs.cornell.edu Abstract.

More information

A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights

A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights 1 Xiang Zhang, 2 Qina Wang, 3 Jian Zhou* 1, First Author School of Management, Shanghai University,

More information

Network Design and Game Theory Spring 2008 Lecture 6

Network Design and Game Theory Spring 2008 Lecture 6 Network Design and Game Theory Spring 2008 Lecture 6 Guest Lecturer: Aaron Archer Instructor: Mohammad T. Hajiaghayi Scribe: Fengming Wang March 3, 2008 1 Overview We study the Primal-dual, Lagrangian

More information

Distributionally Robust Discrete Optimization with Entropic Value-at-Risk

Distributionally Robust Discrete Optimization with Entropic Value-at-Risk Distributionally Robust Discrete Optimization with Entropic Value-at-Risk Daniel Zhuoyu Long Department of SEEM, The Chinese University of Hong Kong, zylong@se.cuhk.edu.hk Jin Qi NUS Business School, National

More information

1 Some loose ends from last time

1 Some loose ends from last time Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Kruskal s and Borůvka s MST algorithms September 20, 2010 1 Some loose ends from last time 1.1 A lemma concerning greedy algorithms and

More information

Advanced Combinatorial Optimization September 24, Lecture 5

Advanced Combinatorial Optimization September 24, Lecture 5 18.438 Advanced Combinatorial Optimization September 24, 2009 Lecturer: Michel X. Goemans Lecture 5 Scribe: Yehua Wei In this lecture, we establish the connection between nowhere-zero (nwz) k-flow and

More information

Lecture 15 (Oct 6): LP Duality

Lecture 15 (Oct 6): LP Duality CMPUT 675: Approximation Algorithms Fall 2014 Lecturer: Zachary Friggstad Lecture 15 (Oct 6): LP Duality Scribe: Zachary Friggstad 15.1 Introduction by Example Given a linear program and a feasible solution

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization Problem set 8: solutions 1. Fix constants a R and b > 1. For n N, let f(n) = n a and g(n) = b n. Prove that f(n) = o ( g(n) ). Solution. First we observe that g(n) 0 for all

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Constructive proof of deficiency theorem of (g, f)-factor

Constructive proof of deficiency theorem of (g, f)-factor SCIENCE CHINA Mathematics. ARTICLES. doi: 10.1007/s11425-010-0079-6 Constructive proof of deficiency theorem of (g, f)-factor LU HongLiang 1, & YU QingLin 2 1 Center for Combinatorics, LPMC, Nankai University,

More information

Multi-criteria approximation schemes for the resource constrained shortest path problem

Multi-criteria approximation schemes for the resource constrained shortest path problem Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract

More information

5 Flows and cuts in digraphs

5 Flows and cuts in digraphs 5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices

More information

An Efficient Algorithm for Computing Robust Minimum Capacity s-t Cuts

An Efficient Algorithm for Computing Robust Minimum Capacity s-t Cuts An Efficient Algorithm for Computing Robust Minimum Capacity s-t Cuts Doug Altner H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology 765 Ferst Drive NW, Atlanta,

More information

Vertex-Coloring Edge-Weighting of Bipartite Graphs with Two Edge Weights

Vertex-Coloring Edge-Weighting of Bipartite Graphs with Two Edge Weights Discrete Mathematics and Theoretical Computer Science DMTCS vol. 17:3, 2015, 1 12 Vertex-Coloring Edge-Weighting of Bipartite Graphs with Two Edge Weights Hongliang Lu School of Mathematics and Statistics,

More information

CO 250 Final Exam Guide

CO 250 Final Exam Guide Spring 2017 CO 250 Final Exam Guide TABLE OF CONTENTS richardwu.ca CO 250 Final Exam Guide Introduction to Optimization Kanstantsin Pashkovich Spring 2017 University of Waterloo Last Revision: March 4,

More information

Strongly Polynomial Algorithm for a Class of Minimum-Cost Flow Problems with Separable Convex Objectives

Strongly Polynomial Algorithm for a Class of Minimum-Cost Flow Problems with Separable Convex Objectives Strongly Polynomial Algorithm for a Class of Minimum-Cost Flow Problems with Separable Convex Objectives László A. Végh April 12, 2013 Abstract A well-studied nonlinear extension of the minimum-cost flow

More information

6.046 Recitation 11 Handout

6.046 Recitation 11 Handout 6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints

More information

15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu)

15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu) 15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu) First show l = c by proving l c and c l. For a maximum matching M in G, let V be the set of vertices covered by M. Since any vertex in

More information

arxiv: v1 [cs.dm] 26 Apr 2010

arxiv: v1 [cs.dm] 26 Apr 2010 A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs George B. Mertzios Derek G. Corneil arxiv:1004.4560v1 [cs.dm] 26 Apr 2010 Abstract Given a graph G, the longest path

More information

Lecture 11 October 7, 2013

Lecture 11 October 7, 2013 CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover

More information

The Steiner Network Problem

The Steiner Network Problem The Steiner Network Problem Pekka Orponen T-79.7001 Postgraduate Course on Theoretical Computer Science 7.4.2008 Outline 1. The Steiner Network Problem Linear programming formulation LP relaxation 2. The

More information

Integer Programming ISE 418. Lecture 8. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 8. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 8 Dr. Ted Ralphs ISE 418 Lecture 8 1 Reading for This Lecture Wolsey Chapter 2 Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Duality for Mixed-Integer

More information

Week Cuts, Branch & Bound, and Lagrangean Relaxation

Week Cuts, Branch & Bound, and Lagrangean Relaxation Week 11 1 Integer Linear Programming This week we will discuss solution methods for solving integer linear programming problems. I will skip the part on complexity theory, Section 11.8, although this is

More information

Recall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching

Recall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching Recall: Matchings A matching is a set of (non-loop) edges with no shared endpoints. The vertices incident to an edge of a matching M are saturated by M, the others are unsaturated. A perfect matching of

More information

Approximating minimum cost connectivity problems

Approximating minimum cost connectivity problems Approximating minimum cost connectivity problems Guy Kortsarz Zeev Nutov Rutgers University, Camden The Open University of Israel guyk@camden.rutgers.edu nutov@openu.ac.il 1 Introduction We survey approximation

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Delay-Robust Event-Scheduling In Memoriam of A. Caprara

Delay-Robust Event-Scheduling In Memoriam of A. Caprara Delay-Robust Event-Scheduling In Memoriam of A. Caprara A. Caprara 1 L. Galli 2 S. Stiller 3 P. Toth 1 1 University of Bologna 2 University of Pisa 3 Technische Universität Berlin 17th Combinatorial Optimization

More information

arxiv: v1 [math.co] 4 Jan 2018

arxiv: v1 [math.co] 4 Jan 2018 A family of multigraphs with large palette index arxiv:80.0336v [math.co] 4 Jan 208 M.Avesani, A.Bonisoli, G.Mazzuoccolo July 22, 208 Abstract Given a proper edge-coloring of a loopless multigraph, the

More information