An FPTAS for a Vector Subset Search Problem

Size: px
Start display at page:

Download "An FPTAS for a Vector Subset Search Problem"

Transcription

1 ISSN , Journal of Applied and Industrial Mathematics, 2014, Vol. 8, No. 3, pp c Pleiades Publishing, Ltd., Original Russian Text c A.V. Kel manov, S.M. Romanchenko, 2014, published in Diskretnyi Analiz i Issledovanie Operatsii, 2014, Vol. 21, No. 3, pp An FPTAS for a Vector Subset Search Problem A. V. Kel manov 1, 2* and S.M.Romanchenko 1** 1 Sobolev Institute of Mathematics, pr. Akad. Koptyuga 4, Novosibirsk, Russia 2 Novosibirsk State University, ul. Pirogova 2, Novosibirsk, Russia Received November 11, 2013; in final form, January 29, 2014 Abstract Under study is a strongly NP-hard problem of finding a subset of a given size of a finite set of vectors in Euclidean space which minimizes the sum of squared distances from the elements of this subset to its center. The center of the subset is defined as the average vector calculated with all subset elements. It is proved that, unless P=NP, in the general case of the problem there is no fully polynomial time approximation scheme (FPTAS). Such a scheme is provided in the case when the dimension of the space is fixed. DOI: /S Keywords: finding a vector subset, Euclidean space, minimum of the sum of squared distances, NP-hardness, fully polynomial time approximation scheme INTRODUCTION The subject of this article is an intractable optimization problem that is induced, in particular, by an actual problem of data classification. The goal of our study is a justification of an approximation polynomial algorithm for solving the problem. The problem is close in the statement to the classical [6, 9, 11] NP-hard [5] Problem MSSC (Minimum Sum-of-Squares Clustering) of data analysis. Recall that in Problem MSSC we need to find a partition of a given set of vectors in Euclidean space into a family of nonempty subsets, called clusters, so that to minimize the sum over all clusters of the sums of squared distances of all cluster elements to its center. The center of each cluster is defined by the average vector calculated with all cluster elements. Problem MSSC models (for instance, see [6, 8, 9]) the substantial problem of splitting a table with the results of multiple measurements of a set of numerical characteristics of several objects into nonempty subsets that contain the results of measurements of each of the objects and estimate the characteristics of these objects under condition that the correspondence between the object and the result of the measurement is not available, while each measurement is done with a certain error. In the problem under consideration we need to find only one subset of a given size in a finite set of vectors in Euclidean space so that the sum of the squared distances from the elements of the subset to its center is minimized. This problem models (for example, see [1, 2]) a substantial problem simpler than the above-stated. We assume that the table contains measurement results of the characteristics of only one important object (e.g., the subject of the study). Also, this table includes the measurements of some other (irrelevant or random) objects. Moreover, only the characteristics of the single object has an informational value, although it is unknown which measurement results correspond exactly to this object, and the measurement error is present. The formal statement of the problem and some related results are given in Section 1. Here note only that, despite the simplicity of the statement, this problem is strongly NP-hard [1]. Therefore, it is known [7] for this problem (unless P=NP) that there exists neither polynomial nor pseudopolynomial exact algorithm. Finally, unless P=NP, in the general case of this problem there does not exist a fully polynomial time approximation scheme (FPTAS) (see Section 2). Hence, it seems important to find some subclasses and particular cases of this problem for which an FPTAS exists. For one of these cases (when the space dimension is fixed), an FPTAS is provided below. * kelm@math.nsc.ru ** rsm@math.nsc.ru 329

2 330 KEL MANOV, ROMANCHENKO 1. STATEMENT OF THE PROBLEM AND AVAILABLE RESULTS The substantial problem of the introduction can formally be stated as follows [1, 2]: Problem VS-2 (Vector Subset 2). Given are some set Y = {y 1,...,y N } of vectors from R q and a positive integer M>1. Find C Yof size M such that F (C) = y C y y(c) 2 min, (1) where y(c) =1/ C y C y is the center of C. The number 2 in the name of the problem (VS-2) stands for its sequence number in the list [1] of the polynomially equivalent NP-hard problems that are induced by the same substantial problem. As it is known in the problems of statistics, if the elements of some nonempty set Z R q are sampling random numbers then z = 1 Z z, 1 Z 1 F (Z) are nonbiased sampling estimations of the expectation and variance correspondingly. In the deterministic statements of the problems, these quantities define the average value on the set and the variation of the elements with respect to the average. The less the variation of the elements in the set, the more compact they are. Simultaneous search for the most compact subset of elements and calculation of the average of the elements of this subset are the essence of Problem VS-2 in the deterministic case. If the elements of Y are treated as random numbers then Problem VS-2 can be interpreted as the simultaneous extraction from the littered sampling Y a subset C of the elements that correspond to the sampling data (from a certain distribution) with the minimal variance and estimation of the expectation of this distribution by the subset of selected data. Let us recall the available algorithmic results. In [2] for the general case of Problem VS-2, the 2- approximation polynomial algorithm was proposed with time complexity O(qN 2 ). The polynomial time approximation scheme (PTAS) was proposed in [4] that allows us to find an approximate solution with relative error >0in O(qN 2/+1 (9/) 3/ ) time. As stated in the introduction, in the general case of Problem VS-2 there does not exist (unless P=NP) any exact polynomial or pseudopolynomial algorithm. Moreover, in the case when the size M of the subset being found is not a part of the input (i.e., it is fixed), the problem is solvable in polynomial time. Indeed, in order to find an exact solution, it suffices to calculate in O(qM) time the value of the function (1) for each feasible subset of size M of Y and choose the minimum among the O(N M ) values that are found. Further, an introduction of the additional constraints on the problem input data allows us to construct an exact pseudopolynomial algorithm [3] in the case when the space dimension q is fixed and the components of the vectors in the input set are integer. The time complexity of this algorithm is O(qN(2MB +1) q ),whereb is the maximal absolute value of the vector coordinates in the input set. The algorithm proposed in this paper for the fixed space dimension q allows us to find a (1 + )- approximate solution for given (0, 1) in O(N 2 (M/) q ) time. Taking it into account that M N, this algorithm obviously provides an FPTAS. 2. GEOMETRIC FOUNDATIONS OF THE ALGORITHM First, let us show that there is no a fully polynomial time approximation scheme in the general case of Problem VS-2 under the assumption that P NP. Theorem 1. If P NP then there does not exist any FPTAS for Problem VS-2.

3 AN FPTAS FOR A VECTOR SUBSET SEARCH PROBLEM 331 Proof. In [1], it is shown that Problem VS-3 with integer inputs is strongly NP-hard. VS-3 is a problem of finding in the finite set Y of vectors from R q some subset C that minimizes the function H(C) = x y 2 x C y C with the same constraint on the size of C as in Problem VS-2. Furthermore, in [1], the strongly NP-hard problem [10] of finding a clique of a givensize ina regular graph is reduced to Problem VS-3 with binary vectors. Therefore, Problem VS-3 is strongly NP-hard in the case of integer input data. It is easy that, for the integer input data, the value of H(C) is always integer and bounded by the polynomial of the maximal value of components of the input vectors. By [7], this implies that Problem VS-3 does not admit any FPTAS unless P=NP. Recall [1] that the objective functions of Problems VS-2 and VS-3 satisfy the equality H(C) =2MF(C). Suppose now that there exists some FPTAS for Problem VS-2 with an algorithmic solution C A.Then, by the definition of FPTAS, the following holds: F (C A ) (1 + )F (C ), where C is an optimal solution of the problem. This implies H(C A )=2MF(C A ) (1 + )2MF(C )=(1+)H(C ), which contradicts the inexistence of an FPTAS for Problem VS-3. The proof of Theorem 1 is complete. To justify the algorithm let us prove several auxiliary statements. Lemma 1. Given an arbitrary vector x R q and a finite set Z R q,wehave z x 2 = z z 2 + Z x z 2, (2) where z = 1 z Z is the center of Z. Proof. Summing up the obvious identities z x 2 = z z + z x 2 = z z 2 +2 z z,z x + z x 2, where, is the inner product of vectors, we obtain z x 2 = z z 2 +2 z z,z x + Z z x 2. (3) If suffices to note that the sum of the inner products on the right-hand side of (3) equals zero since (z z) =0. The proof of Lemma 1 is complete.

4 332 KEL MANOV, ROMANCHENKO Given a nonempty finite set Z of vectors from R q,put D(Z) = max x y, x,y Z R(Z) =max z z, where z is the center of Z, while D(Z) is the diameter of Z, andr(z) is the maximal distance of the elements of this set to its center. Some relation between D(Z) and R(Z) is given by Lemma 2. Let Z R q be a nonempty finite set of vectors. Then 1 D(Z) R(Z) D(Z). 2 Proof. The triangle inequality for arbitrary x, y Zand z implies the upper bound x y x z + y z 2max z z =2R(Z). Since this holds for arbitrary x, y Z; therefore, D(Z) = max x y 2R(Z), x,y Z which gives the lower bound for R(Z). Suppose that x Zunder conditions of Lemma 1. Then (2) implies ( z x 2 x z 2 ) 0. z z 2 = z x 2 Z x z 2 = Therefore, at least one of the summands in brackets is nonnegative. Hence, for every x Z, there exists z x Zsuch that x z x z x D(Z). Since this inequality holds for an arbitrary x Z, we have the upper bound The proof of Lemma 2 is complete. max x z = R(Z) D(Z). x Z Given a finite set Z of vectors R q,anaturalm Z, and an arbitrary vector x R q,define the set Z M (x, Z) ={z i z i x z j x ; z i,z j Z,j>M} (4) that consists of M elements of Z closest (by distance) to x and define the maximal distance r M (x, Z) = from x to the vectors from Z M (x, Z). From (4) and (5) it is immediate that we have max z x (5) M (x,z) Lemma 3. Let Z be a finite set of vectors from R q, and let X be a subset of size M of Z. Then (i) for every vector x R q, z x 2 z x 2 ; M (x,z) z X (ii) for every z X, r M (z,z) D(X ). (6) Let us justify the approach for obtaining an approximate solution of Problem VS-2. Definition (4) implies that Z M (x, Y) Y is a feasible solution of VS-2 for every x R q. By Lemmas 1 3, we can state an important property of this subset:

5 AN FPTAS FOR A VECTOR SUBSET SEARCH PROBLEM 333 Lemma 4. Let C be an optimal solution of Problem VS-2, let y(c )= 1 M y C y be the center of C, and let Z M (x, Y) be a feasible solution of Problem VS-2 generated by some x R q.then F (Z M (x, Y)) F (C )+M x y(c ) 2. (7) Proof. Denote the center of the feasible solution of Problem VS 2 by y(z M (x, Y)) = 1 y. M y Z M (x,y) By (1) and (4), we have the following chain of equalities and inequalities: F (Z M (x, Y)) = y y(z M (x, Y)) 2 y x 2 y Z M (x,y) y Z M (x,y) y C y x 2 = y C y y(c ) 2 + M x y(c ) 2 = F (C )+M x y(c ) 2. In this chain the first inequality and last but one equality follow from Lemma 1; while the second inequality, from Lemma 3. The proof is over. Lemma 4 shows that the quality of the feasible solution Z M (x, Y) obtained by some vector x R q can be estimated by the distance from this vector to the center y(c ) of the optimal solution. The closer x to y(c ), the better is solution Z M (x, Y). The essence of the above approach consists in constructing the multidimensional grid whose nodes contain a vector close to the center of the optimal cluster. The sufficient condition forthe meshsize of the grid is provided by Lemma 5. Assume that the conditions of Lemma 4 hold, x R q,andy C.Thenifx satisfies x y(c ) 2 4M r2 M(y,Y) then, for fixed >0, thesetz M (x, Y) is an (1 + )-approximate solution of Problem VS-2. Proof. Lemma 2 for C implies 1 4 D2 (C ) R 2 (C )=max u C u y(c ) 2 u C u y(c ) 2 = F (C ). (8) Furthermore, from (6) for x, C,andY we have Combining (8) and (9), note that x y(c ) 2 Applying (10) to the right-hand side of (7), see that 4M r2 M(y,Y) 4M D2 (C ). (9) M x y(c ) 2 F (C ). (10) F (Z M (x, Y)) (1 + )F (C ). Hence, Z M (x, Y) is a (1 + )-approximate solution of Problem VS-2, which completes the proof of Lemma 5.

6 334 KEL MANOV, ROMANCHENKO Some property of the vectors from an optimal solution is stated by Lemma 6. Assume that the conditions of Lemma 4 hold. Then, for every y C, y y(c ) 2 MrM(y,Y). 2 (11) Proof. From the optimality of C it follows that y y(c ) 2 x y(c ) 2 = F (C ) F (Z M (y,y)). (12) x C On the other hand, by the definitions (4) and (5) of Z M (y,y) and r M (y,y), the following chain of inequalities holds: F (Z M (y,y)) x y 2 MrM 2 (y,y). (13) x Z M (y,y) Combining (12) and (13), we obtain the claim of the lemma. Actually, Lemma 5 defines the area (a ball with center y(c )) such that every element of this area allows us to obtain an approximate solution with given performance guarantee. Moreover, Lemma 6 defines the area of search which contains an unknown center of an optimal solution. 3. AN ALGORITHM FOR SOLVING THE PROBLEM Given an arbitrary y Yand positive h and H, define the vector set B(y,h,H) ={b b = y + h(j 1,...,j q ),j i Z, h j i H, i =1,...,q}. (14) The elements of this set correspond to the nodes of the uniform grid with the center y and the meshsize h. The parameter H defines the geometric sizes of the grid. The number of points of the grid at each coordinate evidently does not exceed H H h h +1 and is independent of y. Remark 1. For each x R q such that y x H,wherey is the center of B(y,h,H), the distance from x to the closest node of B(y,h,H) does not exceed qh/2 since, for each of the q coordinates, this distance obviously does not exceed h/2. Given arbitrary >0 and y Y,put h = qm r M (y,y), (15) H = Mr M (y,y), (16) where r M (y,y) is defined by (5). Let us construct some algorithm for solving the problem that bases on the search for the vector close to the center of an optimal solution. Algorithm A. Input. Some set Y and numbers M and. For each y Y, perform Steps 1 4. Step 1. Calculate r M (y,y), h, andh by (5), (15), and (16) correspondingly. Step 2. If r M (y,y) =0then construct Z M (y,y) by (4) and declare it as the result of the algorithm. Otherwise go to Step 3. Step 3. Construct B(y,h,H) according to (14).

7 AN FPTAS FOR A VECTOR SUBSET SEARCH PROBLEM 335 Step 4. For each b B(y,h,H), constructz M (b, Y) by (4) and calculate F (Z M (b, Y)). Step 5. The result of the algorithm is Z M (b, Y) for which the value of the goal function F (Z M (b, Y)) is minimal. Output. Theorem 2. Given >0, Algorithm A finds a (1 + )-approximate solution of Problem VS-2 in time O(qN 2 (2 qm/ +1) q ). Proof. By the description of the algorithm, there can be two cases at Step 2. In the case of r M (y,y) =0, Lemma 5 implies y y(c ) =0, which, together with Lemma 4, prove the optimality of Z M (y,y). Consider the case r M (y,y) > 0. It is obvious that, while executing the algorithm, each of the vectors y C will be chosen. By Lemma 6, (11) holds for all y C. Then (11) and (16) imply y y(c ) H; i.e., the center of the optimal cluster lies in the area of the grid B(y,h,H). Consider the vector b =arg min b b B(y,h,H) y(c ) closest to the center of C. By Remark 1, from (15) we have b y(c ) 2 qh2 4 = 4M r2 M (y,y). Thus, b satisfies the conditions of Lemma 5; hence, Z M (b, Y) is a (1 + )-approximate solution of Problem VS-2. Let us estimate the time complexity of the algorithm. At Steps 1 and 2, to calculate r M (y,y) and construct Z M (y,y) it suffices to find M vectors from Y closest to y. It can be done with O(N) operations on vectors of dimensionq; i.e., witho(qn) elementary operations [12]. The time of construction of B(y,h,H) at Step 3 is determined by its size. From (15) and (16) it follows that B(y,h,H) (2H/h +1) q =(2 qm/ +1) q. Thus, Step 3 requires O(q(2 qm/ +1) q ) elementary operations. At Step 4, for each vector from B, there are calculated M nearest elements from Y. These calculations require at most O(qN) elementary operations for each vector from B and O(qN(2 qm/ +1) q ) operations for allvectors from B [12]. Therefore, the total complexity of Steps 1 4 for each y Y equals O ( qn(2 qm/ +1) q). Steps 1 4 are executed for each y Y; i.e., N times in total. This implies the final estimation for the algorithm time complexity. The proof of Theorem 2 is complete. Let us show that, for a fixed dimension q, the proposed algorithm provides an FPTAS. Indeed, if (0, 1) then for one of the multipliers in the algorithm time complexity estimation we have ( 2 qm q ( +1) = 2 ( M q + 1 )) q 2 (2 ( ) M q q) q q +1 (2 ( ) M q ( ) M q q) q 2 q =2 2q q q/2 = O((M/) q ) since M/ +1 2M/. This implies that, under the above-stated conditions, the time complexity of Algorithm A equals O(N 2 (M/) q ).SinceM N, the time complexity of Algorithm A is bounded with the polynomial of the problem input size and 1/. This means that the algorithm provides an FPTAS [7].

8 336 KEL MANOV, ROMANCHENKO CONCLUSION Some FPTASis provided in thespecial case ofthe strongly NP-hard problem of finding in a finite set of vectors in Euclidean space a subset of a given size which minimizes the sum of the squared distances from the elements of the subset to its geometric center. The case of fixed space dimension is actual for applications. It is shown that, in the general case of this problem no FPTAS can be constructed unless P=NP. An important direction for further research is the justification of the randomized algorithm in the general case of this problem. ACKNOWLEDGMENTS The authors were supported by the Russian Foundation for Basic Research (projects nos and ) and the Target Program of the Siberian Division of the Russian Academy of Sciences (Integration project no. 7B). REFERENCES 1. A. V. Kel manov and A. V. Pyatkin, NP-Completeness of Some Problems of Choosing a Vector Subset, Diskretn. Anal. Issled. Oper. 17 (5), (2010) [J. Appl. Indust. Math. 5 (3), (2011)]. 2. A. V. Kel manov and S. M. Romanchenko, An Approximation Algorithm for Solving a Problem of Search for a Vector Subset, Diskretn. Anal. Issled. Oper. 18 (1), (2011) [J. Appl. Indust. Math. 6 (1), (2012)]. 3. A. V. Kel manov and S. M. Romanchenko, Pseudopolynomial Algorithms for Certain Computationally Hard Vector Subset and Cluster Analysis Problems, Avtomat. i Telemekh. No 2, (2012) [Automat. Remote Control 73 2), (2012)]. 4. V. V. Shenmaier, An Approximation Scheme for a Problem of Search for a Vector Subset, Diskretn. Anal. Issled. Oper. 19 (2), (2019) [J. Appl. Indust. Math. 6 (3), (2012)]. 5. D. Aloise, A. Deshpande, P. Hansen, and P. Popat, NP-Hardness of Euclidean Sum-of-Squares Clustering, Les Cahiers du GERAD, G (2008) [Machine Learning, 75 (2), (2009)]. 6. K. Anil and K. Jain, Data Clustering: 50 Years Beyond k-means, Pattern Recognit. Lett. 31, (2010). 7. M. R. Garey and D. S. Johnson, Computers and Intractability: a Guide to the Theory of NP- Completeness (Freeman, San Francisco, 1979). 8. T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction (Springer, New York, 2001). 9. J. B. MacQueen, Some Methods for Classification and Analysis of Multivariate Observations, in Proceedings of the 5th Berkeley Symposium on Mathematics, Statistics, and Probability (Berkeley, June 21 July 18, 1965; December 27, 1965 January 7, 1966), Vol. 1 (Univ. of California Press, Berkeley, 1967), pp C. H. Papadimitriou, Computational Complexity (Addison-Wesley, New York, 1994). 11. M. Rao, Cluster Analysis and Mathematical Programming, J. Amer. Stat. Assoc. 66, (1971). 12. H. Wirth, Algorithms + Data Structures = Programs (Prentice Hall, New Jersey, 1976).

On Some Euclidean Clustering Problems: NP-Hardness and Efficient Approximation Algorithms

On Some Euclidean Clustering Problems: NP-Hardness and Efficient Approximation Algorithms On Some Euclidean Clustering Problems: NP-Hardness and Efficient Approximation Algorithms Alexander Kel manov Sobolev Institute of Mathematics Acad. Koptyug avenue, 4, 630090 Novosibirsk, Russia Novosibirsk

More information

Algorithms with Performance Guarantee for Some Quadratic Euclidean Problems of 2-Partitioning a Set and a Sequence

Algorithms with Performance Guarantee for Some Quadratic Euclidean Problems of 2-Partitioning a Set and a Sequence Algorithms with Performance Guarantee for Some Quadratic Euclidean Problems of 2-Partitioning a Set and a Sequence Alexander Kel manov Sobolev Institute of Mathematics Acad. Koptyug avenue 4, Novosibirsk

More information

On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach

On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach On a Quadratic Euclidean Problem of Vector Subset Choice: Complexity and Algorithmic Approach Anton Eremeev,2, Alexander Kel manov,3, and Artem Pyatkin,3 Sobolev Institute of Mathematics, 4 Koptyug Ave.,

More information

On a Problem of Choosing Elements in a Family of Sequences

On a Problem of Choosing Elements in a Family of Sequences On a Problem of Choosing Elements in a Family of Sequences Alexander Kel manov 1,2, Ludmila Mikhailova 1, and Semyon Romanchenko 1 1 Sobolev Institute of Mathematics, 4 Koptyug Ave., 630090 Novosibirsk,

More information

NP-Completeness. f(n) \ n n sec sec sec. n sec 24.3 sec 5.2 mins. 2 n sec 17.9 mins 35.

NP-Completeness. f(n) \ n n sec sec sec. n sec 24.3 sec 5.2 mins. 2 n sec 17.9 mins 35. NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979. NP-Completeness 1 General Problems, Input Size and

More information

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden November 5, 2014 1 Preamble Previous lectures on smoothed analysis sought a better

More information

A note on proving the strong NP-hardness of some scheduling problems with start time dependent job processing times

A note on proving the strong NP-hardness of some scheduling problems with start time dependent job processing times Optim Lett (2012) 6:1021 1025 DOI 10.1007/s11590-011-0330-2 SHORT COMMUNICATION A note on proving the strong NP-hardness of some scheduling problems with start time dependent job processing times Radosław

More information

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden March 9, 2017 1 Preamble Our first lecture on smoothed analysis sought a better theoretical

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should

More information

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. 35, No., May 010, pp. 84 305 issn 0364-765X eissn 156-5471 10 350 084 informs doi 10.187/moor.1090.0440 010 INFORMS On the Power of Robust Solutions in Two-Stage

More information

Gearing optimization

Gearing optimization Gearing optimization V.V. Lozin Abstract We consider an optimization problem that arises in machine-tool design. It deals with optimization of the structure of gearbox, which is normally represented by

More information

MATH 31BH Homework 1 Solutions

MATH 31BH Homework 1 Solutions MATH 3BH Homework Solutions January 0, 04 Problem.5. (a) (x, y)-plane in R 3 is closed and not open. To see that this plane is not open, notice that any ball around the origin (0, 0, 0) will contain points

More information

Approximation Basics

Approximation Basics Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

NP-Completeness. NP-Completeness 1

NP-Completeness. NP-Completeness 1 NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979. NP-Completeness 1 General Problems, Input Size and

More information

University of Twente. Faculty of Mathematical Sciences. Scheduling split-jobs on parallel machines. University for Technical and Social Sciences

University of Twente. Faculty of Mathematical Sciences. Scheduling split-jobs on parallel machines. University for Technical and Social Sciences Faculty of Mathematical Sciences University of Twente University for Technical and Social Sciences P.O. Box 217 7500 AE Enschede The Netherlands Phone: +31-53-4893400 Fax: +31-53-4893114 Email: memo@math.utwente.nl

More information

8 Knapsack Problem 8.1 (Knapsack)

8 Knapsack Problem 8.1 (Knapsack) 8 Knapsack In Chapter 1 we mentioned that some NP-hard optimization problems allow approximability to any required degree. In this chapter, we will formalize this notion and will show that the knapsack

More information

Average degrees of edge-chromatic critical graphs

Average degrees of edge-chromatic critical graphs Average degrees of edge-chromatic critical graphs Yan Cao a,guantao Chen a, Suyun Jiang b,c, Huiqing Liu d, Fuliang Lu e a Department of Mathematics and Statistics, Georgia State University, Atlanta, GA

More information

K-center Hardness and Max-Coverage (Greedy)

K-center Hardness and Max-Coverage (Greedy) IOE 691: Approximation Algorithms Date: 01/11/2017 Lecture Notes: -center Hardness and Max-Coverage (Greedy) Instructor: Viswanath Nagarajan Scribe: Sentao Miao 1 Overview In this lecture, we will talk

More information

This means that we can assume each list ) is

This means that we can assume each list ) is This means that we can assume each list ) is of the form ),, ( )with < and Since the sizes of the items are integers, there are at most +1pairs in each list Furthermore, if we let = be the maximum possible

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 P and NP P: The family of problems that can be solved quickly in polynomial time.

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 411 (010) 417 44 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: wwwelseviercom/locate/tcs Resource allocation with time intervals

More information

Homework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4

Homework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4 Do the following exercises from the text: Chapter (Section 3):, 1, 17(a)-(b), 3 Prove that 1 3 + 3 + + n 3 n (n + 1) for all n N Proof The proof is by induction on n For n N, let S(n) be the statement

More information

A Generalization of Bernoulli's Inequality

A Generalization of Bernoulli's Inequality Florida International University FIU Digital Commons Department of Mathematics and Statistics College of Arts, Sciences & Education 200 A Generalization of Bernoulli's Inequality Laura De Carli Department

More information

Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard

Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard Journal of Uncertain Systems Vol.9, No.2, pp.124-132, 2015 Online at: www.jus.org.uk Computing Standard-Deviation-to-Mean and Variance-to-Mean Ratios under Interval Uncertainty is NP-Hard Sio-Long Lo Faculty

More information

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru

More information

Differential approximation results for the Steiner tree problem

Differential approximation results for the Steiner tree problem Differential approximation results for the Steiner tree problem Marc Demange, Jérôme Monnot, Vangelis Paschos To cite this version: Marc Demange, Jérôme Monnot, Vangelis Paschos. Differential approximation

More information

EVALUATING MISCLASSIFICATION PROBABILITY USING EMPIRICAL RISK 1. Victor Nedel ko

EVALUATING MISCLASSIFICATION PROBABILITY USING EMPIRICAL RISK 1. Victor Nedel ko 94 International Journal "Information Theories & Applications" Vol13 [Raudys, 001] Raudys S, Statistical and neural classifiers, Springer, 001 [Mirenkova, 00] S V Mirenkova (edel ko) A method for prediction

More information

On Machine Dependency in Shop Scheduling

On Machine Dependency in Shop Scheduling On Machine Dependency in Shop Scheduling Evgeny Shchepin Nodari Vakhania Abstract One of the main restrictions in scheduling problems are the machine (resource) restrictions: each machine can perform at

More information

Computability and Complexity Theory

Computability and Complexity Theory Discrete Math for Bioinformatics WS 09/10:, by A Bockmayr/K Reinert, January 27, 2010, 18:39 9001 Computability and Complexity Theory Computability and complexity Computability theory What problems can

More information

Chapter 2. Vectors and Vector Spaces

Chapter 2. Vectors and Vector Spaces 2.1. Operations on Vectors 1 Chapter 2. Vectors and Vector Spaces Section 2.1. Operations on Vectors Note. In this section, we define several arithmetic operations on vectors (especially, vector addition

More information

Computing the Norm A,1 is NP-Hard

Computing the Norm A,1 is NP-Hard Computing the Norm A,1 is NP-Hard Dedicated to Professor Svatopluk Poljak, in memoriam Jiří Rohn Abstract It is proved that computing the subordinate matrix norm A,1 is NP-hard. Even more, existence of

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Single Machine Scheduling with a Non-renewable Financial Resource

Single Machine Scheduling with a Non-renewable Financial Resource Single Machine Scheduling with a Non-renewable Financial Resource Evgeny R. Gafarov a, Alexander A. Lazarev b Institute of Control Sciences of the Russian Academy of Sciences, Profsoyuznaya st. 65, 117997

More information

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Gérard Cornuéjols 1 and Yanjun Li 2 1 Tepper School of Business, Carnegie Mellon

More information

On the Intractability of Computing the Duquenne-Guigues Base

On the Intractability of Computing the Duquenne-Guigues Base Journal of Universal Computer Science, vol 10, no 8 (2004), 927-933 submitted: 22/3/04, accepted: 28/6/04, appeared: 28/8/04 JUCS On the Intractability of Computing the Duquenne-Guigues Base Sergei O Kuznetsov

More information

Multi-criteria approximation schemes for the resource constrained shortest path problem

Multi-criteria approximation schemes for the resource constrained shortest path problem Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract

More information

Linear Complementarity as Absolute Value Equation Solution

Linear Complementarity as Absolute Value Equation Solution Linear Complementarity as Absolute Value Equation Solution Olvi L. Mangasarian Abstract We consider the linear complementarity problem (LCP): Mz + q 0, z 0, z (Mz + q) = 0 as an absolute value equation

More information

k-means Clustering via the Frank-Wolfe Algorithm

k-means Clustering via the Frank-Wolfe Algorithm k-means Clustering via the Frank-Wolfe Algorithm Christian Bauckhage B-IT, University of Bonn, Bonn, Germany Fraunhofer IAIS, Sankt Augustin, Germany http://multimedia-pattern-recognition.info Abstract.

More information

1 Introduction and Results

1 Introduction and Results Discussiones Mathematicae Graph Theory 20 (2000 ) 7 79 SOME NEWS ABOUT THE INDEPENDENCE NUMBER OF A GRAPH Jochen Harant Department of Mathematics, Technical University of Ilmenau D-98684 Ilmenau, Germany

More information

Matchings in hypergraphs of large minimum degree

Matchings in hypergraphs of large minimum degree Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains

More information

EXACT DOUBLE DOMINATION IN GRAPHS

EXACT DOUBLE DOMINATION IN GRAPHS Discussiones Mathematicae Graph Theory 25 (2005 ) 291 302 EXACT DOUBLE DOMINATION IN GRAPHS Mustapha Chellali Department of Mathematics, University of Blida B.P. 270, Blida, Algeria e-mail: mchellali@hotmail.com

More information

An Improved Algorithm for Parameterized Edge Dominating Set Problem

An Improved Algorithm for Parameterized Edge Dominating Set Problem An Improved Algorithm for Parameterized Edge Dominating Set Problem Ken Iwaide and Hiroshi Nagamochi Department of Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Japan,

More information

The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and Split Graphs

The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and Split Graphs Chiang Mai J. Sci. 2013; 40(1) 8 3 Chiang Mai J. Sci. 2013; 40(1) : 83-88 http://it.science.cmu.ac.th/ejournal/ Contributed Paper The NP-Hardness of the Connected p-median Problem on Bipartite Graphs and

More information

P versus NP. Math 40210, Fall November 10, Math (Fall 2015) P versus NP November 10, / 9

P versus NP. Math 40210, Fall November 10, Math (Fall 2015) P versus NP November 10, / 9 P versus NP Math 40210, Fall 2015 November 10, 2015 Math 40210 (Fall 2015) P versus NP November 10, 2015 1 / 9 Properties of graphs A property of a graph is anything that can be described without referring

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

The Maximum Flow Problem with Disjunctive Constraints

The Maximum Flow Problem with Disjunctive Constraints The Maximum Flow Problem with Disjunctive Constraints Ulrich Pferschy Joachim Schauer Abstract We study the maximum flow problem subject to binary disjunctive constraints in a directed graph: A negative

More information

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. xx, No. x, Xxxxxxx 00x, pp. xxx xxx ISSN 0364-765X EISSN 156-5471 0x xx0x 0xxx informs DOI 10.187/moor.xxxx.xxxx c 00x INFORMS On the Power of Robust Solutions in

More information

Analysis I (Math 121) First Midterm Correction

Analysis I (Math 121) First Midterm Correction Analysis I (Math 11) First Midterm Correction Fall 00 Ali Nesin November 9, 00 1. Which of the following are not vector spaces over R (with the componentwise addition and scalar multiplication) and why?

More information

An indicator for the number of clusters using a linear map to simplex structure

An indicator for the number of clusters using a linear map to simplex structure An indicator for the number of clusters using a linear map to simplex structure Marcus Weber, Wasinee Rungsarityotin, and Alexander Schliep Zuse Institute Berlin ZIB Takustraße 7, D-495 Berlin, Germany

More information

LOWER BOUNDS FOR THE UNCAPACITATED FACILITY LOCATION PROBLEM WITH USER PREFERENCES. 1 Introduction

LOWER BOUNDS FOR THE UNCAPACITATED FACILITY LOCATION PROBLEM WITH USER PREFERENCES. 1 Introduction LOWER BOUNDS FOR THE UNCAPACITATED FACILITY LOCATION PROBLEM WITH USER PREFERENCES PIERRE HANSEN, YURI KOCHETOV 2, NENAD MLADENOVIĆ,3 GERAD and Department of Quantitative Methods in Management, HEC Montréal,

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

Axioms for the Real Number System

Axioms for the Real Number System Axioms for the Real Number System Math 361 Fall 2003 Page 1 of 9 The Real Number System The real number system consists of four parts: 1. A set (R). We will call the elements of this set real numbers,

More information

Lecture Notes 1: Vector spaces

Lecture Notes 1: Vector spaces Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

An 0.5-Approximation Algorithm for MAX DICUT with Given Sizes of Parts

An 0.5-Approximation Algorithm for MAX DICUT with Given Sizes of Parts An 0.5-Approximation Algorithm for MAX DICUT with Given Sizes of Parts Alexander Ageev Refael Hassin Maxim Sviridenko Abstract Given a directed graph G and an edge weight function w : E(G) R +, themaximumdirectedcutproblem(max

More information

Approximating maximum satisfiable subsystems of linear equations of bounded width

Approximating maximum satisfiable subsystems of linear equations of bounded width Approximating maximum satisfiable subsystems of linear equations of bounded width Zeev Nutov The Open University of Israel Daniel Reichman The Open University of Israel Abstract We consider the problem

More information

Math 421, Homework #9 Solutions

Math 421, Homework #9 Solutions Math 41, Homework #9 Solutions (1) (a) A set E R n is said to be path connected if for any pair of points x E and y E there exists a continuous function γ : [0, 1] R n satisfying γ(0) = x, γ(1) = y, and

More information

A Note on the Density of the Multiple Subset Sum Problems

A Note on the Density of the Multiple Subset Sum Problems A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 11 Luca Trevisan February 29, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 11 Luca Trevisan February 29, 2016 U.C. Berkeley CS294: Spectral Methods and Expanders Handout Luca Trevisan February 29, 206 Lecture : ARV In which we introduce semi-definite programming and a semi-definite programming relaxation of sparsest

More information

Complexity analysis of job-shop scheduling with deteriorating jobs

Complexity analysis of job-shop scheduling with deteriorating jobs Discrete Applied Mathematics 117 (2002) 195 209 Complexity analysis of job-shop scheduling with deteriorating jobs Gur Mosheiov School of Business Administration and Department of Statistics, The Hebrew

More information

NP-hardness results for linear algebraic problems with interval data

NP-hardness results for linear algebraic problems with interval data 1 NP-hardness results for linear algebraic problems with interval data Dedicated to my father, Mr. Robert Rohn, in memoriam J. Rohn a a Faculty of Mathematics and Physics, Charles University, Malostranské

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 159 (2011) 1345 1351 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam On disconnected cuts and separators

More information

hal , version 1-27 Mar 2014

hal , version 1-27 Mar 2014 Author manuscript, published in "2nd Multidisciplinary International Conference on Scheduling : Theory and Applications (MISTA 2005), New York, NY. : United States (2005)" 2 More formally, we denote by

More information

Ch 3.2: Direct proofs

Ch 3.2: Direct proofs Math 299 Lectures 8 and 9: Chapter 3 0. Ch3.1 A trivial proof and a vacuous proof (Reading assignment) 1. Ch3.2 Direct proofs 2. Ch3.3 Proof by contrapositive 3. Ch3.4 Proof by cases 4. Ch3.5 Proof evaluations

More information

About the relationship between formal logic and complexity classes

About the relationship between formal logic and complexity classes About the relationship between formal logic and complexity classes Working paper Comments welcome; my email: armandobcm@yahoo.com Armando B. Matos October 20, 2013 1 Introduction We analyze a particular

More information

Facet-defining inequalities for the simple graph partitioning polytope

Facet-defining inequalities for the simple graph partitioning polytope Discrete Optimization 4 2007) 221 231 www.elsevier.com/locate/disopt Facet-defining inequalities for the simple graph partitioning polytope Michael M. Sørensen Aarhus School of Business, Department of

More information

Absolute value equations

Absolute value equations Linear Algebra and its Applications 419 (2006) 359 367 www.elsevier.com/locate/laa Absolute value equations O.L. Mangasarian, R.R. Meyer Computer Sciences Department, University of Wisconsin, 1210 West

More information

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof T-79.5103 / Autumn 2006 NP-complete problems 1 NP-COMPLETE PROBLEMS Characterizing NP Variants of satisfiability Graph-theoretic problems Coloring problems Sets and numbers Pseudopolynomial algorithms

More information

A polynomial-time approximation scheme for the two-machine flow shop scheduling problem with an availability constraint

A polynomial-time approximation scheme for the two-machine flow shop scheduling problem with an availability constraint A polynomial-time approximation scheme for the two-machine flow shop scheduling problem with an availability constraint Joachim Breit Department of Information and Technology Management, Saarland University,

More information

Lecture 4: An FPTAS for Knapsack, and K-Center

Lecture 4: An FPTAS for Knapsack, and K-Center Comp 260: Advanced Algorithms Tufts University, Spring 2016 Prof. Lenore Cowen Scribe: Eric Bailey Lecture 4: An FPTAS for Knapsack, and K-Center 1 Introduction Definition 1.0.1. The Knapsack problem (restated)

More information

Disjoint Hamiltonian Cycles in Bipartite Graphs

Disjoint Hamiltonian Cycles in Bipartite Graphs Disjoint Hamiltonian Cycles in Bipartite Graphs Michael Ferrara 1, Ronald Gould 1, Gerard Tansey 1 Thor Whalen Abstract Let G = (X, Y ) be a bipartite graph and define σ (G) = min{d(x) + d(y) : xy / E(G),

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

0, otherwise. Find each of the following limits, or explain that the limit does not exist.

0, otherwise. Find each of the following limits, or explain that the limit does not exist. Midterm Solutions 1, y x 4 1. Let f(x, y) = 1, y 0 0, otherwise. Find each of the following limits, or explain that the limit does not exist. (a) (b) (c) lim f(x, y) (x,y) (0,1) lim f(x, y) (x,y) (2,3)

More information

Design and Analysis of Algorithms Lecture Notes on Convex Optimization CS 6820, Fall Nov 2 Dec 2016

Design and Analysis of Algorithms Lecture Notes on Convex Optimization CS 6820, Fall Nov 2 Dec 2016 Design and Analysis of Algorithms Lecture Notes on Convex Optimization CS 6820, Fall 206 2 Nov 2 Dec 206 Let D be a convex subset of R n. A function f : D R is convex if it satisfies f(tx + ( t)y) tf(x)

More information

Math 361: Homework 1 Solutions

Math 361: Homework 1 Solutions January 3, 4 Math 36: Homework Solutions. We say that two norms and on a vector space V are equivalent or comparable if the topology they define on V are the same, i.e., for any sequence of vectors {x

More information

Show that the following problems are NP-complete

Show that the following problems are NP-complete Show that the following problems are NP-complete April 7, 2018 Below is a list of 30 exercises in which you are asked to prove that some problem is NP-complete. The goal is to better understand the theory

More information

Allocating Public Goods via the Midpoint Rule

Allocating Public Goods via the Midpoint Rule Allocating Public Goods via the Midpoint Rule Tobias Lindner Klaus Nehring Clemens Puppe Preliminary draft, February 2008 Abstract We study the properties of the following midpoint rule for determining

More information

Lecture Notes 4. Issued 8 March 2018

Lecture Notes 4. Issued 8 March 2018 CM30073 Advanced Algorithms and Complexity 1. Structure of the class NP Lecture Notes 4 Issued 8 March 2018 Recall that it is not known whether or not P = NP, the widely accepted hypothesis being that

More information

arxiv: v1 [cs.cg] 29 Jun 2012

arxiv: v1 [cs.cg] 29 Jun 2012 Single-Source Dilation-Bounded Minimum Spanning Trees Otfried Cheong Changryeol Lee May 2, 2014 arxiv:1206.6943v1 [cs.cg] 29 Jun 2012 Abstract Given a set S of points in the plane, a geometric network

More information

Fundamentals of optimization problems

Fundamentals of optimization problems Fundamentals of optimization problems Dmitriy Serdyuk Ferienakademie in Sarntal 2012 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2012 Overview 1 Introduction Optimization problems PO and

More information

Bin packing and scheduling

Bin packing and scheduling Sanders/van Stee: Approximations- und Online-Algorithmen 1 Bin packing and scheduling Overview Bin packing: problem definition Simple 2-approximation (Next Fit) Better than 3/2 is not possible Asymptotic

More information

MATH 51H Section 4. October 16, Recall what it means for a function between metric spaces to be continuous:

MATH 51H Section 4. October 16, Recall what it means for a function between metric spaces to be continuous: MATH 51H Section 4 October 16, 2015 1 Continuity Recall what it means for a function between metric spaces to be continuous: Definition. Let (X, d X ), (Y, d Y ) be metric spaces. A function f : X Y is

More information

Week Cuts, Branch & Bound, and Lagrangean Relaxation

Week Cuts, Branch & Bound, and Lagrangean Relaxation Week 11 1 Integer Linear Programming This week we will discuss solution methods for solving integer linear programming problems. I will skip the part on complexity theory, Section 11.8, although this is

More information

Algorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on

Algorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on 6117CIT - Adv Topics in Computing Sci at Nathan 1 Algorithms The intelligence behind the hardware Outline! Approximation Algorithms The class APX! Some complexity classes, like PTAS and FPTAS! Illustration

More information

Coloring Uniform Hypergraphs with Few Colors*

Coloring Uniform Hypergraphs with Few Colors* Coloring Uniform Hypergraphs with Few Colors* Alexandr Kostochka 1,2 1 University of Illinois at Urbana-Champaign, Urbana, Illinois 61801; e-mail: kostochk@mathuiucedu 2 Institute of Mathematics, Novosibirsk

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

Lexicographic Flow. Dexter Kozen Department of Computer Science Cornell University Ithaca, New York , USA. June 25, 2009

Lexicographic Flow. Dexter Kozen Department of Computer Science Cornell University Ithaca, New York , USA. June 25, 2009 Lexicographic Flow Dexter Kozen Department of Computer Science Cornell University Ithaca, New York 14853-7501, USA June 25, 2009 Abstract The lexicographic flow problem is a flow problem in which the edges

More information

COLORING CLEAN AND K 4 -FREE CIRCLE GRAPHS

COLORING CLEAN AND K 4 -FREE CIRCLE GRAPHS COLORING CLEAN AND K 4 -FREE CIRCLE GRAPHS ALEXANDR V. KOSTOCHKA AND KEVIN G. MILANS Abstract. A circle graph is the intersection graph of chords drawn in a circle. The best known general upper bound on

More information

Properties of the Integers

Properties of the Integers Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

a + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c.

a + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c. Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

IE418 Integer Programming

IE418 Integer Programming IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 23rd February 2005 The Ingredients Some Easy Problems The Hard Problems Computational Complexity The ingredients

More information

An Introduction to Complex Analysis and Geometry John P. D Angelo, Pure and Applied Undergraduate Texts Volume 12, American Mathematical Society, 2010

An Introduction to Complex Analysis and Geometry John P. D Angelo, Pure and Applied Undergraduate Texts Volume 12, American Mathematical Society, 2010 An Introduction to Complex Analysis and Geometry John P. D Angelo, Pure and Applied Undergraduate Texts Volume 12, American Mathematical Society, 2010 John P. D Angelo, Univ. of Illinois, Urbana IL 61801.

More information

Efficient approximation algorithms for the Subset-Sums Equality problem

Efficient approximation algorithms for the Subset-Sums Equality problem Efficient approximation algorithms for the Subset-Sums Equality problem Cristina Bazgan 1 Miklos Santha 2 Zsolt Tuza 3 1 Université Paris-Sud, LRI, bât.490, F 91405 Orsay, France, bazgan@lri.fr 2 CNRS,

More information

Report 1 The Axiom of Choice

Report 1 The Axiom of Choice Report 1 The Axiom of Choice By Li Yu This report is a collection of the material I presented in the first round presentation of the course MATH 2002. The report focuses on the principle of recursive definition,

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Discrete Applied Mathematics. Tighter bounds of the First Fit algorithm for the bin-packing problem

Discrete Applied Mathematics. Tighter bounds of the First Fit algorithm for the bin-packing problem Discrete Applied Mathematics 158 (010) 1668 1675 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Tighter bounds of the First Fit algorithm

More information

On disconnected cuts and separators

On disconnected cuts and separators On disconnected cuts and separators Takehiro Ito 1, Marcin Kamiński 2, Daniël Paulusma 3 and Dimitrios M. Thilikos 4 1 Graduate School of Information Sciences, Tohoku University, Aoba-yama 6-6-05, Sendai,

More information

Polynomial Time Algorithms for Minimum Energy Scheduling

Polynomial Time Algorithms for Minimum Energy Scheduling Polynomial Time Algorithms for Minimum Energy Scheduling Philippe Baptiste 1, Marek Chrobak 2, and Christoph Dürr 1 1 CNRS, LIX UMR 7161, Ecole Polytechnique 91128 Palaiseau, France. Supported by CNRS/NSF

More information

2 Notation and Preliminaries

2 Notation and Preliminaries On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that

More information