arxiv: v4 [cs.ds] 28 Feb 2016

Size: px
Start display at page:

Download "arxiv: v4 [cs.ds] 28 Feb 2016"

Transcription

1 A strongly polynomal algorthm for generalzed flow maxmzaton László A. Végh arxv: v4 [cs.ds] 28 Feb 2016 Department of Mathematcs London School of Economcs and Poltcal Scence Abstract A strongly polynomal algorthm s gven for the generalzed flow maxmzaton problem. It uses a new varant of the scalng technque, called contnuous scalng. The man measure of progress s that wthn a strongly polynomal number of steps, an arc can be dentfed that must be tght n every dual optmal soluton, and thus can be contracted. As a consequence of the result, we also obtan a strongly polynomal algorthm for the lnear feasblty problem wth at most two nonzero entres per column n the constrant matrx. 1 Introducton The generalzed flow model s a classcal extenson of network flows. Besdes the capacty constrants, for every arc e there s a gan factor γ e > 0, such that flow amount gets multpled by γ e whle traversng arc e. We study the flow maxmzaton problem, where the objectve s to send the maxmum amount of flow to a snk node t. The model was already formulated by Kantorovch [19], as one of the frst examples of Lnear Programmng; t has several applcatons n Operatons Research [2, Chapter 15]. Gan factors can be used to model physcal changes such as leakage or theft. Other common applcatons use the nodes to represent dfferent types of enttes, e.g. dfferent currences, and the gan factors correspond to the exchange rates. The exstence of a strongly polynomal algorthm for Lnear Programmng s a major open queston n the theory of computaton. Ths refers to an algorthm wth the number of arthmetc operatons polynomally bounded n the number of varables and constrants, and the sze of the numbers durng the computatons polynomally bounded n the nput sze. A landmark result by Tardos [30] s an algorthm wth the runnng tme dependent only on the sze of numbers n the constrant matrx, but ndependent from the rght-hand sde and the objectve vector. Ths gves strongly polynomal algorthms for several combnatoral problems such as mnmum cost flows (see also Tardos [29]) and multcommodty flows. Instead of boundng the szes of numbers, one mght mpose structural restrctons on the constrant matrx. A natural queston arses whether there exsts a strongly polynomal algorthm for lnear programs (LPs) wth at most two nonzero entres per column (that can be arbtrary numbers). Ths queston s stll open; as shown by Hochbaum [17], all such LPs can be effcently transformed to equvalent nstances of the mnmum cost generalzed flow problem. (Note also that every LP can be effcently transformed to an equvalent one wth at most three nonzero entres per column.) In 1983, Megddo [21] gave a strongly polynomal algorthm for solvng the dual feasblty problem for such LPs; he ntroduced the concept of strongly polynomal algorthms n the same paper. A corollary of our result s the frst strongly polynomal algorthm for the prmal feasblty problem. 1

2 Generalzed flow maxmzaton s probably the smplest natural class of LPs where no strongly polynomal algorthm was known. The exstence of such an algorthm has been a well-studed and longstandng open problem (see e.g. [9, 3, 35, 26, 28]). A strongly polynomal algorthm for a restrcted class was gven by Adler and Cosares [1]. In ths paper, we exhbt a strongly polynomal algorthm for generalzed flow maxmzaton. Let n denote the number of nodes and m the number of arcs n the network, and let B denote the largest nteger used n the descrpton of the nput (see Secton 2 for the precse problem defnton). A strongly polynomal algorthm for the problem entals the followng (see [16]): () t uses only elementary arthmetc operatons (addton, subtracton, multplcaton, dvson), and comparsons; () the number of these operatons s bounded by a polynomal of n and m; () all numbers occurrng n the computatons are ratonal numbers of encodng sze polynomally bounded n n, m and log B or equvalently, t s a polynomal space algorthm. Here, the encodng sze of a postve ratonal number p/q s defned as log 2 (p+1) + log 2 (q + 1). By the runnng tme of a strongly polynomal algorthm we mean the total number of elementary arthmetc operatons and comparsons. Combnatoral approaches have been appled to generalzed flows already n the sxtes by Dantzg [4] and Jewell [18]. However, the frst polynomal-tme combnatoral algorthm was only gven n 1991 by Goldberg, Plotkn and Tardos [9]. Ths was followed by a multtude of further combnatoral algorthms e.g. [3, 11, 13, 31, 6, 12, 14, 35, 26, 27, 34]; a central motvaton of ths lne of research was to develop a strongly polynomal algorthm. The algorthms of Cohen and Megddo [3], Wayne [35], and Restrepo and Wllamson [27] present fully polynomal tme approxmaton schemes, that s, for every ε > 0, they can fnd a soluton wthn ε from the optmum value n runnng tme polynomal n n, m and log(1/ε). Ths can be transformed to an optmal soluton for a suffcently small ε; however, ths value does depend on B and hence the overall runnng tme wll also depend on logb. The current most effcent weakly polynomal algorthms are the nteror pont approach of Kapoor an Vadya [20] wth runnng tme O(m 1.5 n 2 logb), and the combnatoral algorthm by Radzk [26] wth runnng tme Õ(m2 nlogb). 1 For a survey on combnatoral generalzed flow algorthms, see Shgeno [28]. The generalzed flow maxmzaton problem exhbts deep structural smlartes to the mnmum cost crculaton problem, as frst ponted out by Truemper [32]. Most combnatoral algorthms for generalzed flows, ncludng both algorthms by Goldberg et al. [9], explot ths analogy and adapt exstng effcent technques from mnmum cost crculatons. For the latter problem, several strongly polynomal algorthms are known, the frst one gven by Tardos [29]; others relevant to our dscusson are those by Goldberg and Tarjan [10], and by Orln [23]; see also [2, Chapters 9-11]. Whereas these algorthms serve as startng ponts for most generalzed flow algorthms, the applcablty of the technques s by no means obvous, and dfferent methods have to be combned. As a consequence, the strongly polynomal analyss cannot be carred over when adaptng mnmum cost crculaton approaches to generalzed flows, although weakly polynomal bounds can be shown. To acheve a strongly polynomal guarantee, further new algorthmc deas are requred that are specfc to the structure of generalzed flows. The new ngredents of our algorthm are hghlghted n Secton 2.4. Let us now outlne the scalng method for mnmum cost crculatons, a motvaton of our generalzed flow algorthm. The frst (weakly) polynomal tme algorthm for mnmum cost crculatons was gven by Edmonds and Karp [5], ntroducng the smple yet powerful dea of scalng (see also [2, Chapter 9.7]). The algorthm conssts of -phases, wth the value of > 0 decreasng by a factor of at least two between every two phases, yeldng an optmal soluton for suffcently small. In 1 The Õ() notaton hdes a polylogarthmc factor. 2

3 the -phase, the flow s transported n unts of from nodes wth excess to nodes wth defcency usng shortest paths n the graph of arcs wth resdual capacty at least. Orln [23], (see also [2, Chapters ]) devsed a strongly polynomal verson of ths algorthm. The key noton s that of abundant arcs. In the -phase of the scalng algorthm [5], the arc e s called abundant f t carres > 4n unts of flow. For such an arc e, t can be shown that x e > 0 must hold for some optmal soluton x. By prmal-dual slackness, the correspondng constrant must be tght n every dual optmal soluton. Based on ths observaton, Orln [23] showed that such an arc can be contracted; the scalng algorthm s then restarted on the smaller graph. Ths leads to a dual optmal soluton n strongly polynomal tme; that provded, a prmal optmal soluton can be found va a sngle maxmum flow computaton. Orln [23] also presents a more effcent but also more sophstcated mplementaton of ths dea. Let us now turn to generalzed flows. The analogue of the scalng method was an mportant component of the Fat-Path algorthm of [9]; the algorthm of Goldfarb, Jn and Orln [13] and the one n [34] also use ths technque. The noton of abundant arcs can be easly extended to these frameworks: f an arc e carres a large amount of flow as compared to, then t must be tght n every dual optmal soluton, and hence can be contracted. Ths dea was already used by Radzk [26], to boost the runnng tme of [13]. Nevertheless, t s not known whether an abundant arc would always appear n any of the above algorthms wthn a strongly polynomal number of steps. Our contrbuton s a new type of scalng algorthm that suts better the dual structure of the generalzed flow problem, and thereby the quck appearance of an abundant arc wll be guaranteed. Whereas n all prevous methods, the scalng factor remans constant for a lnear number of path augmentatons, our contnuous scalng method keeps t decreasng n every elementary teraton of the algorthm, even n those that lead to fndng the next augmentng path. The rest of the paper s structured as follows. Secton 2 frst defnes the problem settng, ntroduces relabelngs, gves the characterzaton of optmalty, and defnes the noton of -feasblty. Secton 2.4 then gves a more detaled account of the man algorthmc deas. The algorthm s presented n three dfferent versons. Frst, Secton 2.5 descrbes a relatvely smple scalng algorthm called Contnuous Scalng, wth a weakly polynomal runnng tme guarantee proved n Secton 3. Our strongly polynomal algorthm Enhanced Contnuous Scalng n Secton 4 bulds on ths, by ncludng one addtonal subroutne, and a framework for contractng arcs. The runnng tme analyss s gven n Secton 5. Ths acheves a strongly polynomal bound on the number of steps. A strongly polynomal algorth must also satsfy requrement () on bounded number szes. Ths requres further modfcatons of the algorthm n Secton 6 by ntroducng certan roundng steps. Secton 7 shows reductons between dfferent formulatons; n partcular, the corollary on LP feasblty problems wth at most two nonzeros per column s shown here. Secton 7 s ndependent from the precedng sectons and can be read drectly after Secton 2. Secton 8 concludes wth some addtonal remarks and open questons. 2 Prelmnares We start by ntroducng the most general formulaton our approach s applcable to. Consder the lnear feasblty problem Ax = b 0 x u, (LP2) 3

4 such that every column of A contans at most two nonzero entres. By makng use of a reducton by Hochbaum [17], n Secton 7.2 we show that every problem of ths form can be reduced to the generalzed flow maxmzaton problem as defned next. Let G = (V,E) be a drected graph wth a desgnated snk node t V. Let n = V, m = E, and for each node V, let d denote total number of arcs ncdent to (both enterng and leavng). We wll always assume n m. We do not allow parallel arcs and hence we may use j to denote the arc from to j. Ths s for notatonal convenence only, and all results straghtforwardly extend to the settng wth parallel arcs. All paths and cycles n the paper wll refer to drected paths and drected cycles. The followng s the standard formulaton of the problem. Let us be gven arc capactes u : E Q >0 { } and gan factors γ : E Q >0. max γ jt f jt j:jt E j:j E j:tj E γ j f j j:j E f tj f j 0 V t (P u ) 0 f u It s common n the lterature to defne the problem wth equaltes n the node constrants. The two forms are essentally equvalent, see e.g. [28]; moreover, the form wth equalty s often solved va a reducton to (P u ). In ths paper, we prefer to use yet another equvalent formulaton, where the arcs have no upper capactes, but there are node demands nstead. A problem gven n the standard formulaton can be easly transformed to an equvalent nstance n ths form; the transformaton s descrbed n Secton 7.1. Gven a node demand vector b : V Q and gan factors γ : E Q >0, the uncapactated formulaton s defned as max γ jt f jt j:jt E j:j E j:tj E γ j f j j:j E f tj 0 f f j b V t Note the value of b t s rrelevant as t s not present n the formulaton; we may e.g. assume b t = 0. For a vector f R E 0, let us defne the excess of a node V by e (f) := γ j f j f j b. j:j E j:j E Thenodeconstrantsn(P)canbewrttenase (f) 0, andtheobjectvesequvalenttomaxmzng e t (f). When f s clear from the context, we wll denote the excess smply by e := e (f). By a generalzed flow we mean a feasble soluton to (P), that s, a nonnegatve vector f R E 0 wth e (f) 0 for all V t. Let us defne the surplus of f as Ex(f) := e (f). V t It wll be convenent to make the followng assumptons. There s an arc t E for every V t; The problem (P) s feasble, and an ntal feasble soluton f s provded. The objectve value n (P) s bounded. (P) ( ) ( ) ( ) 4

5 These assumptons are wthout loss of generalty; t s shown n Secton 7.1 that any problem n the standard form can be transformed to an equvalent one n the uncapactated form that also satsfes assumptons ( ) and ( ). Condton ( ) can be easly acheved by addng new arcs to the snk wth gan factors small enough not to nfluence the soluton. To obtan ( ), observe that f 0 s feasble to (P u ); f n ( ) wll be the mage of 0 under the transformaton. To justfy ( ), n the same Secton 7.1 we show how unboundedness can be detected. Furthermore, n Secton 7.2 we show how an arbtrary nstance of (LP2) can be reduced to solvng two nstances of (P) satsfyng these assumptons. Let us ntroduce some further notaton. For an arc set H E, let H denote the set of reverse arcs, that s, H := {j : j H}; let H := H H. We defne the gan factor of a reverse arc j H by γ j := 1/γ j. For an arc set F E and node sets S,T V, let F[S,T] := {j F : S,j T}. We also use F[S] := F[S,S] to denote the set of arcs n F spanned by S. For a node V, let δ n () and δ out () denote the set of arcs enterng and leavng, respectvely. We wll use the vector norms x 1 = x and x = max x. For ntegers a b, let [a,b] := {a,a+1,...,b}. A vector f : E R 0 s called a path flow, f ts support s a path P = w 1 w 2...w t E, and γ wl f wl = f wl+1 for every 1 l t 1. In other words, the ncomng flow equals the outgong flow n every nternal node of the path. We say that a path flow f sends α unts of flow from p to q, f the support of f s a p q path, and the flow value arrvng at q equals α. Note however, that the amount of flow leavng p s typcally dfferent from α. 2.1 Encodng sze In the weakly polynomal algorthm, the runnng tme wll be dependent on the encodng sze of the nput, that conssts of ratonal numbers. In a strongly polynomal algorthm, all numbers appearng durng the computatons must be ratonal of encodng sze polynomally bounded n the nput sze. (We remark that the noton of strongly polynomal algorthms s also applcable to problems wth arbtrary real numbers n the nput; ths model assumes that every basc arthmetc operaton can be carred out n O(1) tme.) Standard formulaton. We are gven an nteger B such that all capactes u and gan factors γ are ratonal numbers, gven as quotents of two ntegers B. Uncapactated formulaton. We gve more complcated condtons on the encodng sze of the dfferent quanttes. Ths s n order to mantan good bounds on the encodng sze when transformng an nstance from the standard to the uncapactated formulaton n Secton 7.1. Assume the nstance satsfes condtons ( ), ( ) and ( ). We use the nteger B to bound the encodng sze of the nput as follows. The arcs can be classfed nto two types, regular and auxlary, wth t beng the endpont of every auxlary arc. For a regular arc j, the gan factor γ j s gven as a ratonal number, such that B s an nteger multple of the product of the numerators and denomnators of all γ j values for regular arcs. For every auxlary arc t, γ t = 1/ B. For every V t, b B, and s an nteger multple of 1/ B. For the ntal soluton f, and for every j E, f j B and f j s an nteger multple of 1/ B. The reducton n Secton 7.1 wll transform an nstance n the standard formulaton wth n nodes and m arcs and parameter B to an uncapactated nstance wth m + n nodes, 2m arcs and B 2B 4m. Our man result s the followng. 5

6 Theorem 2.1. There exsts an O(n 3 m 2 ) tme strongly polynomal algorthm for the uncapactated formulaton (P) wth assumptons ( ), ( ) and ( ). Usng the transformaton n Secton 7.1, ths gves an O(m 5 ) tme strongly polynomal algorthm for the standard formulaton (P u ). Fnally, usng the reducton n Secton 7.2, we get an O(m 5 ) algorthm for the lnear feasblty problem (LP2) wth n constrants and m varables. 2.2 Labelngs and optmalty condtons Dual solutons to (P) play a crucal role n the entre generalzed flow lterature. Let y : V R 0 be a soluton to the dual of (P). Followng Glover and Klngman [8], the lterature standard s not to consder the y values but ther nverses nstead. Wth µ := 1/y, we can wrte the dual of (P) n the followng form. max V µ b γ j µ µ j j E µ > 0 V t µ t = 1 (D) A feasble soluton µ to ths program wll be called a relabelng or labelng. An optmal labelng s an optmal soluton to (D). Whereas there could be values µ = correspondng to y = 0, assumpton ( ) guarantees that all µ values must be fnte. A useful and well-known property s the followng. Proposton 2.2. Gven an optmal soluton to (D), an optmal soluton to (P) can be obtaned n strongly polynomal tme, and conversely, gven an optmal soluton to (P), an optmal soluton to (D) can be obtaned n strongly polynomal tme. In fact, our strongly polynomal algorthm proceeds va fndng an optmal soluton to (D), and computng the prmal optmal soluton va a sngle maxmum flow computaton. The frst part of the above proposton s proved n Theorem 2.6(), whereas the second part (whch s not needed for our algorthm) can be shown usng an argument smlar to the proof of Lemma 3.1. Relabelngs wll be used n all parts of the algorthm and proofs. For a generalzed flow f and a labelng µ, we defne the relabeled flow f µ by f µ j := f j µ for all j E. Ths can be nterpreted as changng the base unt of measure at the nodes (.e. n the example of the currency exchange network, t corresponds to changng the unt from pounds to pennes). To get a problem settng equvalent to the orgnal one, we have to relabel all other quanttes accordngly. That s, we defne relabeled gans, demands, excesses and surplus by γ µ j := γ µ j, b µ := b, e µ := e, and Ex µ (f) := e µ µ j µ µ, V t respectvely. Another standard noton s the resdual network G f = (V,E f ) of a generalzed flow f, defned as E f := E {j : j E,f j > 0}. Arcs n E are called forward arcs, whle arcs n the second set are reverse arcs. Recall that for a reverse arc j we defned γ j = 1/γ j. Also, we defne f j := γ j f j for every reverse arc j E f. 6

7 By ncreasng (decreasng) f j by α on a reverse arc j E f, we mean decreasng (ncreasng) f j by α/γ j. The nput graph G = (V,E) s allowed to have pars of oppostely drected arcs j and j, makng our notaton slghtly ambguous: for an arc j, we wll denote ts reverse arc by j, whch mght be an arc parallel to the orgnal arc from j to n the nput. However, ths should not be a source of confuson: whenever the arc j s mentoned n the context of j, t wll always refer to the reverse arc. The crucal noton of conservatve labelngs s motvated by prmal-dual slackness. Let f be a generalzed flow (that s, a feasble soluton to (P)), and let µ : V R >0. We say that µ s a conservatve labelng for f, f µ s a feasble soluton to (D) wth the further requrement that γ µ j = 1 whenever f j > 0 for j E. The followng characterzaton of optmalty s a straghtforward consequence of prmal-dual slackness n Lnear Programmng. We state the optmalty condtons both for the uncapactated formulaton (P), and for the standard formulaton (P u ). In the latter part we do not assume ( ), and therefore µ = s also allowed. Theorem 2.3. () Assume ( ) holds. A generalzed flow f s an optmal soluton to (P) f and only f there exsts a fnte conservatve labelng µ, and e = 0 for all V t. () A feasble soluton f to the standard form (P u ) s optmal f and only f there exsts a functon µ : V R >0 { } such that µ t = 1, and γ j µ µ j f f j = 0, γ j µ = µ j f 0 < f j < u j, and γ j µ µ j f f j = u j ; further, e = 0 whenever µ <. Gven a labelng µ, we say that an arc j E f s tght f γ µ j = 1. A drected path n E f s called tght f t conssts of tght arcs feasble labels Let us now ntroduce a relaxaton of conservatvty crucal n the algorthm. Ths s new noton, although smlar concepts have been used n prevous scalng algorthms [11, 34]. Secton 2.4 explans the background and motvaton of ths noton. Gven a labelng µ, let us call arcs n E wth γ µ j < 1 non-tght, and denote ther set by For every V, let F µ := {j E : γ µ j < 1}. R := j:j F µ γ j f j denote the total flow ncomng on non-tght arcs; let R µ := R µ = j:j F µγµ j fµ j. For some 0, let us defne the -fat graph as E µ f ( ) = E {j : j E,fµ j > }. We say that µ s a -conservatve labelng for f, or that (f,µ) s a -feasble par, f γ µ j 1 holds for all j Eµ f ( ), and µ t = 1, and µ > 0, e R for every V t. Note that n partcular, µ must be a feasble soluton to (D). The frst condton s equvalent to requrng f µ j for every non-tght arc. Note that 0-conservatveness s dentcal to conservatveness: E µ f (0) = Eµ f, and therefore every arc carryng postve flow must be tght; the second condton smply gves e 0 whenever µ > 0. The next lemma can be seen as the converse of ths observaton. 7

8 Lemma 2.4. Let (f,µ) be a -feasble par for some > 0. Let us defne the generalzed flow f wth f j = 0 f j F µ and f j = f j otherwse. Then f s a feasble generalzed flow, µ s a conservatve labelng for f, and Ex µ ( f) Ex µ (f)+ F µ. Proof. For feasblty, we need to verfy e ( f) 0 for all V t. Ths follows snce e ( f) e (f) j:j F µ γ j f j = e (f) R 0. It s straghtforward by the constructon that γ µ j 1 for every j E wth equalty whenever f j > 0. Ths shows that µ s a conservatve labelng. For the last part, observe that decreasng the flow value to 0 on a non-tght arc j may create f µ j unts of relabeled excess at. Clam 2.5. In a -conservatve labelng, R µ < d holds for every V. Proof. If µ s a -conservatve labelng, then f µ j holds for every non-tght arc j; also note that the relabeled flow arrvng from j on a non-tght arc s γ µ j fµ j < fµ j, and hence Rµ < d. 2.4 Overvew of the algorthms We now nformally descrbe some fundamental deas of our algorthms Contnuous Scalng and Enhanced Contnuous Scalng, and explan ther relatons to prevous generalzed flow algorthms. The precse algorthms and arguments wll be gven n the later sectons. Basc features of the algorthms Gven a generalzed flow f, a cycle C n the resdual graph E f s called flow-generatng, f γ(c) = e C γ e > 1. If there exsts a flow-generatng cycle, then some postve amount of flow can be sent around t to create postve excess n an arbtrary node ncdent to C. The noton of conservatve labellngs s closely related to flow generatng cycles. Notce that for an arbtrary labelng µ, γ(c) = γ µ (C). Therefore, f µ s a fnte conservatve labelng, then E f cannot contan any flow-generatng cycles. It s also easy to verfy the converse: f there are no flow-generatng cycles, then there exsts a conservatve labelng (see also Lemma 3.1). The Maxmum-mean-gan cycle-cancelng procedure, ntroduced by Goldberg et al. [9], can be used to elmnate all flow-generatng cycles effcently. The subroutne proceeds by choosng a cycle C E f maxmzng γ(c) 1/ C, and from an arbtrary node ncdent to C, sendng the maxmum possble amount of flow around C admtted by the capacty constrants, thereby ncreasng the excess e. It termnates once there are no more flow-generatng cycles left n E f. Ths s a natural analogue of the mnmum mean cycle cancellaton algorthm of Goldberg and Tarjan [10] for mnmum cost crculatons. Radzk[25](seealso[28])gave astronglypolynomalrunnngtmeboundo(m 2 nlog 2 n) for the Maxmum-mean-gan cycle-cancelng algorthm. Our algorthm also starts wth performng ths algorthm, wth the nput beng the ntal soluton f provded by ( ). Hence one can obtan a feasble soluton f along wth a conservatve labelng µ n strongly polynomal tme. Such an f can be transformed to an optmal soluton usng Onaga s algorthm [22]: whle there exsts a node V t wth e > 0, fnd a hghest gan augmentng path from to t, that s, a path P n the resdual graph E f wth the product of the gans maxmum. Send the maxmum amount of flow on ths augmentng path enabled by the capacty constrants. A conservatve labelng can be used to dentfy such paths: we can transform a conservatve labelng to a canoncal labelng (see [9]), where every node s connected to the snk va a tght path. Such a canoncal labelng 8

9 can be found va a Djkstra-type algorthm, ncreasng the labels of certan nodes. The correctness of Onaga s algorthm follows by the observaton that sendng flow on a tght path mantans the conservatveness of the labelng, hence no new flow-generatng cycles may appear. Unfortunately, Onaga s algorthm may run n exponentally many steps, and mght not even termnate f the nput s rratonal. The Fat-Path algorthm [9] ntroduces a scalng technque to overcome ths dffculty. The algorthm mantans a scalng factor that decreases geometrcally. In the -phase, flow s sent on a hghest gan -fat augmentng path, that s, a hghest gan path among those that have suffcent capacty to send unts of flow to the snk. In our notaton, these are paths n E µ f ( ). However, path augmentatons mght create new flow-generatng cycles, whch have to be repeatedly cancelled by callng the cycle-cancelng subroutne at the begnnng of every phase. Our noton of -feasble pars n Secton 2.3 s motvated by the dea of -fat paths: note that every arc n the -fat graph E µ f ( ) has suffcent capacty to send unts of relabeled flow. A man step n our algorthm wll be sendng unts of relabeled flow on a tght path n E f ( ) from a node wth hgh excess to the snk t or another node wth low excess. Ths s n contrast to Fat-Path and most other algorthms, where these augmentng paths always termnate n the snk t. We allow other nodes as well n order to mantan e R are througout the algorthm. The purpose of these condtons s to make sure that we always stay close to a conservatve labelng: recall Lemma 2.4 assertng that f (f,µ) s a -feasble par, then f we set the flow values to 0 on every non-tght arc, the resultng f s a feasble soluton to (P) not contanng any flow-generatng cycles. That s the reason why we need to call the cycle-cancelng algorthm only once, at the ntalzaton, n contrast to Fat-Path. Smlar deas have been already used prevously. The algorthm of Goldfarb, Jn and Orln [11] also uses a sngle ntal cycle-cancelng and then performs hghest-gan augmentatons n a scalng framework, combned wth a clever bookkeepng on the arcs. The algorthm n [34] does not perform any cycle cancellatons and uses a homonymous noton of -conservatveness that s closely related to ours; however, t uses a dfferent problem setup (called symmetrc formulaton ), and ncludes a condton stronger than e R. The way to the strongly polynomal bound The basc prncple of our strongly polynomal algorthm s motvated by Orln s strongly polynomal algorthm for mnmum cost crculatons ([23], see also [2, Chapters ]). The true purpose of the algorthm s to compute a dual optmal soluton to (D). Provded a dual optmal soluton, we can compute a prmal optmal soluton to (P) by a sngle maxmum flow computaton on the network of tght arcs (see Theorem 2.6()). Themanmeasureofprogresssdentfynganarcj E that mustbetght nevery dualoptmal soluton. Such an arc can be contracted, and an optmal dual soluton to the contracted nstance can be easly extended to an optmal dual soluton on the orgnal nstance (see Sectons 4.1, 5.1). The algorthm could be smply restarted from scratch n the contracted nstance. Our algorthm Enhanced Contnuous Scalng s somewhat more complcated and keeps the prevous prmal soluton to acheve better runnng tme bounds by a global analyss of all contracton phases. We use a scalng-type algorthm to dentfy such arcs tght n every dual optmal soluton. Our algorthm mantans a scalng parameter, and a -feasble par (f,µ) such that Ex µ (f) 16m. Usng standard flow decomposton technques, t can be shown that an arc j wth f µ j 17m must be postve n some optmal soluton f to (P) (see Theorem 4.1). Then by prmal-dual slackness t follows that ths arc s tght n every dual optmal soluton. Arcs wth f µ j 17m wll be called abundant. 9

10 A smple calculaton (see the proof of Clam 5.4) shows that once b µ 32mn for a node V t, there must be an abundant arc leavng or enterng. Hence our goal s to desgn an algorthm where such a node appears wthn a strongly polynomal number of teratons. A basc step n the scalng approaches (e.g. [9, 11, 34]) s sendng unts of relabeled flow on a tght path; we shall call ths a path augmentaton. In all prevous approaches, the scalng factor remaned fxed for a number of path augmentatons, and reduces by a substantal amount (by at least a factor of two) for the next -phase. Our man dea s what we call contnuous scalng: the boundares between -phases are dssolved, and the scalng factor decreases contnuously, even durng the teratons that lead to fndng the next path for augmentaton. The precse descrpton wll be gven n Secton 2.5; n what follows, we gve a hgh-level overvew of some key features. We shall have a set T 0 wth nodes of hgh relabelled excess; another set N wll be the set consstng of the snk t and further nodes wth low relabelled excess. We wll look for tght paths connectng a node n T 0 to one n N; we wll send unts of relabeled flow along such a path. In an ntermedate elementary step, we let T to denote the set of nodes reachable from T 0 on a tght path; f t does not ntersect N, then we ncrease the labels µ for all T by the same factor α hopng that a new tght arc appears between T and V \T, and thus T can be extended. We smultaneously decrease the value of by the same factor α. Thus the relabeled excess of nodes n V \T ncreases relatve to. Ths mght lead to changes n the sets T 0 and N; hence an elementary step does not necessarly termnate when a new tght arc appears, and therefore the value of α has to be carefully chosen. Ths framework s undoubtedly more complcated than the tradtonal scalng algorthms. The man reason for ths approach s the phenomenon one mght call nflaton n the prevous scalngtype algorthms. There t mght happen that the relabelng steps used for dentfyng the next augmentng paths ncrease some labels by very hgh amounts, and thus the relabeled flow remans small compared to on every arc of the network - therefore a new abundant arc can never be dentfed. It could even be the case that most -scalng phases do not perform any path augmentatons at all, but only label updates: the relabeled excess at every node becomes smaller than durng the relabelng steps. 2 The advantage of changng contnuously n our algorthm s that the ratos b µ / are nondecreasng for every V t durng the entre algorthm. In the above descrbed stuaton, these ratos are unchanged for T and ncrease for V \ T. As remarked above, there must be an abundant arc ncdent to once b µ / 32mn. We frst present a smpler verson of ths algorthm, Contnuous Scalng n Secton 2.5, where we can only prove a weakly polynomal runnng tme bound. Whereas the ratos b µ / are nondecreasng, we are not able to prove that one of them eventually reaches the level 32mn n a strongly polynomal number of steps. Ths s snce the set V \ T where the rato ncreases mght always consst only of nodes where b µ / s very small. The algorthm Enhanced Contnuous Scalng n Secton 4 therefore ntroduces one addtonal subroutne, called Fltraton. In case b µ < /n for every (V \T) t, we tdy-up the flow nsde V \T, by performng a maxmum flow computaton here. Ths drastcally reduces all relabeled excesses n V \ T, and thereby guarantees that most teratons of the algorthm wll have to ncrease certan b µ / values that are already at least 1/n. In summary, the strongly polynomalty of our algorthm s based on the followng three man new deas. The defnton of -feasble pars, n partcular, the condton on mantanng a securty reserve 2 However, to the extent of the author s knowledge, no actual examples are known for these phenomena n any of the algorthms. 10

11 R. It s a cleaner and more effcent framework than smlar ones n [11] and [34]; we beleve ths s the real condton a scalng type algorthm has to mantan. Contnuous scalng, that guarantees that the ratos b µ / are nondecreasng durng the algorthm. Ths s acheved by dong the exact opposte of [9, 11, 34] that use the natural analogue of the scalng technque for mnmum cost crculatons. The Fltraton subroutne that ntervenes n the algorthm whenever the nodes on a certan, relatvely solated part of the network have unreasonably hgh excesses as compared to the small node demands n ths part. 2.5 The maxmum flow subroutne Standard maxmum flow computaton (see e.g. [2, Chapters 6-7]) wll be a crucal subroutne n our algorthm. Frst and foremost, f an optmal labelng s provded, then an optmal soluton to (P) can be obtaned by computng a maxmum flow. We now descrbe the subroutne Tght-Flow(S, µ), to perform such computatons. In the weakly polynomal algorthm (Secton 2.5), t wll be used only twce: at the ntalzaton and at the termnaton of the algorthm, n both cases wth S = V. However, t wll also be the key part of the subroutne Fltraton n the strongly polynomal algorthm (Secton 4), also appled to subsets S V. Thenputof Tght-Flow(S,µ)sanodesetS V wtht S,andalabelngµ,thatsafeasble soluton to (D) when restrcted to S. The subroutne returns a generalzed flow f supported on E[S], such that µ restrcted to S s a conservatve labelng for f. Let us defne the arc set Ẽ E[S] as the set of tght arcs for µ: Ẽ := {j E[S] : γ µ j = 1}. Let us extend S by a new source node s, and add an arc s from s to every S t; let Ẽ denote the unon of Ẽ and these new arcs. Let us set lower and upper arc capactes l j := 0, u j := on all arcs of Ẽ; for S t, let l s := and u s := b µ. Tght-Flow(S,µ) computes a maxmum flow x from s to t on the network (S {s},ẽ ) wth capactes l and u. Let us defne f : E[S] R 0 by f j := x jµ f j Ẽ and f j := 0 otherwse. Ths completes the descrpton of the subroutne Tght-Flow. Because of the possbly negatve upper capactes on the s arcs, the maxmum flow problem mght be nfeasble; n ths case, the subroutne returns an error. Theorem 2.6. () If µ s an optmal soluton to (D), then Tght-flow(V, µ) returns an optmal soluton to (P). () Assume that the maxmum flow problem n Tght-flow(S, µ) s feasble, and returns a vector f. Then f s a feasble soluton to (P) on S, and e µ (f ) n max j S t bµ j S. () Assume that the flow problem n Tght-flow(V, µ) s feasble and returns a generalzed flow f wth Ex(f ) < 1/ B 3. Then Ex(f ) = 0 must hold, that s, f s an optmal soluton to (P). Proof. Toprove part(), assumeµs an optmal labelng. Let g bean optmal soluton to(p). Let us defne x j := g µ j f j E and x s := j:j E gµ j j:j E gµ j for every V t. By Theorem 2.3(), x s = b µ for all V t, and therefore x s a maxmum flow, wth ({s},v) formng a mnmum cut. Conversely, an arbtrary maxmum flow must saturate every arc leavng s, and therefore we get 11

12 e (f ) = 0 for every V t for the f returned by Tght Flow(V,µ). It s straghtforward that all condtons n Theorem 2.3() are satsfed. For part (), frst observe that f there s a feasble soluton x to the flow problem, then e (f ) 0 must hold for every V t, due to the constrant x s b µ ; further, µ s a conservatve labelng for f. Let us pck a node r S t wth e r (f ) > 0, and let Z S denote the set of nodes that can be reached from r on a drected path n the resdual graph (S,Ẽf ), defned by Ẽ f = Ẽ {j : j Ẽ,f j > 0}. Note that f jµ = x j for every j Ẽf. Assume that t Z, that s, there s a drected path P from r to t n the resdual graph. Snce e r (f ) > 0, we have x sr < b µ = u sr ; hence sr and P gve an augmentng path for the flow x, n a contradcton to ts choce as a maxmum flow. We may thus conclude that t / Z. Hence e µ (f ) 0 for all Z, and therefore 0 < e µ r(f ) e µ (f ) = Z Z x j x j b µ = b µ n max j S t bµ j, Z (1) j Z:j Ẽ j Z:j Ẽ provng part () of the Theorem. Here we used that f x j > 0 then Z f and only f j Z. Let us turn to part (); assume that e µ r(f ) > 0 for some r V t. The equaton (1) can be further wrtten as 0 < e µ r (f ) e µ (f ) = b µ = 1 µ r b. (2) µ r µ Z Z Z For every Z, there s a tght path P n Ẽf from r to, that s, µ r/µ = e P 1/γ e. By our assumpton on the encodng szes, ths product must be an nteger multple of 1/ B. We further µ assumed that every b value s an nteger multple of 1/ B. Hence every term b r µ s an nteger multple of 1/ B 2. Further, by ( ), we have rt E, and γ rt 1/ B. By the conservatveness of µ w.r.t. to f, 1 µ r γ rt 1/ B. Consequently, the last expresson n (2) must be at least 1/ B 3 whenever t s nonzero. Therefore 1/ B 3 e µ (f ) Ex µ (f ), Z contradctng our assumpton. Hence t follows that e r (f) = 0 for all r V t. sectonthe Contnuous Scalng algorthm The algorthm Contnuous Scalng s shown n Fgure 1. The strongly polynomal algorthm Enhanced Contnuous Scalng n Secton 4 wll be an mproved varant of ths. We shall always make assumptons ( ), ( ) and ( ). The algorthm starts wth the subroutne Intalze, descrbed n Secton 2.6, that returns an ntal flow f, along wth a = -conservatve labelng µ such that e µ < (d +2) holds for every V. Ths s based on the Maxmum-mean-gan cycle-cancelng algorthm as n [9, 25]. The man part of the algorthm (the whle loop) conssts of teratons. The value of the scalng parameter s monotone decreasng, and all µ values are monotone ncreasng durng the algorthm. In every teraton, a -feasble par (f, µ) s mantaned. These teratons stop once the scalng parameter decreases below 1/(17m B 3 ). At ths pont we apply the subroutne Tght-flow(V,µ), as descrbed n Secton 2.5, to fnd an optmal soluton by a sngle maxmum flow computaton. The set N denotes the set consstng of t and all nodes wth e µ < (d +1). The set T 0 conssts of a certan set of nodes (but not all) wth e µ (d +2). The set T denotes a set of nodes that can be reached from T 0 on a tght path n the -fat graph E µ f ( ). Both T 0 and T are ntalzed empty. 12

13 Algorthm Contnuous Scalng Intalze(V,E,b,γ, f) ; T 0 ; T ; Whle 1/(17m B 3 ) do N {t} { V t : e µ < (d +1) } ; f N T then pck p T 0, q N T connected by a tght path P n E µ f ( ) ; send unts of relabeled flow from p to q along P ; f e µ p < (d p +2) then T 0 T 0 \{p} ; T T 0 ; else f j E µ f ( ), γµ j = 1, T, j V \T then T T {j} ; else Elementary Step(T,T 0,f,µ, ) ; Tght-Flow(V, µ) ; Fgure 1: Descrpton of the weakly polynomal algorthm Every teraton frst checks whether N T. If yes, then nodes p T 0 and q N T are pcked connected by a tght path P n the -fat graph. unts of relabeled flow s sent from p to q on P: that s, f j s ncreased by µ for every j P (f j was a reverse arc, ths means decreasng f j by µ j ). The only e values that change are e p and e q. If the new value s e µ p < (d p +2), then p s removed from T 0. The teraton fnshes n ths case by resettng T = T 0 (rrespectve to whether p was removed or not). Let us now turn to the case N T =. If there s a node j V \T connected by a tght arc n E µ f ( ) to T, then we extend T by j, and the teraton termnates. Otherwse, the subroutne Elementary Step(T,T 0,f,µ, ) s called. The precse descrpton s gven n Secton 2.7; we gve an outlne below. For a carefully chosen α > 1, all µ values are multpled by α for T, and µ s left unchanged for V \ T. At the same tme, s dvded by α (ths s the only step n the man part of the algorthm modfyng the µ s and the value of ). The flow s dvded by α on all non-tght arcs n F µ [V \ T], and on every arc enterng T. The value of α s chosen to be the largest such that the labelng remans -feasble wth the above changes, and further e µ 4(d + 2) holds for all V \T. If α =, then the algorthm termnates wth an optmal soluton. For fnte α, all nodes for whch e µ = 4(d + 2) holds after the change are added both to T 0 and to T. On the other hand, the e µ values mght also decrease both for T and V \T. If for some T 0, the value of e µ drops below (d +2), then s removed from T 0, and T s reset to T = T 0. In every step when T 0 s not changed, a tght arc n E µ f ( ) leavng T must appear. Consequently, T wll be extended n the next teraton. We shall prove the followng runnng tme bound: Theorem 2.7. The algorthm Contnuous Scalng can be mplemented to fnd an optmal soluton for the uncapactated formulaton (P) n runnng tme max{o(m(m+nlogn)log B),O(m 2 nlog 2 n)}. The hgh level dea of the analyss s the followng. The e µ values for nodes T 0 are nonncreasng, and a path augmentaton startng from reduces e µ by. The node leaves T 0 once e µ drops below (d +2), and may enter agan once t ncreases to 4(d +2). As shown n Lemma 3.7, the value of must decrease by at least a factor 2 between two such events. Also, t s easy to 13

14 verfy that wthn every 2n Elementary step operatons, ether a path augmentaton must be carred out, or a node must leave T 0 due to decrease n e µ caused by label changes. These two facts together gve a polynomal bound on the runnng tme. In the proof of Theorem 2.7, we outlne a more effcent mplementaton of the algorthm, wth all teratons between two path augmentatons performed together. For a problem n the standard form on n nodes, m arcs and complexty parameter B, the reducton n Secton 7.1 shows that t can be transformed to an equvalent nstance wth n+m nodes, 2m arcs, and B 2B 4m. Hence the theorem gves a runnng tme O(m 3 lognlogb), assumng n B. Our algorthm could be naturally adapted to work on a problem nstance wth both node demands and arc capactes; the reason for choosng the uncapactated nstance s ts sutablty for the strongly polynomal algorthm n Secton 4. Such a modfcaton would run n tme O(m 2 (m+nlogn)logb), matchng the bound of Goldfarb et al. [13]. 2.6 The Intalzaton subroutne In ths secton we descrbe the Intalze(V,E,b,γ, f) subroutne. The nput s a graph G = (V,E), node demands b : V R, gan factors γ : E R >0 and the ntal generalzed flow f guaranteed by the assumpton ( ). The ntal value of = s computed and a -feasble par (f,µ) s returned such that e µ < (d +2) holds for every V t. Frst, we use the Maxmum-mean-gan cycle-cancelng algorthm by Radzk [25]. Ths paper uses the standard capactated formulaton (P u ) wth fnte capactes on the arcs. As a consequence, every flow-generatng cycle can only generate a fnte amount of flow. Our boundedness assumpton ( ), together wth ( ), guarantees the same property. Provded ths boundedness property, Radzk s strongly polynomal bound extends verbatm to the uncapactated formulaton (P). Ths returns a generalzed flow g such that the resdual graph E g contans no flow generatng cycles, that s, no cycles C wth γ(c) > 1. Let us defne µ t := 1 and for V t, µ := 1/max{γ(P) : P E g s a walk from to t.} (3) Such a path must exst accordng to assumpton ( ), and snce γ(c) 1 for all cycles C, the walk gvng the maxmum can always be chosen to be a path. The µ values can be computed effcently: note that they correspond to shortest paths wth respect to the cost functon logγ e. To avod computng logarthms, we may use a multplcatve verson of Djkstra s algorthm to obtan the µ values n strongly polynomal tme. Afterthecyclecancellngsubroutneandcomputngtheµ values, thesubroutnetght Flow(V,µ) s called, as descrbed n Secton 2.5. Ths computes a generalzed flow f. We set f = f, and set the ntal = := max V t e µ. 2.7 The Elementary step subroutne Let (f,µ) be a -feasble par for > 0. Let T V be a (possbly empty) set of nodes wth e µ 4(d + 2) for every V, wth strct nequalty whenever V \ T. The subroutne (Fgure 2) perfoms the followng modfcatons for some α > 1. The µ values are multpled by α for T, and left unchanged for V \T. The new value of the scalng parameter s set to /α. Fnally, the flow on non-tght arcs j F µ [V \T] and on all arcs j E[V \T,T] s dvded by α. The value of α s chosen maxmal such that for the new values of f,µ, and, (f,µ) s -feasble, and further the modfed excess e 4(d +2) µ holds for every V. For the latter, we need the 14

15 Subroutne Elementary step(t,t 0,f,µ, ) α 1 mn{δ { : (V \T) t}, wth } δ as defned n (5) ; α 2 mn : j E[T,V \T] ; 1 γ µ j α mn{α 1,α 2 } ; f α = then set f t = 0 for all t E: γ µ t < 1 ; return optmal flow f and optmal relabelng µ ; TERMINATE. α ; for T do µ αµ ; for j F µ [V \T] E[V \T,T] do f j f j α ; T 0 T 0 { : V \T, e µ = 4(d +2) } ; T T T 0 ; f T 0 : e µ < (d +2) then T 0 T 0 \{ : e µ < (d +2) } ; T T 0 ; Fgure 2: The Elementary Step subroutne followng defntons for every (V \T) t. Let F 1 () := δ n () F µ [V \T], r 1 () := j:j F 1 () γ jf j, F 2 () := δ n ()\F 1 (), r 2 () := j:j F 2 () γ jf j, F 3 () := δ out () (F µ [V \T] E[V \T,T]), r 3 () := j:j F 3 () f j, F 4 () := δ out ()\F 3 (), r 4 () := j:j F 4 () f j. (4) Note that F 1 () and F 3 () denote the set of those ncomng and outgong arcs where we wsh to decrease the flow by a factor α. For every (V \T) t, let us defne δ := 4(d +2) µ +r 3 () r 1 () r 2 () r 4 () b. (5) If the denomnator s 0 then δ := s set. We shall verfy n the proof of Lemma 3.3 that the denomnator s always nonnegatve and the numerator s postve. The subroutne (Fgure 2) chooses α as the largest value subject to α δ for all (V \T) t, and α 1 γ µ j for all arcs j E leavng the set T. If α =, then f becomes an optmal soluton, after settng the value on all non-tght arcs leavng t to 0. If α s fnte, the algorthm performs the above descrbed modfcatons. Nodes wth e µ = 4(d +2) (that s, α = δ ) are added to both T 0 and T. Fnally, f e µ drops below (d +2) for some T 0, then all such nodes wll be removed from T 0, and T s reset to T = T 0. The valdty of ths subroutne s proved n Lemma Analyss of the Contnuous Scalng algorthm Lemma 3.1. The subroutne Intalze(V,E,b,γ, f) returns a -feasble par (f,µ) wth e µ (d +2) for every V t, and = n B 2. 15

16 Proof. Frst, we have to verfy that the flow problem n Tght-flow(V,µ) s feasble. We use the generalzed flow g obtaned by the Maxmum-mean-gan cycle-cancelng algorthm to verfy ths, by showng that µ s a conservatve labelng for g. The nontrval part s to prove γ µ j 1 for every resdual arc j E g. Let j E g be an arbtrary resdual arc. Consder the j t path P j wth µ j = 1/γ(P j ) n (3). Let P denote the path resultng by addng the arc j E g to the begnnng of P j. Then by defnton, 1/µ γ(p ) = γ j /µ j, showng γ µ j 1. Let us now consder the maxmum flow nstance n Tght-flow(V,µ). Settng x j := g µ j f j E and x s := j:j E gµ j j:j E gµ j for every V t gves a feasble soluton. Ths guarantees the exstence of the optmal soluton f. It s straghtforward by the constructon that µ s a conservatve labelng for f, and hence (f,µ) s -feasble for arbtrary > 0. The condton e µ (d +2) s also straghtforward by defnton. Let us verfy the bound on. By Theorem 2.6(), we have nmax V t b /µ. Our assumpton on the encodng szes gve b B. Further, we have 1/µ B, accordng to the defnton of 1/µ = γ(p ) for some t path P, and the encodng assumptons on the γ e values. The next straghtforward clam justfes the path augmentaton step carred out between p T 0 and q N T whenever N T. Clam 3.2. Let (f,µ) be a -feasble par, and assume P s a tght path n E µ f ( ) from node p to node q, wth e µ p(f) +R p. µ Let us ncrease f j by µ f j P s a forward arc, and decrease f j by µ j f j P s a backward arc; let f denote the resultng flow. Then (f,µ) s also a -feasble par. We next prove some fundamental propertes of the subroutne Elementary step, most mportantly, that t mantans the -feasblty of (f,µ). By nducton, we may assume that the four condtons n the lemma always hold when Elementary step(t,t 0,f,µ, ) s called n the algorthm. Lemma 3.3. Let (f,µ) be a -feasble par for some > 0, and let T V t satsfy the followng condtons: e µ < 4(d +2) for all (V \T) t; e µ (d +1) for all T; γ µ j f µ j < 1 for all j E[T,V \T]; for all j E[V \T,T]. Let f, µ,, and e denote the respectve values at the end of Elementary step(t,t 0,f,µ, ). If α <, then the par (f,µ ) s -feasble. Further, the followng statements hold. () α > 1. If α = then the modfed flow returned by the algorthm s optmal to (P), and µ s optmal to (D). () e µ 4(d +2) for all V \T, and f α = α 1, then V \T such that equalty holds. () e e for all T. (v) If α = α 2 then j E wth T, j V \T, and γ µ j = 1. 16

17 Proof. For -feasblty, let us frst verfy γ µ j 1 for all j E. If j E[T] or j E[V \T], then γ µ j = γµ j. If j E[T,V \ T], then we have γµ j = αγµ j 1 due to the choce α α 2. Fnally, f j E[V \T,T], then γ µ j = γµ j /α < 1. The next two clams verfy the remanng propertes needed for -feasblty. Clam 3.4. If γ µ j < 1 for an arc j E, then f µ j = f µ j /α /α =. Proof. Let us frst assume T; the frst equalty follows by f j = f j, µ = µ α. The nequalty f µ j s due to the -feasblty of f, because of γµ j < 1. If j V \T, ths s ncluded among the assumptons, whereas f j T, then t follows by γ µ j = γµ j < 1. Consder now the case V \T. If also j V \T, then γ µ j = γµ j < 1, and hence f j = f j/α, as we decrease the flow values by a factor α on arcs F µ [V \T]; the nequalty f µ j follows agan by the -feasblty of f. If j T, that s, j E[V \T,T], then we must agan have f j = f j/α, and f µ j s ncluded among the assumptons. Clam 3.5. The nequalty e R holds for all V t, where R denotes the f flow enterng on non-tght arcs for µ. Proof. We have e R by the -feasblty of f. Case I: V \ T. Snce f f, the change of flow on outgong arcs may only ncrease e. If f j < f j on an ncomng arc j E, then j V \T must hold. Therefore γ µ j = γµ j, and hence j must be a non-tght arc for both µ and µ. The change on j decreases e by (1 1/α)γ j f j, and causes the same change n the value of R. Case II: T. By the assumpton of the lemma, e µ (d + 1). The flow on outgong arcs s unchanged. Let j E be an ncomng arc wth f j < f j. We must have j V \ T and thus f j µ j by assumpton; further, γ µ j 1 by the -feasblty of (f,µ). Hence t follows that γ j f j < γ j µ j µ. Ths enables us to bound the value e. Let λ denote the number of arcs j wth j V \T. Usng also the assumpton e (d +1) µ, we have e = e j V\T:j E j V\T:j E (γ j f j γ j f j) e γ j f j +(d +1 λ) µ > R. j V\T:j E ( µ γ j f j) In the last nequalty, we use that f j s a non-tght arc wth j T, then γ j f j µ = µ, and that the total number of such arcs s d λ. Let us now verfy clams ()-(v). We frst show that n the formula (5) defnng δ, the denomnator s nonnegatve and δ > 1. Note that r 1 ()+r 2 () r 3 () r 4 () b = e R r 1 (). (6) The equalty s by the defnton of the four terms; the frst nequalty s requred by -feasblty, and the second snce the defnton of R ncludes all terms n r 1 (). Ths shows that the denomnator s r 2 () r 4 () b r 3 () 0. The nequalty δ > 1 then follows by the equalty n (6) and the assumpton 4(d +2) µ > e. For (), the above argument gves α 1 > 1. It s easy to see that α 2 > 1, and hence α > 1 follows. For the second part, let us analyze the α = case. Frst, we show that T = must hold. For a contradcton, assume T. We have t V \T s assumed, and every j V t s connected by an 17

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mt.edu 6.854J / 18.415J Advanced Algorthms Fall 2008 For nformaton about ctng these materals or our Terms of Use, vst: http://ocw.mt.edu/terms. 18.415/6.854 Advanced Algorthms

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Lecture 11. minimize. c j x j. j=1. 1 x j 0 j. +, b R m + and c R n +

Lecture 11. minimize. c j x j. j=1. 1 x j 0 j. +, b R m + and c R n + Topcs n Theoretcal Computer Scence May 4, 2015 Lecturer: Ola Svensson Lecture 11 Scrbes: Vncent Eggerlng, Smon Rodrguez 1 Introducton In the last lecture we covered the ellpsod method and ts applcaton

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

A 2D Bounded Linear Program (H,c) 2D Linear Programming

A 2D Bounded Linear Program (H,c) 2D Linear Programming A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Spectral Graph Theory and its Applications September 16, Lecture 5

Spectral Graph Theory and its Applications September 16, Lecture 5 Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty Addtonal Codes usng Fnte Dfference Method Benamn Moll 1 HJB Equaton for Consumpton-Savng Problem Wthout Uncertanty Before consderng the case wth stochastc ncome n http://www.prnceton.edu/~moll/ HACTproect/HACT_Numercal_Appendx.pdf,

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Approximate Smallest Enclosing Balls

Approximate Smallest Enclosing Balls Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P

More information

Société de Calcul Mathématique SA

Société de Calcul Mathématique SA Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc

More information

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

Mixed-integer vertex covers on bipartite graphs

Mixed-integer vertex covers on bipartite graphs Mxed-nteger vertex covers on bpartte graphs Mchele Confort, Bert Gerards, Gacomo Zambell November, 2006 Abstract Let A be the edge-node ncdence matrx of a bpartte graph G = (U, V ; E), I be a subset the

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India February 2008

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India February 2008 Game Theory Lecture Notes By Y. Narahar Department of Computer Scence and Automaton Indan Insttute of Scence Bangalore, Inda February 2008 Chapter 10: Two Person Zero Sum Games Note: Ths s a only a draft

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

On a direct solver for linear least squares problems

On a direct solver for linear least squares problems ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton

More information

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

A Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market

A Combinatorial Polynomial Algorithm for the Linear Arrow-Debreu Market A Combnatoral Polynomal Algorthm for the Lnear Arrow-Debreu Market Ran Duan Max-Planck-Insttut für Informatk Saarbrücken, Germany duanran@mp-nf.mpg.de Kurt Mehlhorn Max-Planck-Insttut für Informatk Saarbrücken,

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

CS 331 DESIGN AND ANALYSIS OF ALGORITHMS DYNAMIC PROGRAMMING. Dr. Daisy Tang

CS 331 DESIGN AND ANALYSIS OF ALGORITHMS DYNAMIC PROGRAMMING. Dr. Daisy Tang CS DESIGN ND NLYSIS OF LGORITHMS DYNMIC PROGRMMING Dr. Dasy Tang Dynamc Programmng Idea: Problems can be dvded nto stages Soluton s a sequence o decsons and the decson at the current stage s based on the

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Exercise Solutions to Real Analysis

Exercise Solutions to Real Analysis xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there

More information

Fundamental loop-current method using virtual voltage sources technique for special cases

Fundamental loop-current method using virtual voltage sources technique for special cases Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,

More information

Lecture 21: Numerical methods for pricing American type derivatives

Lecture 21: Numerical methods for pricing American type derivatives Lecture 21: Numercal methods for prcng Amercan type dervatves Xaoguang Wang STAT 598W Aprl 10th, 2014 (STAT 598W) Lecture 21 1 / 26 Outlne 1 Fnte Dfference Method Explct Method Penalty Method (STAT 598W)

More information