CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

Similar documents
Most results in this section are stated without proof.

Nonreversibility of Multiple Unicast Networks

max min z i i=1 x j k s.t. j=1 x j j:i T j

Lightpath routing for maximum reliability in optical mesh networks

Lecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.

Chapter 8 Hypothesis Testing

Hankel Optimal Model Order Reduction 1

Maximum Entropy and Exponential Families

The Effectiveness of the Linear Hull Effect

15.12 Applications of Suffix Trees

Complexity of Regularization RBF Networks

After the completion of this section the student should recall

Methods of evaluating tests

Average Rate Speed Scaling

A Characterization of Wavelet Convergence in Sobolev Spaces

The Hanging Chain. John McCuan. January 19, 2006

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Lecture 3 - Lorentz Transformations

HOW TO FACTOR. Next you reason that if it factors, then the factorization will look something like,

F = F x x + F y. y + F z

UPPER-TRUNCATED POWER LAW DISTRIBUTIONS

18.05 Problem Set 6, Spring 2014 Solutions

CSE541 Class 22. Jeremy Buhler. November 22, Today: how to generalize some well-known approximation results

Coding for Random Projections and Approximate Near Neighbor Search

5.1 Composite Functions

Stochastic Combinatorial Optimization with Risk Evdokia Nikolova

State Diagrams. Margaret M. Fleck. 14 November 2011

Lesson 23: The Defining Equation of a Line

A Queueing Model for Call Blending in Call Centers

Differential Equations 8/24/2010

CSC2515 Winter 2015 Introduc3on to Machine Learning. Lecture 5: Clustering, mixture models, and EM

Robust Recovery of Signals From a Structured Union of Subspaces

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite.

Counting Idempotent Relations

Likelihood-confidence intervals for quantiles in Extreme Value Distributions

EE 321 Project Spring 2018

Dept. of Computer Science. Raleigh, NC 27695, USA. May 14, Abstract. 1, u 2 q i+1 :

Time Domain Method of Moments

Packing Plane Spanning Trees into a Point Set

Advanced Computational Fluid Dynamics AA215A Lecture 4

Section 7.1 The Pythagorean Theorem. Right Triangles

Q2. [40 points] Bishop-Hill Model: Calculation of Taylor Factors for Multiple Slip

Robust Flight Control Design for a Turn Coordination System with Parameter Uncertainties

Math 225B: Differential Geometry, Homework 6

Sensitivity Analysis in Markov Networks

Singular Event Detection

Viewing the Rings of a Tree: Minimum Distortion Embeddings into Trees

MAC Calculus II Summer All you need to know on partial fractions and more

The Laws of Acceleration

Recursive Sets and Relations. Computability and Logic

The simulation analysis of the bridge rectifier continuous operation in AC circuit

Chapter 2: One-dimensional Steady State Conduction

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM

LECTURE NOTES FOR , FALL 2004

On the Designs and Challenges of Practical Binary Dirty Paper Coding

Counting Arbitrary Subgraphs in Data Streams

Solutions Manual. Selected odd-numbered problems in. Chapter 2. for. Proof: Introduction to Higher Mathematics. Seventh Edition

A Functional Representation of Fuzzy Preferences

Control Theory association of mathematics and engineering

7.1 Roots of a Polynomial

Relative Maxima and Minima sections 4.3

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates

Probabilistic and nondeterministic aspects of Anonymity 1

Chapter 2: Solution of First order ODE

General Equilibrium. What happens to cause a reaction to come to equilibrium?

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix

Sensitivity analysis for linear optimization problem with fuzzy data in the objective function

Optimal control of solar energy systems

arxiv: v1 [cs.fl] 5 Dec 2009

Indian Institute of Technology Bombay. Department of Electrical Engineering. EE 325 Probability and Random Processes Lecture Notes 3 July 28, 2014

A variant of Coppersmith s Algorithm with Improved Complexity and Efficient Exhaustive Search

Weighted K-Nearest Neighbor Revisited

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems

Sensor management for PRF selection in the track-before-detect context

Probabilistic Graphical Models

A simple expression for radial distribution functions of pure fluids and mixtures

Analytical Study of Stability of Systems of ODEs

Flexible Word Design and Graph Labeling

EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE

Convergence of reinforcement learning with general function approximators

SOA/CAS MAY 2003 COURSE 1 EXAM SOLUTIONS

CMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017

Integration of the Finite Toda Lattice with Complex-Valued Initial Data

NEW MEANS OF CYBERNETICS, INFORMATICS, COMPUTER ENGINEERING, AND SYSTEMS ANALYSIS

Combined Electric and Magnetic Dipoles for Mesoband Radiation, Part 2

Modal Horn Logics Have Interpolation

Beams on Elastic Foundation

SURFACE WAVES OF NON-RAYLEIGH TYPE

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Relativistic Dynamics

Determination of the reaction order

KRANNERT GRADUATE SCHOOL OF MANAGEMENT

A new initial search direction for nonlinear conjugate gradient method

Canimals. borrowed, with thanks, from Malaspina University College/Kwantlen University College

Chapter 2. Conditional Probability

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories

Chapter 26 Lecture Notes

Lecture 13 Bragg-Williams Theory

Complementarities in Spectrum Markets

Transcription:

CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain, with sets of a ertain harateristis Many of these problems an be expressed abstratly as the set over problem We are given a pair Σ = X, S), alled a set system, where X = {x 1,, x m } is a finite set of objets, alled the universe, and S = {,, s n } is a olletion of subsets of X, suh that every element of X belongs to at least one set of S Set systems arise in many appliations of siene and engineering Undireted Graph: An undireted graph G = V, E) is a set system where V onstitutes the universe, and the edges E are subsets of ardinality two Geometri set systems: The universe onsists of n points in spae, and the sets are the subsets of points that are ontained within some speified geometri shape balls, ubes, retangles, triangles, et) Wireless Coverage: The universe onsists all the loations on a ollege ampus, and for eah possible loation of a wireless transmitter there is an assoiated region of the ampus that is overed by plaing a wireless transmitter at this loation A fundamental question involving set systems is determining the smallest number of sets needed to over the entire universe A over of S is defined to be a subolletion of sets whose union overs X For example, in Fig 1a), we elements of X are the blak irles, and the sets,, are indiated by retangles In this ase there exists a over of size three, onsisting of s 3, s 4, and s 5 see Fig 1b)) The sets of this over do not overlap, whih is sometimes alled an exat over In general, the sets of the over are allowed to overlap) a) b) Fig 1: Set over The optimum over onsists of the three sets {s 3, s 4, s 5 } Notie that the output of set over is not a set, but rather a set of sets If we think of the sets of S as being indexed by the integers from 1 to n, then we an think of a over C more onveniently as a subset of {1,, n} This suggests the following definition Leture 9 1 Fall 2017

Set Cover Problem: Given a set system Σ = X, S), where S = {,, s n }, ompute a set C {1,, n} of minimum ardinality suh that X = The set over problem is a very important and powerful optimization problem It arises in a vast number of appliations Determining the fewest loations to plae wireless transmitters to over the entire ampus is an example Unfortunately, the set over problem is known to be NP-hard We will present a simple greedy heuristi for this problem How do we determine how good our approximation is? Given an input instane Σ = X, S), let OΣ) denote an optimum over of minimum ardinality) and let GΣ) denote the over produed by our greedy heuristi Clearly, greedy annot have fewer sets than the optimum, and so we have GΣ) OΣ) We say that G ahieves an approximation ratio of ρ if GΣ) ρ OΣ), for any input Σ Ideally, we would like ρ to be as small as possible, say, a small onstant Unfortunately, the best that we an show for set over is that ρ is a slowly growing funtion of m = X, and in partiular ρ = ln m This might strike you as being rather weak, but there are ompelling reasons from the theory of omputational omplexity that logarithmi approximation ratio is the best that we might hope for assuming that P NP With a bit more work, it is possible to improve this slightly to an approximation ratio of ρ = ln m ), where m is the maximum ardinality of any set of S) Greedy Set Cover: A simple greedy approah to set over works by at eah stage seleting the set that overs the greatest number of unovered elements The algorithm is presented in the ode blok below The set C ontains the indies of the sets of the over, and the set U stores the elements of X that are still unovered Initially, C is empty and U X We repeatedly selet the set of S that overs the greatest number of elements of U and add it to the over Greedy Set Cover Greedy-Set-CoverX, S) { U = X // U stores the unovered items C = empty // C stores the sets of the over while U is nonempty) { selet s[i] in S that overs the most elements of U add i to C remove the elements of s[i] from U } return C } i C s i We will not worry about implementing this algorithm in the most effiient manner If we assume that U and the sets s i are eah represented as a simple list of elements of X eah of length at most m), then we an perform eah iteration of the main while loop in time Omn), for a total running time of Omn 2 ) For the example given earlier the greedy-set over algorithm would selet see Fig 2a)), then see Fig 2b)), then see Fig 2)) and finally s 3 see Fig 2d)) Thus, it would return a set over of size four, whereas the optimal set over has size three Leture 9 2 Fall 2017

over overs 3 over s 3 over a) b) ) d) Fig 2: The greedy heuristi Final over is {,,, s 3 } What is the approximation fator? The problem with the greedy heuristi is that it an be fooled into piking the wrong set, over and over again Consider the example shown in Fig 3 involving a universe of 32 elements The optimal set over onsists of sets s 7 and s 8, eah of size 16 Initially all three sets, s 7, and s 8 have 16 elements If ties are broken in the worst possible way, the greedy algorithm will first selet the set We remove all the overed elements Now, s 7 and s 8 all over eight of the remaining elements Again, if we hoose poorly, is hosen The pattern repeats, hoosing s 3 overing four of the remainder), s 4 overing two) and finally s 5 and eah overing one) Although there are ties for the greedy hoie in this example, it is easy to modify the example so that the greedy hoie is unique s 7 s 8 s 5 s 4 s 3 Opt: {s 5, } Fig 3: Repeatedly fooling the greedy heuristi Greedy: {,, s 3, s 4, s 5, } From the pattern, you an see that we an generalize this to any number of elements that is a power of 2 While there is a optimal solution with 2 sets, the greedy algorithm will selet roughly lg m sets, where m = X Reall that lg denotes logarithm base 2, and ln denotes the natural logarithm) Thus, on this example the greedy heuristi ahieves an approximation fator of roughly lg m)/2 There were many ases where ties were broken badly here, but it is possible to redesign the example suh that there are no ties, and yet the algorithm has essentially the same ratio bound We will show that the greedy set over heuristi never performs worse than a fator of ln m Before giving the proof, we need one useful tehnial inequality Leture 9 3 Fall 2017

Lemma: For all > 0, 1 1 ) 1 e where e is the base of the natural logarithm Proof: We use the fat that for any real z positive, zero, or negative), 1 + z e z This follows from the Taylor s expansion e z = 1 + z + z2 2! + z3 3! + 1 + z) Now, if we substitute 1/ for z we have 1 1/) e 1/ By raising both sides to the th power, we have the desired result We now prove the approximation bound Theorem: Given any set system Σ = X, S), let G be the output of the greedy heuristi and let O be an optimum over Then G O ln m, where m = X Proof: We will heat a bit Let denote the size of the optimum set over, and let g denote the size of the greedy set over minu We will show that g ln m Note that we should really show that g + 1 ln m, but this is lose enough and saves us some messy details) Let s onsider how many new elements we over with eah round of the algorithm Initially, there are m 0 = m elements to be overed Let m i denote the number of elements remaining to be overed after i iterations of the greedy algorithm After i 1 rounds there are m i 1 elements that remain to be overed We know that there is a over of size for these elements namely, the optimal over), and so by the pigeonhole prinipal there exists some set that overs at least m i 1 / elements Sine the greedy algorithm selets the set overing the largest number of remaining elements, it must selet a set that overs at least this many elements The number of elements that remain to be overed is at most m i m i 1 m i 1 = m i 1 1 1 ) Thus, with eah iteration the number of remaining elements dereases by a fator of at least 1 1/) If we repeat this i times, we have m i m 0 1 1 ) i = m 1 1 ) i How long an this go on? Sine the greedy heuristi ran for g + 1 iterations, we know that just prior to the last iteration we must have had at least one remaining unovered element, and so we have 1 m g m 1 1 ) g = m 1 1 ) ) g/ In the last step, we just rewrote the expression in a manner that makes it easier to apply the above tehnial lemma) By the above lemma we have ) 1 g/ 1 m e Leture 9 4 Fall 2017

Now, if we multiply by e g/ on both sides and take natural logs we find that g satisfies: e g/ m g ln m g ln m Therefore ignoring the missing +1 as mentioned above) the greedy set over is larger than the optimum set over by a fator of at most ln m Leture 9 5 Fall 2017