55 research outputs found

    Hardness of Approximating Bounded-Degree Max 2-CSP and Independent Set on k-Claw-Free Graphs

    Full text link
    We consider the question of approximating Max 2-CSP where each variable appears in at most dd constraints (but with possibly arbitrarily large alphabet). There is a simple (d+12)(\frac{d+1}{2})-approximation algorithm for the problem. We prove the following results for any sufficiently large dd: - Assuming the Unique Games Conjecture (UGC), it is NP-hard (under randomized reduction) to approximate this problem to within a factor of (d2−o(d))\left(\frac{d}{2} - o(d)\right). - It is NP-hard (under randomized reduction) to approximate the problem to within a factor of (d3−o(d))\left(\frac{d}{3} - o(d)\right). Thanks to a known connection [Dvorak et al., Algorithmica 2023], we establish the following hardness results for approximating Maximum Independent Set on kk-claw-free graphs: - Assuming the Unique Games Conjecture (UGC), it is NP-hard (under randomized reduction) to approximate this problem to within a factor of (k4−o(k))\left(\frac{k}{4} - o(k)\right). - It is NP-hard (under randomized reduction) to approximate the problem to within a factor of (k3+22−o(k))≥(k5.829−o(k))\left(\frac{k}{3 + 2\sqrt{2}} - o(k)\right) \geq \left(\frac{k}{5.829} - o(k)\right). In comparison, known approximation algorithms achieve (k2−o(k))\left(\frac{k}{2} - o(k)\right)-approximation in polynomial time [Neuwohner, STACS 2021; Thiery and Ward, SODA 2023] and (k3+o(k))(\frac{k}{3} + o(k))-approximation in quasi-polynomial time [Cygan et al., SODA 2013]

    Approximability of Combinatorial Optimization Problems on Power Law Networks

    Get PDF
    One of the central parts in the study of combinatorial optimization is to classify the NP-hard optimization problems in terms of their approximability. In this thesis we study the Minimum Vertex Cover (Min-VC) problem and the Minimum Dominating Set (Min-DS) problem in the context of so called power law graphs. This family of graphs is motivated by recent findings on the degree distribution of existing real-world networks such as the Internet, the World-Wide Web, biological networks and social networks. In a power law graph the number of nodes yi of a given degree i is proportional to i-ß, that is, the distribution of node degrees follows a power law. The parameter ß > 0 is the so called power law exponent. With the aim of classifying the above combinatorial optimization problems, we are pursuing two basic approaches in this thesis. One is concerned with complexity theory and the other with the theory of algorithms. As a result, our main contributions to the classification of the problems Min-VC and Min-DS in the context of power law graphs are twofold: - Firstly, we give substantial improvements on the previously known approximation lower bounds for Min-VC and Min-DS in combinatorial power law graphs. More precisely, we are going to show the APX-hardness of Min-VC and Min-DS in connected power law graphs and give constant factor lower bounds for Min-VC and the first logarithmic lower bounds for Min-DS in this setting. The results are based on new approximation-preserving embedding reductions that embed certain instances of Min-VC and Min-DS into connected power law graphs. - Secondly, we design a new approximation algorithm for the Min-VC problem in random power law graphs with an expected approximation ratio strictly less than 2. The main tool is a deterministic rounding procedure that acts on a half-integral solution for Min-VC and produces a good approximation on the subset of low degree vertices. Moreover, for the case of Min-DS, we improve on the previously best upper bounds that rely on a greedy algorithm. The improvements are based on our new techniques for determining upper and lower bounds on the size and the volume of node intervals in power law graphs

    LIPIcs, Volume 248, ISAAC 2022, Complete Volume

    Get PDF
    LIPIcs, Volume 248, ISAAC 2022, Complete Volum

    LIPIcs, Volume 244, ESA 2022, Complete Volume

    Get PDF
    LIPIcs, Volume 244, ESA 2022, Complete Volum

    A survey of parameterized algorithms and the complexity of edge modification

    Get PDF
    The survey is a comprehensive overview of the developing area of parameterized algorithms for graph modification problems. It describes state of the art in kernelization, subexponential algorithms, and parameterized complexity of graph modification. The main focus is on edge modification problems, where the task is to change some adjacencies in a graph to satisfy some required properties. To facilitate further research, we list many open problems in the area.publishedVersio

    Breaking Instance-Independent Symmetries In Exact Graph Coloring

    Full text link
    Code optimization and high level synthesis can be posed as constraint satisfaction and optimization problems, such as graph coloring used in register allocation. Graph coloring is also used to model more traditional CSPs relevant to AI, such as planning, time-tabling and scheduling. Provably optimal solutions may be desirable for commercial and defense applications. Additionally, for applications such as register allocation and code optimization, naturally-occurring instances of graph coloring are often small and can be solved optimally. A recent wave of improvements in algorithms for Boolean satisfiability (SAT) and 0-1 Integer Linear Programming (ILP) suggests generic problem-reduction methods, rather than problem-specific heuristics, because (1) heuristics may be upset by new constraints, (2) heuristics tend to ignore structure, and (3) many relevant problems are provably inapproximable. Problem reductions often lead to highly symmetric SAT instances, and symmetries are known to slow down SAT solvers. In this work, we compare several avenues for symmetry breaking, in particular when certain kinds of symmetry are present in all generated instances. Our focus on reducing CSPs to SAT allows us to leverage recent dramatic improvement in SAT solvers and automatically benefit from future progress. We can use a variety of black-box SAT solvers without modifying their source code because our symmetry-breaking techniques are static, i.e., we detect symmetries and add symmetry breaking predicates (SBPs) during pre-processing. An important result of our work is that among the types of instance-independent SBPs we studied and their combinations, the simplest and least complete constructions are the most effective. Our experiments also clearly indicate that instance-independent symmetries should mostly be processed together with instance-specific symmetries rather than at the specification level, contrary to what has been suggested in the literature

    27th Annual European Symposium on Algorithms: ESA 2019, September 9-11, 2019, Munich/Garching, Germany

    Get PDF
    • …
    corecore