14 research outputs found

    Approximating minimum cost connectivity problems

    Get PDF
    We survey approximation algorithms of connectivity problems. The survey presented describing various techniques. In the talk the following techniques and results are presented. 1)Outconnectivity: Its well known that there exists a polynomial time algorithm to solve the problems of finding an edge k-outconnected from r subgraph [EDMONDS] and a vertex k-outconnectivity subgraph from r [Frank-Tardos] . We show how to use this to obtain a ratio 2 approximation for the min cost edge k-connectivity problem. 2)The critical cycle theorem of Mader: We state a fundamental theorem of Mader and use it to provide a 1+(k-1)/n ratio approximation for the min cost vertex k-connected subgraph, in the metric case. We also show results for the min power vertex k-connected problem using this lemma. We show that the min power is equivalent to the min-cost case with respect to approximation. 3)Laminarity and uncrossing: We use the well known laminarity of a BFS solution and show a simple new proof due to Ravi et al for Jain\u27s 2 approximation for Steiner network

    Approximating the generalized terminal backup problem via half-integral multiflow relaxation

    Get PDF
    We consider a network design problem called the generalized terminal backup problem. Whereas earlier work investigated the edge-connectivity constraints only, we consider both edge- and node-connectivity constraints for this problem. A major contribution of this paper is the development of a strongly polynomial-time 4/3-approximation algorithm for the problem. Specifically, we show that a linear programming relaxation of the problem is half-integral, and that the half-integral optimal solution can be rounded to a 4/3-approximate solution. We also prove that the linear programming relaxation of the problem with the edge-connectivity constraints is equivalent to minimizing the cost of half-integral multiflows that satisfy flow demands given from terminals. This observation presents a strongly polynomial-time algorithm for computing a minimum cost half-integral multiflow under flow demand constraints

    Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal

    Get PDF
    In the Minimum Bounded Degree Spanning Tree problem, we are given an undirected graph G=(V,E) with a degree upper bound Bv on each vertex v∈V, and the task is to find a spanning tree of minimum cost that satisfies all the degree bounds. Let OPT be the cost of an optimal solution to this problem. In this paper, we present a polynomial time algorithm which returns a spanning tree T of cost at most OPT and dT(v)≤Bv+1 for all v, where dT(v) denotes the degree of v in T. This generalizes a result of Fürer and Raghavachari [1994] to weighted graphs, and settles a conjecture of Goemans [2006] affirmatively. The algorithm generalizes when each vertex v has a degree lower bound Av and a degree upper bound Bv, and returns a spanning tree with cost at most OPT and Av−1≤dT(v) ≤ Bv+1 for all v ∈ V. This is essentially the best possible. The main technique used is an extension of the iterative rounding method introduced by Jain [2001] for the design of approximation algorithms

    Single-Sink Network Design with Vertex Connectivity Requirements

    Get PDF
    We study single-sink network design problems in undirected graphs with vertex connectivity requirements. The input to these problems is an edge-weighted undirected graph G=(V,E)G=(V,E), a sink/root vertex rr, a set of terminals TsubseteqVT subseteq V, and integer kk. The goal is to connect each terminal tinTt in T to rr via kk emph{vertex-disjoint} paths. In the {em connectivity} problem, the objective is to find a min-cost subgraph of GG that contains the desired paths. There is a 22-approximation for this problem when kle2k le 2 cite{FleischerJW} but for kge3k ge 3, the first non-trivial approximation was obtained in the recent work of Chakraborty, Chuzhoy and Khanna cite{ChakCK08}; they describe and analyze an algorithm with an approximation ratio of O(kO(k2)log4n)O(k^{O(k^2)}log^4 n) where n=∣V∣n=|V|. In this paper, inspired by the results and ideas in cite{ChakCK08}, we show an O(kO(k)log∣T∣)O(k^{O(k)}log |T|)-approximation bound for a simple greedy algorithm. Our analysis is based on the dual of a natural linear program and is of independent technical interest. We use the insights from this analysis to obtain an O(kO(k)log∣T∣)O(k^{O(k)}log |T|)-approximation for the more general single-sink {em rent-or-buy} network design problem with vertex connectivity requirements. We further extend the ideas to obtain a poly-logarithmic approximation for the single-sink {em buy-at-bulk} problem when k=2k=2 and the number of cable-types is a fixed constant; we believe that this should extend to any fixed kk. We also show that for the non-uniform buy-at-bulk problem, for each fixed kk, a small variant of a simple algorithm suggested by Charikar and Kargiazova cite{CharikarK05} for the case of k=1k=1 gives an 2O(sqrtlog∣T∣)2^{O(sqrt{log |T|})} approximation for larger kk. These results show that for each of these problems, simple and natural algorithms that have been developed for k=1k=1 have good performance for small k>1k > 1

    Secure Data Collection in Constrained Tree-Based Smart Grid Environments

    Get PDF
    To facilitate more efficient control, massive amounts of sensors or measurement devices will be deployed in the Smart Grid. Data collection then becomes non-trivial. In this paper, we study the scenario where a data collector is responsible for collecting data from multiple measurement devices, but only some of them can communicate with the data collector directly. Others have to rely on other devices to relay the data. We first develop a communication protocol so that the data reported by each device is protected again honest-but-curious data collector and devices. To reduce the time to collect data from all devices within a certain security level, we formulate our approach as an integer linear programming problem. As the problem is NP-hard, obtaining the optimal solution in a large network is not very feasible. We thus develop an approximation algorithm to solve the problem. We test the performance of our algorithm using real topologies. The results show that our algorithm successfully identifies good solutions within reasonable amount of time.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/111643/1/Uludag_IEEE_SGC_14.pd

    The Complexity of Network Design for s-t Eff ective Resistance

    Get PDF
    We consider a new problem of designing a network with small ss-tt effective resistance. In this problem, we are given an undirected graph G=(V,E)G=(V,E) where each edge ee has a cost cec_e and a resistance rer_e, two designated vertices s,t∈Vs,t \in V, and a cost budget kk. Our goal is to choose a subgraph to minimize the ss-tt effective resistance, subject to the constraint that the total cost in the subgraph is at most kk. This problem has applications in electrical network design and is an interpolation between the shortest path problem and the minimum cost flow problem. We present algorithmic and hardness results for this problem. On the hardness side, we show that the problem is NP-hard by reducing the 3-dimensional matching problem to our problem. On the algorithmic side, we use dynamic programming to obtain a fully polynomial time approximation scheme when the input graph is a series-parallel graph. Finally, we propose a greedy algorithm for general graphs in which we add a path at each iteration and we conjecture that the algorithm is a 3.953.95-approximation algorithm for the problem

    Isolating Cuts, (Bi-)Submodularity, and Faster Algorithms for Connectivity

    Get PDF
    Li and Panigrahi [Jason Li and Debmalya Panigrahi, 2020], in recent work, obtained the first deterministic algorithm for the global minimum cut of a weighted undirected graph that runs in time o(mn). They introduced an elegant and powerful technique to find isolating cuts for a terminal set in a graph via a small number of s-t minimum cut computations. In this paper we generalize their isolating cut approach to the abstract setting of symmetric bisubmodular functions (which also capture symmetric submodular functions). Our generalization to bisubmodularity is motivated by applications to element connectivity and vertex connectivity. Utilizing the general framework and other ideas we obtain significantly faster randomized algorithms for computing global (and subset) connectivity in a number of settings including hypergraphs, element connectivity and vertex connectivity in graphs, and for symmetric submodular functions
    corecore