20,964 research outputs found

    Approximating subset kk-connectivity problems

    Get PDF
    A subset TVT \subseteq V of terminals is kk-connected to a root ss in a directed/undirected graph JJ if JJ has kk internally-disjoint vsvs-paths for every vTv \in T; TT is kk-connected in JJ if TT is kk-connected to every sTs \in T. We consider the {\sf Subset kk-Connectivity Augmentation} problem: given a graph G=(V,E)G=(V,E) with edge/node-costs, node subset TVT \subseteq V, and a subgraph J=(V,EJ)J=(V,E_J) of GG such that TT is kk-connected in JJ, find a minimum-cost augmenting edge-set FEEJF \subseteq E \setminus E_J such that TT is (k+1)(k+1)-connected in JFJ \cup F. The problem admits trivial ratio O(T2)O(|T|^2). We consider the case T>k|T|>k and prove that for directed/undirected graphs and edge/node-costs, a ρ\rho-approximation for {\sf Rooted Subset kk-Connectivity Augmentation} implies the following ratios for {\sf Subset kk-Connectivity Augmentation}: (i) b(ρ+k)+(3TTk)2H(3TTk)b(\rho+k) + {(\frac{3|T|}{|T|-k})}^2 H(\frac{3|T|}{|T|-k}); (ii) ρO(TTklogk)\rho \cdot O(\frac{|T|}{|T|-k} \log k), where b=1 for undirected graphs and b=2 for directed graphs, and H(k)H(k) is the kkth harmonic number. The best known values of ρ\rho on undirected graphs are min{T,O(k)}\min\{|T|,O(k)\} for edge-costs and min{T,O(klogT)}\min\{|T|,O(k \log |T|)\} for node-costs; for directed graphs ρ=T\rho=|T| for both versions. Our results imply that unless k=To(T)k=|T|-o(|T|), {\sf Subset kk-Connectivity Augmentation} admits the same ratios as the best known ones for the rooted version. This improves the ratios in \cite{N-focs,L}

    Approximating Minimum-Cost k-Node Connected Subgraphs via Independence-Free Graphs

    Full text link
    We present a 6-approximation algorithm for the minimum-cost kk-node connected spanning subgraph problem, assuming that the number of nodes is at least k3(k1)+kk^3(k-1)+k. We apply a combinatorial preprocessing, based on the Frank-Tardos algorithm for kk-outconnectivity, to transform any input into an instance such that the iterative rounding method gives a 2-approximation guarantee. This is the first constant-factor approximation algorithm even in the asymptotic setting of the problem, that is, the restriction to instances where the number of nodes is lower bounded by a function of kk.Comment: 20 pages, 1 figure, 28 reference

    More Applications of the d-Neighbor Equivalence: Connectivity and Acyclicity Constraints

    Get PDF
    In this paper, we design a framework to obtain efficient algorithms for several problems with a global constraint (acyclicity or connectivity) such as Connected Dominating Set, Node Weighted Steiner Tree, Maximum Induced Tree, Longest Induced Path, and Feedback Vertex Set. For all these problems, we obtain 2^O(k)* n^O(1), 2^O(k log(k))* n^O(1), 2^O(k^2) * n^O(1) and n^O(k) time algorithms parameterized respectively by clique-width, Q-rank-width, rank-width and maximum induced matching width. Our approach simplifies and unifies the known algorithms for each of the parameters and match asymptotically also the running time of the best algorithms for basic NP-hard problems such as Vertex Cover and Dominating Set. Our framework is based on the d-neighbor equivalence defined in [Bui-Xuan, Telle and Vatshelle, TCS 2013]. The results we obtain highlight the importance and the generalizing power of this equivalence relation on width measures. We also prove that this equivalence relation could be useful for Max Cut: a W[1]-hard problem parameterized by clique-width. For this latter problem, we obtain n^O(k), n^O(k) and n^(2^O(k)) time algorithm parameterized by clique-width, Q-rank-width and rank-width

    Approximating Source Location and Star Survivable Network Problems

    Full text link
    In Source Location (SL) problems the goal is to select a mini-mum cost source set SVS \subseteq V such that the connectivity (or flow) ψ(S,v)\psi(S,v) from SS to any node vv is at least the demand dvd_v of vv. In many SL problems ψ(S,v)=dv\psi(S,v)=d_v if vSv \in S, namely, the demand of nodes selected to SS is completely satisfied. In a node-connectivity variant suggested recently by Fukunaga, every node vv gets a "bonus" pvdvp_v \leq d_v if it is selected to SS. Fukunaga showed that for undirected graphs one can achieve ratio O(klnk)O(k \ln k) for his variant, where k=maxvVdvk=\max_{v \in V}d_v is the maximum demand. We improve this by achieving ratio \min\{p^*\lnk,k\}\cdot O(\ln (k/q^*)) for a more general version with node capacities, where p=maxvVpvp^*=\max_{v \in V} p_v is the maximum bonus and q=minvVqvq^*=\min_{v \in V} q_v is the minimum capacity. In particular, for the most natural case p=1p^*=1 considered by Fukunaga, we improve the ratio from O(klnk)O(k \ln k) to O(ln2k)O(\ln^2k). We also get ratio O(k)O(k) for the edge-connectivity version, for which no ratio that depends on kk only was known before. To derive these results, we consider a particular case of the Survivable Network (SN) problem when all edges of positive cost form a star. We give ratio O(min{lnn,ln2k})O(\min\{\ln n,\ln^2 k\}) for this variant, improving over the best ratio known for the general case O(k3lnn)O(k^3 \ln n) of Chuzhoy and Khanna

    Distributed Edge Connectivity in Sublinear Time

    Full text link
    We present the first sublinear-time algorithm for a distributed message-passing network sto compute its edge connectivity λ\lambda exactly in the CONGEST model, as long as there are no parallel edges. Our algorithm takes O~(n11/353D1/353+n11/706)\tilde O(n^{1-1/353}D^{1/353}+n^{1-1/706}) time to compute λ\lambda and a cut of cardinality λ\lambda with high probability, where nn and DD are the number of nodes and the diameter of the network, respectively, and O~\tilde O hides polylogarithmic factors. This running time is sublinear in nn (i.e. O~(n1ϵ)\tilde O(n^{1-\epsilon})) whenever DD is. Previous sublinear-time distributed algorithms can solve this problem either (i) exactly only when λ=O(n1/8ϵ)\lambda=O(n^{1/8-\epsilon}) [Thurimella PODC'95; Pritchard, Thurimella, ACM Trans. Algorithms'11; Nanongkai, Su, DISC'14] or (ii) approximately [Ghaffari, Kuhn, DISC'13; Nanongkai, Su, DISC'14]. To achieve this we develop and combine several new techniques. First, we design the first distributed algorithm that can compute a kk-edge connectivity certificate for any k=O(n1ϵ)k=O(n^{1-\epsilon}) in time O~(nk+D)\tilde O(\sqrt{nk}+D). Second, we show that by combining the recent distributed expander decomposition technique of [Chang, Pettie, Zhang, SODA'19] with techniques from the sequential deterministic edge connectivity algorithm of [Kawarabayashi, Thorup, STOC'15], we can decompose the network into a sublinear number of clusters with small average diameter and without any mincut separating a cluster (except the `trivial' ones). Finally, by extending the tree packing technique from [Karger STOC'96], we can find the minimum cut in time proportional to the number of components. As a byproduct of this technique, we obtain an O~(n)\tilde O(n)-time algorithm for computing exact minimum cut for weighted graphs.Comment: Accepted at 51st ACM Symposium on Theory of Computing (STOC 2019

    Streaming Complexity of Spanning Tree Computation

    Get PDF
    The semi-streaming model is a variant of the streaming model frequently used for the computation of graph problems. It allows the edges of an n-node input graph to be read sequentially in p passes using Õ(n) space. If the list of edges includes deletions, then the model is called the turnstile model; otherwise it is called the insertion-only model. In both models, some graph problems, such as spanning trees, k-connectivity, densest subgraph, degeneracy, cut-sparsifier, and (Δ+1)-coloring, can be exactly solved or (1+ε)-approximated in a single pass; while other graph problems, such as triangle detection and unweighted all-pairs shortest paths, are known to require Ω̃(n) passes to compute. For many fundamental graph problems, the tractability in these models is open. In this paper, we study the tractability of computing some standard spanning trees, including BFS, DFS, and maximum-leaf spanning trees. Our results, in both the insertion-only and the turnstile models, are as follows. Maximum-Leaf Spanning Trees: This problem is known to be APX-complete with inapproximability constant ρ ∈ [245/244, 2). By constructing an ε-MLST sparsifier, we show that for every constant ε > 0, MLST can be approximated in a single pass to within a factor of 1+ε w.h.p. (albeit in super-polynomial time for ε ≤ ρ-1 assuming P ≠ NP) and can be approximated in polynomial time in a single pass to within a factor of ρ_n+ε w.h.p., where ρ_n is the supremum constant that MLST cannot be approximated to within using polynomial time and Õ(n) space. In the insertion-only model, these algorithms can be deterministic. BFS Trees: It is known that BFS trees require ω(1) passes to compute, but the naïve approach needs O(n) passes. We devise a new randomized algorithm that reduces the pass complexity to O(√n), and it offers a smooth tradeoff between pass complexity and space usage. This gives a polynomial separation between single-source and all-pairs shortest paths for unweighted graphs. DFS Trees: It is unknown whether DFS trees require more than one pass. The current best algorithm by Khan and Mehta [STACS 2019] takes Õ(h) passes, where h is the height of computed DFS trees. Note that h can be as large as Ω(m/n) for n-node m-edge graphs. Our contribution is twofold. First, we provide a simple alternative proof of this result, via a new connection to sparse certificates for k-node-connectivity. Second, we present a randomized algorithm that reduces the pass complexity to O(√n), and it also offers a smooth tradeoff between pass complexity and space usage.ISSN:1868-896
    corecore