242 research outputs found
05201 Abstracts Collection -- Design and Analysis of Randomized and Approximation Algorithms
From 15.05.05 to 20.05.05, the Dagstuhl Seminar 05201 ``Design and Analysis of Randomized and Approximation Algorithms\u27\u27 was held
in the International Conference and Research Center (IBFI),
Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
08201 Abstracts Collection -- Design and Analysis of Randomized and Approximation Algorithms
From 11.05.08 to 16.05.08, the Dagstuhl Seminar 08201
``Design and Analysis of Randomized and Approximation Algorithms\u27\u27
was held in the International Conference and Research Center (IBFI),
Schloss Dagstuhl.
During the seminar, several participants presented their current
research work, and ongoing work and open problems were discussed.
Abstracts of the presentations which were given during the seminar as well as
abstracts of seminar results and ideas are put together in this paper.
The first section describes the seminar topics and goals in general.
Links to extended abstracts or full paper are provided, if available
New Integrality Gap Results for the Firefighters Problem on Trees
The firefighter problem is NP-hard and admits a approximation based
on rounding the canonical LP. In this paper, we first show a matching
integrality gap of on the canonical LP. This result relies
on a powerful combinatorial gadget that can be used to prove integrality gap
results for many problem settings. We also consider the canonical LP augmented
with simple additional constraints (as suggested by Hartke). We provide several
evidences that these constraints improve the integrality gap of the canonical
LP: (i) Extreme points of the new LP are integral for some known tractable
instances and (ii) A natural family of instances that are bad for the canonical
LP admits an improved approximation algorithm via the new LP. We conclude by
presenting a integrality gap instance for the new LP.Comment: 22 page
Approximation Algorithms for Union and Intersection Covering Problems
In a classical covering problem, we are given a set of requests that we need
to satisfy (fully or partially), by buying a subset of items at minimum cost.
For example, in the k-MST problem we want to find the cheapest tree spanning at
least k nodes of an edge-weighted graph. Here nodes and edges represent
requests and items, respectively.
In this paper, we initiate the study of a new family of multi-layer covering
problems. Each such problem consists of a collection of h distinct instances of
a standard covering problem (layers), with the constraint that all layers share
the same set of requests. We identify two main subfamilies of these problems: -
in a union multi-layer problem, a request is satisfied if it is satisfied in at
least one layer; - in an intersection multi-layer problem, a request is
satisfied if it is satisfied in all layers. To see some natural applications,
consider both generalizations of k-MST. Union k-MST can model a problem where
we are asked to connect a set of users to at least one of two communication
networks, e.g., a wireless and a wired network. On the other hand, intersection
k-MST can formalize the problem of connecting a subset of users to both
electricity and water.
We present a number of hardness and approximation results for union and
intersection versions of several standard optimization problems: MST, Steiner
tree, set cover, facility location, TSP, and their partial covering variants
Optimisation problems in wireless sensor networks : Local algorithms and local graphs
This thesis studies optimisation problems related to modern large-scale distributed systems, such as wireless sensor networks and wireless ad-hoc networks. The concrete tasks that we use as motivating examples are the following: (i) maximising the lifetime of a battery-powered wireless sensor network, (ii) maximising the capacity of a wireless communication network, and (iii) minimising the number of sensors in a surveillance application. A sensor node consumes energy both when it is transmitting or forwarding data, and when it is performing measurements. Hence task (i), lifetime maximisation, can be approached from two different perspectives. First, we can seek for optimal data flows that make the most out of the energy resources available in the network; such optimisation problems are examples of so-called max-min linear programs. Second, we can conserve energy by putting redundant sensors into sleep mode; we arrive at the sleep scheduling problem, in which the objective is to find an optimal schedule that determines when each sensor node is asleep and when it is awake. In a wireless network simultaneous radio transmissions may interfere with each other. Task (ii), capacity maximisation, therefore gives rise to another scheduling problem, the activity scheduling problem, in which the objective is to find a minimum-length conflict-free schedule that satisfies the data transmission requirements of all wireless communication links. Task (iii), minimising the number of sensors, is related to the classical graph problem of finding a minimum dominating set. However, if we are not only interested in detecting an intruder but also locating the intruder, it is not sufficient to solve the dominating set problem; formulations such as minimum-size identifying codes and locating–dominating codes are more appropriate. This thesis presents approximation algorithms for each of these optimisation problems, i.e., for max-min linear programs, sleep scheduling, activity scheduling, identifying codes, and locating–dominating codes. Two complementary approaches are taken. The main focus is on local algorithms, which are constant-time distributed algorithms. The contributions include local approximation algorithms for max-min linear programs, sleep scheduling, and activity scheduling. In the case of max-min linear programs, tight upper and lower bounds are proved for the best possible approximation ratio that can be achieved by any local algorithm. The second approach is the study of centralised polynomial-time algorithms in local graphs – these are geometric graphs whose structure exhibits spatial locality. Among other contributions, it is shown that while identifying codes and locating–dominating codes are hard to approximate in general graphs, they admit a polynomial-time approximation scheme in local graphs
- …