119 research outputs found

    Square Integer Heffter Arrays with Empty Cells

    Full text link
    A Heffter array H(m,n;s,t)H(m,n;s,t) is an m×nm \times n matrix with nonzero entries from Z2ms+1\mathbb{Z}_{2ms+1} such that i)i) each row contains ss filled cells and each column contains tt filled cells, ii)ii) every row and column sum to 0, and iii)iii) no element from {x,−x}\{x,-x\} appears twice. Heffter arrays are useful in embedding the complete graph K2nm+1K_{2nm+1} on an orientable surface where the embedding has the property that each edge borders exactly one s−s-cycle and one t−t-cycle. Archdeacon, Boothby and Dinitz proved that these arrays can be constructed in the case when s=ms=m, i.e. every cell is filled. In this paper we concentrate on square arrays with empty cells where every row sum and every column sum is 00 in Z\mathbb{Z}. We solve most of the instances of this case.Comment: 20 pages, including 2 figure

    Near-linear Time Algorithm for Approximate Minimum Degree Spanning Trees

    Full text link
    Given a graph G=(V,E)G = (V, E), we wish to compute a spanning tree whose maximum vertex degree, i.e. tree degree, is as small as possible. Computing the exact optimal solution is known to be NP-hard, since it generalizes the Hamiltonian path problem. For the approximation version of this problem, a O~(mn)\tilde{O}(mn) time algorithm that computes a spanning tree of degree at most Δ∗+1\Delta^* +1 is previously known [F\"urer \& Raghavachari 1994]; here Δ∗\Delta^* denotes the minimum tree degree of all the spanning trees. In this paper we give the first near-linear time approximation algorithm for this problem. Specifically speaking, we propose an O~(1Ï”7m)\tilde{O}(\frac{1}{\epsilon^7}m) time algorithm that computes a spanning tree with tree degree (1+Ï”)Δ∗+O(1Ï”2log⁥n)(1+\epsilon)\Delta^* + O(\frac{1}{\epsilon^2}\log n) for any constant ϔ∈(0,16)\epsilon \in (0,\frac{1}{6}). Thus, when Δ∗=ω(log⁥n)\Delta^*=\omega(\log n), we can achieve approximate solutions with constant approximate ratio arbitrarily close to 1 in near-linear time.Comment: 17 page

    Secretary Problems: Weights and Discounts

    Get PDF
    The classical secretary problem studies the problem of selecting online an element (a “secretary”) with maximum value in a randomly ordered sequence. The difficulty lies in the fact that an element must be either selected or discarded upon its arrival, and this decision is irrevocable. Constant-competitive algorithms are known for the classical secretary problems and several variants. We study the following two extensions of the secretary problem: In the discounted secretary problem, there is a time-dependent “discount” factor d(t)d(t), and the benefit derived from selecting an element/secretary e at time t is d(t)v(e)d(t)v(e). For this problem with arbitrary (not necessarily decreasing) functions d(t)d(t), we show a constant-competitive algorithm when the expected optimum is known in advance. With no prior knowledge, we exhibit a lower bound and give a nearly matching O(logn)O(log n)-competitive algorithm. In the weighted secretary problem, up to K secretaries can be selected; when a secretary is selected (s)he must be irrevocably assigned to one of K positions, with position k having weight w(k)w(k), and assigning object/secretary e to position k has benefit w(k)v(e)w(k)v(e). The goal is to select secretaries and assign them to positions to maximize the sum of w(k)v(ek)w(k)v(e_k) where eke_k is the secretary assigned to position k. We give constant-competitive algorithms for this problem. Most of these results can also be extended to the matroid secretary case for a large family of matroids with a constant-factor loss, and an O(log rank) loss for general matroids. These results are based on a reduction from various matroids to partition matroids which present a unified approach to many of the upper bounds of Babaioff et al. These problems have connections to online mechanism design. All our algorithms are monotone, and hence lead to truthful mechanisms for the corresponding online auction problems

    Packing Returning Secretaries

    Full text link
    We study online secretary problems with returns in combinatorial packing domains with nn candidates that arrive sequentially over time in random order. The goal is to accept a feasible packing of candidates of maximum total value. In the first variant, each candidate arrives exactly twice. All 2n2n arrivals occur in random order. We propose a simple 0.5-competitive algorithm that can be combined with arbitrary approximation algorithms for the packing domain, even when the total value of candidates is a subadditive function. For bipartite matching, we obtain an algorithm with competitive ratio at least 0.5721−o(1)0.5721 - o(1) for growing nn, and an algorithm with ratio at least 0.54590.5459 for all n≄1n \ge 1. We extend all algorithms and ratios to k≄2k \ge 2 arrivals per candidate. In the second variant, there is a pool of undecided candidates. In each round, a random candidate from the pool arrives. Upon arrival a candidate can be either decided (accept/reject) or postponed (returned into the pool). We mainly focus on minimizing the expected number of postponements when computing an optimal solution. An expected number of Θ(nlog⁥n)\Theta(n \log n) is always sufficient. For matroids, we show that the expected number can be reduced to O(rlog⁥(n/r))O(r \log (n/r)), where r≀n/2r \le n/2 is the minimum of the ranks of matroid and dual matroid. For bipartite matching, we show a bound of O(rlog⁥n)O(r \log n), where rr is the size of the optimum matching. For general packing, we show a lower bound of Ω(nlog⁥log⁥n)\Omega(n \log \log n), even when the size of the optimum is r=Θ(log⁥n)r = \Theta(\log n).Comment: 23 pages, 5 figure

    Finite geometries and diffractive orbits in isospectral billiards

    Full text link
    Several examples of pairs of isospectral planar domains have been produced in the two-dimensional Euclidean space by various methods. We show that all these examples rely on the symmetry between points and blocks in finite projective spaces; from the properties of these spaces, one can derive a relation between Green functions as well as a relation between diffractive orbits in isospectral billiards.Comment: 10 page

    An Improved Upper Bound for the Ring Loading Problem

    Full text link
    The Ring Loading Problem emerged in the 1990s to model an important special case of telecommunication networks (SONET rings) which gained attention from practitioners and theorists alike. Given an undirected cycle on nn nodes together with non-negative demands between any pair of nodes, the Ring Loading Problem asks for an unsplittable routing of the demands such that the maximum cumulated demand on any edge is minimized. Let LL be the value of such a solution. In the relaxed version of the problem, each demand can be split into two parts where the first part is routed clockwise while the second part is routed counter-clockwise. Denote with L∗L^* the maximum load of a minimum split routing solution. In a landmark paper, Schrijver, Seymour and Winkler [SSW98] showed that L≀L∗+1.5DL \leq L^* + 1.5D, where DD is the maximum demand value. They also found (implicitly) an instance of the Ring Loading Problem with L=L∗+1.01DL = L^* + 1.01D. Recently, Skutella [Sku16] improved these bounds by showing that L≀L∗+1914DL \leq L^* + \frac{19}{14}D, and there exists an instance with L=L∗+1.1DL = L^* + 1.1D. We contribute to this line of research by showing that L≀L∗+1.3DL \leq L^* + 1.3D. We also take a first step towards lower and upper bounds for small instances

    On the Approximability and Hardness of the Minimum Connected Dominating Set with Routing Cost Constraint

    Full text link
    In the problem of minimum connected dominating set with routing cost constraint, we are given a graph G=(V,E)G=(V,E), and the goal is to find the smallest connected dominating set DD of GG such that, for any two non-adjacent vertices uu and vv in GG, the number of internal nodes on the shortest path between uu and vv in the subgraph of GG induced by DâˆȘ{u,v}D \cup \{u,v\} is at most α\alpha times that in GG. For general graphs, the only known previous approximability result is an O(log⁥n)O(\log n)-approximation algorithm (n=∣V∣n=|V|) for α=1\alpha = 1 by Ding et al. For any constant α>1\alpha > 1, we give an O(n1−1α(log⁥n)1α)O(n^{1-\frac{1}{\alpha}}(\log n)^{\frac{1}{\alpha}})-approximation algorithm. When α≄5\alpha \geq 5, we give an O(nlog⁥n)O(\sqrt{n}\log n)-approximation algorithm. Finally, we prove that, when α=2\alpha =2, unless NP⊆DTIME(npolylog⁥n)NP \subseteq DTIME(n^{poly\log n}), for any constant Ï”>0\epsilon > 0, the problem admits no polynomial-time 2log⁥1−ϔn2^{\log^{1-\epsilon}n}-approximation algorithm, improving upon the Ω(log⁥n)\Omega(\log n) bound by Du et al. (albeit under a stronger hardness assumption)

    Single source unsplittable flows with arc-wise lower and upper bounds

    Get PDF
    In a digraph with a source and several destination nodes with associated demands, an unsplittable flow routes each demand along a single path from the common source to its destination. Given some flow x that is not necessarily unsplittable but satisfies all demands, it is a natural question to ask for an unsplittable flow y that does not deviate from x by too much, i.e., ya≈xa for all arcs a. Twenty years ago, in a landmark paper, Dinitz et al. (Combinatorica 19:17–41, 1999) proved that there exists an unsplittable flow y such that ya≀xa+dmax for all arcs a, where dmax denotes the maximum demand value. Our first contribution is a considerably simpler one-page proof for this classical result, based upon an entirely new approach. Secondly, using a subtle variant of this approach, we obtain a new result: There is an unsplittable flow y such that ya≄xa−dmax for all arcs a. Finally, building upon an iterative rounding technique previously introduced by Kolliopoulos and Stein (SIAM J Comput 31:919–946, 2002) and Skutella (Math Program 91:493–514, 2002), we prove existence of an unsplittable flow that simultaneously satisfies the upper and lower bounds for the special case when demands are integer multiples of each other. For arbitrary demand values, we prove the weaker simultaneous bounds xa/2−dmax≀ya≀2xa+dmax for all arcs a.TU Berlin, Open-Access-Mittel – 202

    Perfect Hash Families: The Generalization to Higher Indices

    Get PDF
    Perfect hash families are often represented as combinatorial arrays encoding partitions of kitems into v classes, so that every t or fewer of the items are completely separated by at least a specified number of chosen partitions. This specified number is the index of the hash family. The case when each t-set must be separated at least once has been extensively researched; they arise in diverse applications, both directly and as fundamental ingredients in a column replacement strategy for a variety of combinatorial arrays. In this paper, construction techniques and algorithmic methods for constructing perfect hash families are surveyed, in order to explore extensions to the situation when each t-set must be separated by more than one partition.https://digitalcommons.usmalibrary.org/books/1029/thumbnail.jp
    • 

    corecore