• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

A Factor 2 approximation algorithm for the generalized steiner network problem. (2001)

by K Jain
Venue:Combinatorica
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 266
Next 10 →

Approximation Algorithms for Directed Steiner Problems

by Moses Charikar, Chandra Chekuri, To-yat Cheung, Zuo Dai, Ashish Goel, Sudipto Guha, Ming Li - Journal of Algorithms , 1998
"... We give the first non-trivial approximation algorithms for the Steiner tree problem and the generalized Steiner network problem on general directed graphs. These problems have several applications in network design and multicast routing. For both problems, the best ratios known before our work we ..."
Abstract - Cited by 178 (8 self) - Add to MetaCart
We give the first non-trivial approximation algorithms for the Steiner tree problem and the generalized Steiner network problem on general directed graphs. These problems have several applications in network design and multicast routing. For both problems, the best ratios known before our work were the trivial O(k)-approximations. For the directed Steiner tree problem, we design a family of algorithms that achieves an approximation ratio of i(i \Gamma 1)k 1=i in time O(n i k 2i ) for any fixed i ? 1, where k is the number of terminals. Thus, an O(k ffl ) approximation ratio can be achieved in polynomial time for any fixed ffl ? 0. Setting i = log k, we obtain an O(log 2 k) approximation ratio in quasi-polynomial time. For the directed generalized Steiner network problem, we give an algorithm that achieves an approximation ratio of O(k 2=3 log 1=3 k), where k is the number of pairs of vertices that are to be connected. Related problems including the group Steiner...
(Show Context)

Citation Context

... general case where each pair has a connectivity requirement r ij (the number of edge disjoint paths required 2 for the pair (i; j)) and R is the maximum connectivity requirement. Very recently, Jain =-=[15]-=- gave a factor 2 approximation algorithm for this problem. In this paper we restrict ourselves to the case where r ij = 1 for all pairs. A fairly easy reduction from the Set cover problem shows that i...

The primal-dual method for approximation algorithms and its application to network design problems.

by David P Williamson , 1997
"... Abstract In this survey, we give an overview of a technique used to design and analyze algorithms that provide approximate solutions to N P -hard problems in combinatorial optimization. Because of parallels with the primal-dual method commonly used in combinatorial optimization, we call it the prim ..."
Abstract - Cited by 137 (5 self) - Add to MetaCart
Abstract In this survey, we give an overview of a technique used to design and analyze algorithms that provide approximate solutions to N P -hard problems in combinatorial optimization. Because of parallels with the primal-dual method commonly used in combinatorial optimization, we call it the primal-dual method for approximation algorithms. We show how this technique can be used to derive approximation algorithms for a number of different problems, including network design problems, feedback vertex set problems, and facility location problems.
(Show Context)

Citation Context

...2Hk-approximation algorithm. Goemans et al. [39] show that their algorithm extends to the case of weakly supermodular functions f , a generalization of proper functions, when the minimally violated sets can be found in polynomial time (as they can for proper f); a function f is weakly supermodular if f(V ) = 0 and for all A, B ⊆ V , either f(A) + f(B) ≤ f(A ∩B) + f(A ∪ B) or f(A) + f(B) ≤ f(A− B) + f(B − A). Mihail, Shallcross, Dean and Mostrel [58] implemented a variation of this algorithm for use in a telephone network design toolkit, and found that it works well in practice. Recently, Jain [49] gave a non-primal-dual 2-approximation algorithm for (ND) for any weakly supermodular function f (assuming a certain polynomial-time separation oracle for f) by showing 14 that any basic solution to the LP relaxation will always contain some e ∈ E for which xe ≥ 1/2. The performance guarantee is obtained by rounding the value for this edge up to 1, then recursing on the remaining subproblem. Although the performance guarantee of Jain’s algorithm is much stronger than that given for the primal-dual algorithm above, the primal-dual algorithm is still of interest. Jain’s algorithm requires solvi...

Provisioning a Virtual Private Network: A network design problem for multicommodity flow

by Anupam Gupta, Jon Kleinberg, Amit Kumar, Rajeev Rastogi, Bulent Yener - In Proceedings of the 33rd Annual ACM Symposium on Theory of Computing , 2001
"... Consider a setting in which a group of nodes, situated in a large underlying network, wishes to reserve bandwidth on which to support communication. Virtual private networks (VPNs) are services that support such a construct; rather than building a new physical network on the group of nodes that must ..."
Abstract - Cited by 109 (13 self) - Add to MetaCart
Consider a setting in which a group of nodes, situated in a large underlying network, wishes to reserve bandwidth on which to support communication. Virtual private networks (VPNs) are services that support such a construct; rather than building a new physical network on the group of nodes that must be connected, bandwidth in the underlying network is reserved for communication within the group, forming a virtual “sub-network.” Provisioning a virtual private network over a set of terminals gives rise to the following general network design problem. We have bounds on the cumulative amount of traffic each terminal can send and receive; we must choose a path for each pair of terminals, and a bandwidth allocation for each edge of the network, so that any traffic matrix consistent with the given upper bounds can be feasibly routed. Thus, we are seeking to design a network that can support a continuum of possible traffic scenarios. We provide optimal and approximate algorithms for several variants of this problem, depending on whether the traffic matrix is required to be symmetric, and on whether the designed network is required to be a tree (a natural constraint in a number of basic applications). We also establish a relation between this collection of network design problems and a variant of the facility location problem introduced by Karger and Minkoff; we extend their results by providing a stronger approximation algorithm for this latter problem. 1
(Show Context)

Citation Context

...ed to algorithmic work on two other network design models, namely survivable network design and buy-at-bulk network design, but with some crucial differences. In survivable network design (see, e.g., =-=[10, 13, 23, 24]-=-), we are given a graph�with integer-valued flow requirements���between certain pairs of nodes�and�. We must choose a minimum-cost subgraph of�so that for each pair���, there are at least���edge-disjo...

Approximating minimum cost connectivity problems

by Guy Kortsarz, Zeev Nutov - 58 in Approximation algorithms and Metaheuristics, Editor , 2007
"... ..."
Abstract - Cited by 74 (41 self) - Add to MetaCart
Abstract not found

Approximation Algorithms for Minimum-Cost k-Vertex Connected Subgraphs

by Joseph Cheriyan, Santosh Vempala, Adrian Vetta - In 34th Annual ACM Symposium on the Theory of Computing , 2002
"... We present two new algorithms for the problem of nding a minimum-cost k-vertex connected spanning subgraph. The rst algorithm works on undirected graphs with at least 6k vertices and achieves an approximation of 6 times the kth harmonic number (which is O(log k)), The second algorithm works o ..."
Abstract - Cited by 69 (2 self) - Add to MetaCart
We present two new algorithms for the problem of nding a minimum-cost k-vertex connected spanning subgraph. The rst algorithm works on undirected graphs with at least 6k vertices and achieves an approximation of 6 times the kth harmonic number (which is O(log k)), The second algorithm works on any graph (directed or undirected) and gives an O( n=)-approximation algorithm for any > 0 and k (1 )n. These algorithms improve on the previous best approximation factor (more than k=2). The latter algorithm also extends to other problems in network design with vertex connectivity requirements. Our main tools are setpair relaxations, a theorem of Mader's (in the undirected case) and iterative rounding (general case).
(Show Context)

Citation Context

...rithms for network design, and there have been some notable successes in the design of networks that satisfy various types of \edge connectivity" requirements, e.g., Goemans and Williamson [11], =-=Jain [13], etc-=-. Fewer results are known on the design of networks subject to \vertex connectivity" requirements. We will focus on the classic problem in this class, namely the minimum cost k-vertex connected s...

An Improved LP-based Approximation for Steiner Tree

by Jarosław Byrka, Fabrizio Grandoni, Thomas Rothvoß, Laura Sanità , 2009
"... The Steiner tree problem is one of the most fundamental-hard problems: given a weighted undirected graph and a subset of terminal nodes, find a minimum weight tree spanning the terminals. In a sequence of papers, the approximation ratio for this problem was improved from to the current best���[Robin ..."
Abstract - Cited by 65 (7 self) - Add to MetaCart
The Steiner tree problem is one of the most fundamental-hard problems: given a weighted undirected graph and a subset of terminal nodes, find a minimum weight tree spanning the terminals. In a sequence of papers, the approximation ratio for this problem was improved from to the current best���[Robins,Zelikovsky-SIDMA’05]. All these algorithms are purely combinatorial. A long-standing open problem is whether there is an LP-relaxation for Steiner tree with integrality gap smaller than [Vazirani,Rajagopalan-SODA’99]. In this paper we improve the approximation factor for Steiner tree, developing an LP-based approximation a� algorithm. Our algorithm is based on a, seemingly novel, iterative randomized rounding technique. We consider a directed-component cut relaxation for the�-restricted Steiner tree problem. We sample one of these components with probability proportional to the value of the associated variable in the optimal fractional solution and contract it. We iterate this process for a proper number of times and finally output the sampled components together
(Show Context)

Citation Context

...ces to pick at least one edge crossing the corresponding cut. Considering its linear relaxation, 2-approximation algorithms can be obtained either using primal-dual schemes [20] or iterative rounding =-=[27]-=-. However, there is a simple example of a graph (namely, a cycle) showing an integrality gap of 2 already in the spanning tree case, i.e., when�(see, e.g., [37]). A more promising and well-studied LP ...

Approximating Minimum Bounded Degree Spanning Trees to within One of

by Mohit Singh , Microsoft Research , Redmond - In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming. , 2006
"... In the Minimum Bounded Degree Spanning Tree problem, we are given an undirected graph G = (V, E) with a degree upper bound B v on each vertex v ∈ V , and the task is to find a spanning tree of minimum cost that satisfies all the degree bounds. Let OPT be the cost of an optimal solution to this prob ..."
Abstract - Cited by 63 (7 self) - Add to MetaCart
In the Minimum Bounded Degree Spanning Tree problem, we are given an undirected graph G = (V, E) with a degree upper bound B v on each vertex v ∈ V , and the task is to find a spanning tree of minimum cost that satisfies all the degree bounds. Let OPT be the cost of an optimal solution to this problem. In this article we present a polynomial-time algorithm which returns a spanning tree T of cost at most OPT

Survivable network design with degree or order constraints

by Lap Chi Lau, Joseph (Seffi) Naor, Mohammad R. Salavatipour, Mohit Singh - SIAM J. ON COMPUTING , 2009
"... We present algorithmic and hardness results for network design problems with degree or order constraints. The first problem we consider is the Survivable Network Design problem with degree constraints on vertices. The objective is to find a minimum cost subgraph which satisfies connectivity requir ..."
Abstract - Cited by 61 (7 self) - Add to MetaCart
We present algorithmic and hardness results for network design problems with degree or order constraints. The first problem we consider is the Survivable Network Design problem with degree constraints on vertices. The objective is to find a minimum cost subgraph which satisfies connectivity requirements between vertices and also degree upper bounds Bv on the vertices. This includes the well-studied Minimum Bounded Degree Spanning Tree problem as a special case. Our main result is a (2, 2Bv +3)-approximation algorithm for the edge-connectivity Survivable Network Design problem with degree constraints, where the cost of the returned solution is at most twice the cost of an optimum solution (satisfying the degree bounds) and the degree of each vertex v is at most 2Bv + 3. This implies the first constant factor (bicriteria) approximation algorithms for many degree constrained network design problems, including the Minimum Bounded Degree Steiner Forest problem. Our results also extend to directed graphs and provide the first constant factor (bicriteria) approximation algorithms for the Minimum Bounded Degree Arborescence problem and the Minimum Bounded Degree Strongly k-Edge-Connected Subgraph problem. In contrast, we show that the vertex-connectivity Survivable Network Design problem with degree constraints is hard to approximate, even when the cost of every edge is zero. A striking aspect of our algorithmic

Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design

by C. Chekuri, et al. , 2006
"... We consider approximation algorithms for non-uniform buy-at-bulk network design problems. The first nontrivial approximation algorithm for this problem is due to Charikar and Karagiozova (STOC' 05); for an instance on h pairs their algorithm has an approximation guarantee of exp( O(plog h log ..."
Abstract - Cited by 55 (12 self) - Add to MetaCart
We consider approximation algorithms for non-uniform buy-at-bulk network design problems. The first nontrivial approximation algorithm for this problem is due to Charikar and Karagiozova (STOC' 05); for an instance on h pairs their algorithm has an approximation guarantee of exp( O(plog h log log h)) for the uniform-demand case, and log D * exp(O(plog h log log h)) for the general demand case, where D is the total demand. We improve upon this result, by presenting the first poly-logarithmic approximation for this problem. The ratio we obtain is O(log3 h * min{log D, fl(h2)}) where h is the number of pairs and fl(n) is the worst case distortion in embedding the metric induced by a n vertex graph into a distribution over its spanning trees. Using the best known upper bound on fl(n) we obtain an O(min{log3 h*log D, log5 h log log h})ratio approximation. We also give poly-logarithmic approximations for some variants of the singe-source prob-lem that we need for the multicommodity problem.
(Show Context)

Citation Context

... of fundamental importance in combinatorial optimization and there is a vast literature on problems and results. We refer the reader to [32] for classical results on polynomial time algorithms and to =-=[18, 19, 35, 22, 12]-=- for results and pointers on approximation algorithms. Here we briefly discuss the known results and techniques for some specific problems that are closely related to the problems we consider. Buy-at-...

Approximating node connectivity problems via set covers

by Guy Kortsarz, Zeev Nutov
"... ..."
Abstract - Cited by 52 (18 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...nown. However, for undirected graphs, when the paths are required only to be edge disjoint, an approximation algorithm that produces a solution at most twice the value of an optimal was given by Jain =-=[12]-=-. Henceforth, unless stated otherwise, we consider node connectivity only. A -approximation algorithm for a minimization problem is a polynomial time algorithm that produces a solution of value no mo...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University