Sub-exponential Approximation Schemes: From Dense to Almost-Sparse. Dimitris Fotakis Michael Lampis Vangelis Paschos
|
|
- Byron Copeland
- 5 years ago
- Views:
Transcription
1 Sub-exponential Approximation Schemes: From Dense to Almost-Sparse Dimitris Fotakis Michael Lampis Vangelis Paschos NTU Athens Université Paris Dauphine Feb 18, STACS 2016
2 Motivation Sub-Exponential Approximation (50 years in a slide) Sub-Exponential Approximation Schemes 2 / 17
3 Motivation Sub-Exponential Approximation (50 years in a slide) Efficient = Poly-time ( 60s) Jack Edmonds Juris Hartmanis Richard Stearns Sub-Exponential Approximation Schemes 2 / 17
4 Motivation Sub-Exponential Approximation (50 years in a slide) Efficient = Poly-time ( 60s) Everything is NP-hard!( ) ( 70s) Stephen Cook Richard Karp Garey& Johnson Sub-Exponential Approximation Schemes 2 / 17
5 Motivation Sub-Exponential Approximation (50 years in a slide) Efficient = Poly-time ( 60s) Everything is NP-hard!( ) ( 70s) So, we should approximate ( 80s) David Johnson V. Vazirani Williamson&Shmoys Sub-Exponential Approximation Schemes 2 / 17
6 Motivation Sub-Exponential Approximation (50 years in a slide) Efficient = Poly-time ( 60s) Everything is NP-hard!( ) ( 70s) So, we should approximate ( 80s) Everything is APX-hard!( ) ( 90s) Christos Papadimitriou Sanjeev Arora Johan Håstad Sub-Exponential Approximation Schemes 2 / 17
7 Motivation Sub-Exponential Approximation (50 years in a slide) Efficient = Poly-time ( 60s) Everything is NP-hard!( ) ( 70s) So, we should approximate ( 80s) Everything is APX-hard!( ) ( 90s) More than poly-time? Everything ETH-hard ( 00s) Mike Fellows Russell Impagliazzo Fomin&Kratsch Sub-Exponential Approximation Schemes 2 / 17
8 Motivation Sub-Exponential Approximation (50 years in a slide) Efficient = Poly-time ( 60s) Everything is NP-hard!( ) ( 70s) So, we should approximate ( 80s) Everything is APX-hard!( ) ( 90s) More than poly-time? Everything ETH-hard ( 00s) Bottom line: Most problems hard to solve exactly in 2 o(n) time Most problems hard to approximate in n O(1) time Perhaps we can approximate in 2 o(n) time? Sub-Exponential Approximation Schemes 2 / 17
9 Dead on Arrival? Better than 3/2 for TSP, 4/3 for Max-3-DM, 7/8 for Max-3-SAT,..., in sub-exponential time? Sub-Exponential Approximation Schemes 3 / 17
10 Dead on Arrival? Better than 3/2 for TSP, 4/3 for Max-3-DM, 7/8 for Max-3-SAT,..., in sub-exponential time? Probably won t work (at least for Max-3-SAT) Sub-Exponential Approximation Schemes 3 / 17
11 Dead on Arrival? Better than 3/2 for TSP, 4/3 for Max-3-DM, 7/8 for Max-3-SAT,..., in sub-exponential time? Almost-linear PCPs (Moshkovitz& Raz) and P-time hardness (Håstad) give tight inapproximability for Max-3-SAT even for 2 n1 ǫ time. (Credit: Dana Moshkovitz) Sub-Exponential Approximation Schemes 3 / 17
12 Dead on Arrival? Better than 3/2 for TSP, 4/3 for Max-3-DM, 7/8 for Max-3-SAT,..., in sub-exponential time? If this is the normal behavior of APX problems, what s the point of sub-exponential approximation? Is this the normal behavior? What about problems outside APX? E.g., r-approximation in time 2 n/r for Ind. Set ([Chalermsook, Laekhanukit, Nanongkai 13]) r-approximation in time 2 n/r2 for Max Minimal VC log(n/r)-approximation in time 2 n/r for ATSP ([Bonnet,L.,Paschos (next talk!)]). What else? Sub-Exponential Approximation Schemes 3 / 17
13 Strategy We cannot get better than 7/8 for Max-3-SAT in sub-exp time (under ETH). We will therefore try to get something else: Sub-Exponential Approximation Schemes 4 / 17
14 Strategy We cannot get better than 7/8 for Max-3-SAT in sub-exp time (under ETH). We will therefore try to get something else: An island of tractability: Max-k-CSP admits a PTAS (a (1 ǫ)-approximation for all ǫ > 0) for dense instances (Arora, Karger, Karpinski 99), (de la Vega 96) Sub-Exponential Approximation Schemes 4 / 17
15 Strategy We cannot get better than 7/8 for Max-3-SAT in sub-exp time (under ETH). We will therefore try to get something else: An island of tractability: Max-k-CSP admits a PTAS (a (1 ǫ)-approximation for all ǫ > 0) for dense instances (Arora, Karger, Karpinski 99), (de la Vega 96) Extending the island: We give a version of the AKK scheme which can handle sparser instances, at the expense of needing sub-exponential time. Our scheme provides a smooth trade-off For dense instances we get a PTAS As instances gradually get more sparse, we need more time until our scheme does not work any more Sub-Exponential Approximation Schemes 4 / 17
16 Summary of results For any ǫ > 0, δ [0, 1] and fixed k 2 we have the following: Given a Max-k-CSP instance with n k 1+δ constraints We can produce a (1 ǫ)-approximate solution In time 2 O(n1 δ lnn/ǫ 3 ) Sub-Exponential Approximation Schemes 5 / 17
17 Summary of results For any ǫ > 0, δ [0, 1] and fixed k 2 we have the following: Given a Max-k-CSP instance with n k 1+δ constraints We can produce a (1 ǫ)-approximate solution In time 2 O(n1 δ lnn/ǫ 3 ) Note: This includes the AKK PTAS as a special case (δ = 1) Advantage: we provide a smooth trade-off from the easy case (dense instances) to more general cases Sub-Exponential Approximation Schemes 5 / 17
18 Summary of results For any ǫ > 0, δ [0, 1] and fixed k 2 we have the following: Given a Max-k-CSP instance with n k 1+δ constraints We can produce a (1 ǫ)-approximate solution In time 2 O(n1 δ lnn/ǫ 3 ) Note: This includes the AKK PTAS as a special case (δ = 1) Advantage: we provide a smooth trade-off from the easy case (dense instances) to more general cases We will also give some tight bounds, ruling out natural possible improvements. Sub-Exponential Approximation Schemes 5 / 17
19 Basic scheme (Max Cut) We are given a dense graph for which we want to find a large cut Sub-Exponential Approximation Schemes 6 / 17
20 Basic scheme (Max Cut) Randomly select a sample of its vertices Sub-Exponential Approximation Schemes 6 / 17
21 Basic scheme (Max Cut) Guess their correct partition Sub-Exponential Approximation Schemes 6 / 17
22 Basic scheme (Max Cut) For every vertex outside the sample, examine its neighbors in the sample Sub-Exponential Approximation Schemes 6 / 17
23 Basic scheme (Max Cut) Greedily set its value depending on this neighborhood Sub-Exponential Approximation Schemes 6 / 17
24 Basic scheme (Max Cut) The sample we select has size O(logn) (hidden constants depend on degree and ǫ) running time n O(1) (will try all partitions of sample) Sub-Exponential Approximation Schemes 6 / 17
25 Basic scheme (Max Cut) The sample we select has size O(logn) (hidden constants depend on degree and ǫ) running time n O(1) (will try all partitions of sample) Why this works (intuitively): Because graph is dense every vertex outside sample S has many neighbors in S examining N(u) S is (whp) a good representation of N(u) in the optimal solution If a vertex in V \S has >> 50% of its neighbors on one side in the optimal solution, it will (whp) have >> 50% of its neighbors on that side in S (de la Vega 96) Sub-Exponential Approximation Schemes 6 / 17
26 General scheme (Max-k-CSP) Max Cut: max (i,j) E x i (1 x j )+x j (1 x i ) Sub-Exponential Approximation Schemes 7 / 17
27 General scheme (Max-k-CSP) Max-2-SAT: max (i,j) C x i (1 x j )+x j (1 x i )+x i x j Sub-Exponential Approximation Schemes 7 / 17
28 General scheme (Max-k-CSP) Max-3-SAT: max x i (1 x j )(1 x k )+(1 x i )x j (1 x k )+...+x i x j x k (i,j,k) C Sub-Exponential Approximation Schemes 7 / 17
29 General scheme (Max-k-CSP) Max-k-CSP: where p() is a degree k polynomial. max p( x) The AKK scheme offers a PTAS that finds an assignment almost maximizing p when the polynomial has at least Ω(n k ) terms. Sub-Exponential Approximation Schemes 7 / 17
30 General scheme (Max-k-CSP) Max Cut: max (i,j) E x i (1 x j )+x j (1 x i ) Sub-Exponential Approximation Schemes 7 / 17
31 General scheme (Max-k-CSP) Max Cut: max (i,j) c ij x i x j + i c i x i +C Sub-Exponential Approximation Schemes 7 / 17
32 General scheme (Max-k-CSP) Max Cut: max i x i r i where r i ( x x i ) is the (linear) polynomial of the remaining variables I obtain if I factor out x i. Sub-Exponential Approximation Schemes 7 / 17
33 General scheme (Max-k-CSP) Max Cut: max i x i r i where r i ( x x i ) is the (linear) polynomial of the remaining variables I obtain if I factor out x i. Main idea: Estimate the values of the r i s using brute force on a small sample. Sub-Exponential Approximation Schemes 7 / 17
34 General scheme (Max-k-CSP) Max Cut: max i x i r i s.t. ˆr i ǫn j N(i) c ijx j ˆr i +ǫn where ˆr i is the estimate I have for r i. This is now a linear program. Sub-Exponential Approximation Schemes 7 / 17
35 General scheme (Max-k-CSP) Max Cut: max i x i r i Summary of algorithm: Estimate the r i values using a sample Need large enough sample to guarantee ˆr i r i This turns QIP ILP Solve fractional relaxation of ILP Round solution Sub-Exponential Approximation Schemes 7 / 17
36 Sub-exponential Extension (Max Cut) Summary of algorithm: Estimate the r i values using a sample Need large enough sample to guarantee ˆr i r i This turns QIP ILP Solve fractional relaxation of ILP Round solution Sub-Exponential Approximation Schemes 8 / 17
37 Sub-exponential Extension (Max Cut) Summary of algorithm: Estimate the r i values using a sample Need large enough sample to guarantee ˆr i r i This turns QIP ILP Solve fractional relaxation of ILP Round solution Main idea: Use larger sample Sub-Exponential Approximation Schemes 8 / 17
38 Sub-exponential Extension (Max Cut) Summary of algorithm: Estimate the r i values using a sample Need large enough sample to guarantee ˆr i r i This turns QIP ILP Solve fractional relaxation of ILP Round solution Main idea: Use larger sample Suppose graph has average degree = n δ We sample nlogn = n1 δ logn vertices whp ˆr i r i. Sub-Exponential Approximation Schemes 8 / 17
39 Sub-exponential Extension (Max Cut) Summary of algorithm: Estimate the r i values using a sample Need large enough sample to guarantee ˆr i r i This turns QIP ILP Solve fractional relaxation of ILP Round solution Main idea: Use larger sample We are almost done! Must prove sample size enough for ˆr i Pitfall: Additive error ǫn no longer negligible! Must prove rounding step still works Don t worry, it all works! Sub-Exponential Approximation Schemes 8 / 17
40 General scheme k 3 Summary so far k = 2: AKK: Average degree Ω(n), sample of O(logn) vertices Extension: Average degree n δ, sample of n 1 δ logn in time 2 n can solve Max-Cut for E n 1.5 Sub-Exponential Approximation Schemes 9 / 17
41 General scheme k 3 Summary so far k = 2: AKK: Average degree Ω(n), sample of O(logn) vertices Extension: Average degree n δ, sample of n 1 δ logn in time 2 n can solve Max-Cut for E n 1.5 How about Max-3-SAT? In poly time can solve instances with n 3 clauses In 2 n time can solve instances with... clauses? Sub-Exponential Approximation Schemes 9 / 17
42 General scheme k 3 Summary so far k = 2: AKK: Average degree Ω(n), sample of O(logn) vertices Extension: Average degree n δ, sample of n 1 δ logn in time 2 n can solve Max-Cut for E n 1.5 How about Max-3-SAT? In poly time can solve instances with n 3 clauses In 2 n time can solve instances with n 2.5 clauses Sub-Exponential Approximation Schemes 9 / 17
43 General scheme k 3 AKK scheme for k 3 Write p( x) as i x ir i Each r i has degree k 1 Write r i = j x jr ij Each r ij has degree k 2... Until we get to linear write ILP Sub-Exponential Approximation Schemes 9 / 17
44 General scheme k 3 AKK scheme for k 3 Write p( x) as i x ir i Each r i has degree k 1 Write r i = j x jr ij Each r ij has degree k 2... Until we get to linear write ILP Note: In order for this to work, all r ij... polynomials must be dense This is true if original polynomial was dense. Sub-Exponential Approximation Schemes 9 / 17
45 General scheme k 3 AKK scheme for k 3 Write p( x) as i x ir i Each r i has degree k 1 Write r i = j x jr ij Each r ij has degree k 2... Until we get to linear write ILP In our scheme, if p has n k 1+δ terms r i has n k 2+δ terms r ij has n k 3+δ terms... It seems that the right density to require is n k 1+δ? Sub-Exponential Approximation Schemes 9 / 17
46 General scheme summary Input: Max-k-CSP isntance with n k 1+δ constraints Algorithm: Sample 2 n1 δ logn/ǫ 3 variables, guess their value Write CSP as a polynomial optimization problem Estimate non-linear coefficients using sample Solve fractional LP Round solution Sub-Exponential Approximation Schemes 10 / 17
47 General scheme summary Input: Max-k-CSP isntance with n k 1+δ constraints Algorithm: Sample 2 n1 δ logn/ǫ 3 variables, guess their value Write CSP as a polynomial optimization problem Estimate non-linear coefficients using sample Solve fractional LP Round solution Works for any CSP (for fixed k) Covers all instances for k = 2 Sub-Exponential Approximation Schemes 10 / 17
48 General scheme summary Input: Max-k-CSP isntance with n k 1+δ constraints Algorithm: Sample 2 n1 δ logn/ǫ 3 variables, guess their value Write CSP as a polynomial optimization problem Estimate non-linear coefficients using sample Solve fractional LP Round solution Works for any CSP (for fixed k) Covers all instances for k = 2 Can we do better? Smaller sample/faster running time? Handle k 3 better? Sub-Exponential Approximation Schemes 10 / 17
49 Summary with a picture Complexity/Density trade-off for Max-k-CSP Sub-Exponential Approximation Schemes 11 / 17
50 Summary with a picture Possible Improvements? Faster? More general? Sub-Exponential Approximation Schemes 11 / 17
51 Density lower bound Theorem: Assuming ETH, for all k 3, r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max-k-SAT with m n k 1 in time 2 n1 ǫ Sub-Exponential Approximation Schemes 12 / 17
52 Density lower bound Theorem: Assuming ETH, for all k 3, r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max-k-SAT with m n k 1 in time 2 n1 ǫ In English: For density less than n k 1 we need exponential time to get (1 ǫ)-approximation. Sub-Exponential Approximation Schemes 12 / 17
53 Density lower bound Theorem: Assuming ETH, for all k 3, r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max-k-SAT with m n k 1 in time 2 n1 ǫ Starting Point: Max-2-SAT is APX-ETH -hard on instances with V = n and m = O( V ). Sub-Exponential Approximation Schemes 12 / 17
54 Density lower bound Theorem: Assuming ETH, for all k 3, r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max-k-SAT with m n k 1 in time 2 n1 ǫ Starting Point: Max-2-SAT is APX-ETH -hard on instances with V = n and m = O( V ). Proof: (k = 3) Add n new variables y 1,...,y n For each clause (x i x j ), for each k {1,...,n} we construct the clauses (x i x j y k ) and (x i x j y k ) Gap remains! Number of clauses n 2 Sub-Exponential Approximation Schemes 12 / 17
55 Density lower bound Theorem: Assuming ETH, for all k 3, r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max-k-SAT with m n k 1 in time 2 n1 ǫ Starting Point: Max-2-SAT is APX-ETH -hard on instances with V = n and m = O( V ). Proof: (k = 3) Add n new variables y 1,...,y n For each clause (x i x j ), for each k {1,...,n} we construct the clauses (x i x j y k ) and (x i x j y k ) Gap remains! Number of clauses n 2 Reduction similar for k > 3 Sub-Exponential Approximation Schemes 12 / 17
56 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Sub-Exponential Approximation Schemes 13 / 17
57 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ In English: Our sample size is optimal. For density n δ we need time 2 n1 δ. Sub-Exponential Approximation Schemes 13 / 17
58 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on instances with V = n and E = O( V ). Sub-Exponential Approximation Schemes 13 / 17
59 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. Sub-Exponential Approximation Schemes 13 / 17
60 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. Sub-Exponential Approximation Schemes 13 / 17
61 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. Sub-Exponential Approximation Schemes 13 / 17
62 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. Sub-Exponential Approximation Schemes 13 / 17
63 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. Sub-Exponential Approximation Schemes 13 / 17
64 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. Sub-Exponential Approximation Schemes 13 / 17
65 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. A constant gap remains for any V = n, E = n 2, Avg. degree = If we cound do better than 2 V / then ETH Sub-Exponential Approximation Schemes 13 / 17
66 Running time lower bound Theorem: Assuming ETH, for all δ (0, 1), r < 1 s.t. ǫ > 0 no algorithm can r-approximate Max Cut with E = n 1+δ in time 2 n1 δ ǫ Starting Point: Max Cut is APX-ETH -hard on 5-regular instances with V = n. A constant gap remains for any V = n, E = n 2, Avg. degree = If we cound do better than 2 V / then ETH Bonus: The two reductions compose! Optimal running times everywhere! Sub-Exponential Approximation Schemes 13 / 17
67 Extensions: k-densest Find k vertices that induce max edges AKK scheme works for k = Θ(n) Reason: Then OPT = Θ(n 2 ) Sub-Exponential Approximation Schemes 14 / 17
68 Extensions: k-densest Find k vertices that induce max edges AKK scheme works for k = Θ(n) Reason: Then OPT = Θ(n 2 ) How to get something for any k? Simple win/win algorithm If k large, we can run our algorithm If k small, brute force ( n) k Balancing gives 2 n1 δ/3 logn/ǫ 3 time for E = n 1+δ Sub-Exponential Approximation Schemes 14 / 17
69 Extensions: k-densest Find k vertices that induce max edges AKK scheme works for k = Θ(n) Reason: Then OPT = Θ(n 2 ) How to get something for any k? Simple win/win algorithm If k large, we can run our algorithm If k small, brute force ( n) k Balancing gives 2 n1 δ/3 logn/ǫ 3 time for E = n 1+δ Can we do better? Sub-Exponential Approximation Schemes 14 / 17
70 Extensions: 3-Coloring 3-Coloring is in P for graphs with large minimum degree Dense graphs contain a dominating set of size O(logn) Guess its coloring Coloring remaining graph is 2-List Coloring (in P) Sub-Exponential Approximation Schemes 15 / 17
71 Extensions: 3-Coloring 3-Coloring is in P for graphs with large minimum degree Dense graphs contain a dominating set of size O(logn) Guess its coloring Coloring remaining graph is 2-List Coloring (in P) Can extend this to graphs with minimum degree Exists dominating set with size n logn Guess its coloring... Sub-Exponential Approximation Schemes 15 / 17
72 Conclusions Density is a crucial parameter for approximating Max-k-CSP Especially useful in sub-exponential setting Smooth trade-off between performance and generality Tight bounds Questions: Other applications? Other interesting sub-exponential approximations? Sub-Exponential Approximation Schemes 16 / 17
73 Thank you! Sub-Exponential Approximation Schemes 17 / 17
Sub-exponential Approximation Schemes: From Dense to Almost-Sparse. Dimitris Fotakis Michael Lampis Vangelis Paschos
Sub-exponential Approximation Schemes: From Dense to Almost-Sparse Dimitris Fotakis Michael Lampis Vangelis Paschos NTU Athens Université Paris Dauphine Nov 5, 2015 Overview Things you will hear in this
More informationTrading Time for Approximation
Trading Time for Approximation Michael Lampis Université Paris Dauphine MTA SZTAKI Sep 21 2016 Motivation Sub-Exponential Approximation (50 years in a slide) Trading Time for Approximation 2 / 32 Motivation
More informationHardness of Approximation for the TSP. Michael Lampis LAMSADE Université Paris Dauphine
Hardness of Approximation for the TSP Michael Lampis LAMSADE Université Paris Dauphine Sep 2, 2015 Overview Hardness of Approximation What is it? How to do it? (Easy) Examples The PCP Theorem What is it?
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation
More informationParameterized Approximation Schemes Using Graph Widths. Michael Lampis Research Institute for Mathematical Sciences Kyoto University
Parameterized Approximation Schemes Using Graph Widths Michael Lampis Research Institute for Mathematical Sciences Kyoto University May 13, 2014 Overview Topic of this talk: Randomized Parameterized Approximation
More informationParameterized Approximation Schemes Using Graph Widths. Michael Lampis Research Institute for Mathematical Sciences Kyoto University
Parameterized Approximation Schemes Using Graph Widths Michael Lampis Research Institute for Mathematical Sciences Kyoto University July 11th, 2014 Visit Kyoto for ICALP 15! Parameterized Approximation
More informationApproximation Basics
Milestones, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Spring 2015 Spring, 2015 Xiaofeng Gao 1/53 Outline History NP Optimization
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More information11. APPROXIMATION ALGORITHMS
Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More information15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015
15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 While we have good algorithms for many optimization problems, the previous lecture showed that many
More informationarxiv: v1 [cs.ds] 20 Feb 2015
Time-Approximation Trade-offs for Inapproximable Problems Édouard Bonnet 1, Michael Lampis 2, Vangelis Th. Paschos 2,3 arxiv:1502.05828v1 [cs.ds] 20 Feb 2015 1 Hungarian Academy of Sciences, bonnet.edouard@sztaki.mta.hu
More informationLecture 10 October 7, 2014
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Lecture 10 October 7, 2014 Prof. Erik Demaine Scribes: Fermi Ma, Asa Oines, Mikhail Rudoy, Erik Waingarten Overview This lecture begins
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationP vs. NP. Simpsons: Treehouse of Horror VI
P vs. NP Simpsons: Treehouse of Horror VI Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2012 by Grant Schoenebeck
More informationExact Algorithms for NP-hard problems
24 mai 2012 1 Why do we need exponential algorithms? 2 3 Why the P-border? 1 Practical reasons (Jack Edmonds, 1965) For practical purposes the difference between algebraic and exponential order is more
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationSteven Skiena. skiena
Lecture 22: Introduction to NP-completeness (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Among n people,
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationCopyright 2000, Kevin Wayne 1
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More informationTime-Approximation Trade-offs for Inapproximable Problems
Time-Approximation Trade-offs for Inapproximable Problems Édouard Bonnet 1, Michael Lampis 2, and Vangelis Th. Paschos 2 1 Hungarian Academy of Sciences bonnet.edouard@sztaki.mta.hu 2 PSL Research University,
More informationLecture 1. 2 Motivation: Fast. Reliable. Cheap. Choose two.
Approximation Algorithms and Hardness of Approximation February 19, 2013 Lecture 1 Lecturer: Ola Svensson Scribes: Alantha Newman 1 Class Information 4 credits Lecturers: Ola Svensson (ola.svensson@epfl.ch)
More informationGraph Theory and Optimization Approximation Algorithms
Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and
More informationP and NP (Millenium problem)
CMPS 2200 Fall 2017 P and NP (Millenium problem) Carola Wenk Slides courtesy of Piotr Indyk with additions by Carola Wenk CMPS 2200 Introduction to Algorithms 1 We have seen so far Algorithms for various
More informationExact Algorithms Lecture 7: FPT Hardness and the ETH
Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,
More informationProve, where is known to be NP-complete. The following problems are NP-Complete:
CMPSCI 601: Recall From Last Time Lecture 21 To prove is NP-complete: Prove NP. Prove, where is known to be NP-complete. The following problems are NP-Complete: SAT (Cook-Levin Theorem) 3-SAT 3-COLOR CLIQUE
More information1 Introduction and Results
On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br
More informationA 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition
A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha
More informationLecture 21: Other Reductions Steven Skiena
Lecture 21: Other Reductions Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.stonybrook.edu/ skiena Problem of the Day Show that the dense
More informationLocal Search Approximation Algorithms for the Complement of the Min-k-Cut Problems
Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems Wenxing Zhu, Chuanyin Guo Center for Discrete Mathematics and Theoretical Computer Science, Fuzhou University, Fuzhou
More information1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it.
1 Introduction There are hundreds of NP-complete problems. For a recent selection see http://www. csc.liv.ac.uk/ ped/teachadmin/comp202/annotated_np.html Also, see the book M. R. Garey and D. S. Johnson.
More informationApproximation Algorithms
Approximation Algorithms Subhash Suri June 5, 2018 1 Figure of Merit: Performance Ratio Suppose we are working on an optimization problem in which each potential solution has a positive cost, and we want
More informationLecture 21: Other Reductions Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY
Lecture 21: Other Reductions Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Problem of the Day Show that the Dense
More informationGraph Vertex Colorability & the Hardness. Mengfei Cao COMP-150 Graph Theory Tufts University
Dec. 15 th, Presentation for Final Project Graph Vertex Colorability & the Hardness Mengfei Cao COMP-150 Graph Theory Tufts University Framework In General: Graph-2-colorability is in N Graph-3-colorability
More informationBasic Approximation algorithms
Approximation slides Basic Approximation algorithms Guy Kortsarz Approximation slides 2 A ρ approximation algorithm for problems that we can not solve exactly Given an NP-hard question finding the optimum
More informationAlgorithms for Euclidean TSP
This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation
More informationAlgorithmic complexity of two defence budget problems
21st International Congress on Modelling and Simulation, Gold Coast, Australia, 29 Nov to 4 Dec 2015 www.mssanz.org.au/modsim2015 Algorithmic complexity of two defence budget problems R. Taylor a a Defence
More informationComplexity and approximation of satisfactory partition problems
Complexity and approximation of satisfactory partition problems Cristina Bazgan, Zsolt Tuza, and Daniel Vanderpooten LAMSADE, Université Paris-Dauphine, France {bazgan,vdp}@lamsade.dauphine.fr Computer
More informationApproximation Algorithms
Approximation Algorithms Frédéric Giroire FG Simplex 1/11 Motivation Goal: Find good solutions for difficult problems (NP-hard). Be able to quantify the goodness of the given solution. Presentation of
More informationDominating set (bounded degree): By Strict redcution from Vertex cover.
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 11 Scribe Notes 1 Recap In the last lecture we looked at several different types of reductions for NPO problems
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Approximation Algorithms CLRS 35.1-35.5 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 30 Approaching
More information2-query low-error PCP Composition
2-query low-error PCP Composition Prahladh Harsha TIFR, Mumbai Joint work with Irit Dinur Label Cover Label Cover (LC) G Bipartite graph 1, 2 labels (projection) constraint per edge c e: 1 2 1 2 Edge e
More informationLecture 7: Counting classes
princeton university cos 522: computational complexity Lecture 7: Counting classes Lecturer: Sanjeev Arora Scribe:Manoj First we define a few interesting problems: Given a boolean function φ, #SAT is the
More informationIntroduction to Graph Theory
Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex
More informationAn O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem
An O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem and more recent developments CATS @ UMD April 22, 2016 The Asymmetric Traveling Salesman Problem (ATSP) Problem
More informationThe Square Root Phenomenon in Planar Graphs
1 The Square Root Phenomenon in Planar Graphs Survey and New Results Dániel Marx Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary Satisfiability
More informationIntroduction to Approximation Algorithms
Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background
More informationCS 350 Final Algorithms and Complexity. It is recommended that you read through the exam before you begin. Answer all questions in the space provided.
It is recommended that you read through the exam before you begin. Answer all questions in the space provided. Name: Answer whether the following statements are true or false and briefly explain your answer
More informationAn exact algorithm for max-cut in sparse graphs
An exact algorithm for max-cut in sparse graphs F. Della Croce a M. J. Kaminski b, V. Th. Paschos c a D.A.I., Politecnico di Torino, Italy b RUTCOR, Rutgers University c LAMSADE, CNRS UMR 7024 and Université
More informationNP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]
NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Overview We already know the following examples of NPC problems: SAT 3SAT We are going to show that the following are
More informationCMPSCI611: The SUBSET-SUM Problem Lecture 18
CMPSCI611: The SUBSET-SUM Problem Lecture 18 We begin today with the problem we didn t get to at the end of last lecture the SUBSET-SUM problem, which we also saw back in Lecture 8. The input to SUBSET-
More informationThe complement of PATH is in NL
340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:
More informationChapter 10 Part 1: Reduction
//06 Polynomial-Time Reduction Suppose we could solve Y in polynomial-time. What else could we solve in polynomial time? don't confuse with reduces from Chapter 0 Part : Reduction Reduction. Problem X
More informationFixed Parameter Algorithms
Fixed Parameter Algorithms Dániel Marx Tel Aviv University, Israel Open lectures for PhD students in computer science January 9, 2010, Warsaw, Poland Fixed Parameter Algorithms p.1/41 Parameterized complexity
More informationUnit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.
: Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity
More information11.1 Facility Location
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local
More informationApproximation of satisfactory bisection problems
Approximation of satisfactory bisection problems Cristina Bazgan a,, Zsolt Tuza b, Daniel Vanderpooten a a LAMSADE, Université Paris-Dauphine, Place du Marechal de Lattre de Tassigny, 75775 Paris Cedex
More informationLecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)
COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms
More informationOn Approximating Minimum Vertex Cover for Graphs with Perfect Matching
On Approximating Minimum Vertex Cover for Graphs with Perfect Matching Jianer Chen and Iyad A. Kanj Abstract It has been a challenging open problem whether there is a polynomial time approximation algorithm
More informationApproximation Algorithms
Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours
More informationApproximation Algorithms
Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours
More informationColoring 3-colorable Graphs
Coloring 3-colorable Graphs Pawan Kumar Aurora Advised by Prof. Shashank K Mehta Department of Computer Science and Engineering Indian Institute of Technology, Kanpur State of the Art Seminar k-coloring
More informationReductions and Satisfiability
Reductions and Satisfiability 1 Polynomial-Time Reductions reformulating problems reformulating a problem in polynomial time independent set and vertex cover reducing vertex cover to set cover 2 The Satisfiability
More informationCombinatorial Optimization
Combinatorial Optimization Frank de Zeeuw EPFL 2012 Today Introduction Graph problems - What combinatorial things will we be optimizing? Algorithms - What kind of solution are we looking for? Linear Programming
More informationVertex Cover Approximations on Random Graphs.
Vertex Cover Approximations on Random Graphs. Eyjolfur Asgeirsson 1 and Cliff Stein 2 1 Reykjavik University, Reykjavik, Iceland. 2 Department of IEOR, Columbia University, New York, NY. Abstract. The
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationMetric Techniques and Approximation Algorithms. Anupam Gupta Carnegie Mellon University
Metric Techniques and Approximation Algorithms Anupam Gupta Carnegie Mellon University Metric space M = (V, d) set Vof points y z distances d(x,y) triangle inequality d(x,y) d(x,z) + d(z,y) x why metric
More information6.006 Introduction to Algorithms. Lecture 25: Complexity Prof. Erik Demaine
6.006 Introduction to Algorithms Lecture 25: Complexity Prof. Erik Demaine Today Reductions between problems Decision vs. optimization problems Complexity classes P, NP, co NP, PSPACE, EXPTIME, NP completeness
More informationLecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.
CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear
More informationIntegral Geometry and the Polynomial Hirsch Conjecture
Integral Geometry and the Polynomial Hirsch Conjecture Jonathan Kelner, MIT Partially based on joint work with Daniel Spielman Introduction n A lot of recent work on Polynomial Hirsch Conjecture has focused
More informationThe Graph Motif problem parameterized by the structure of the input graph
The Graph Motif problem parameterized by the structure of the input graph Édouard Bonnet Florian Sikora Abstract The Graph Motif problem was introduced in 2006 in the context of biological networks. It
More informationA Provably Good Approximation Algorithm for Rectangle Escape Problem with Application to PCB Routing
A Provably Good Approximation Algorithm for Rectangle Escape Problem with Application to PCB Routing Qiang Ma Hui Kong Martin D. F. Wong Evangeline F. Y. Young Department of Electrical and Computer Engineering,
More informationPaths, Trees, and Flowers by Jack Edmonds
Paths, Trees, and Flowers by Jack Edmonds Xiang Gao ETH Zurich Distributed Computing Group www.disco.ethz.ch Introduction and background Edmonds maximum matching algorithm Matching-duality theorem Matching
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationCSE 203A: Karger s Min-Cut Algorithm (Lecture Date: 5/11/06)
CSE 03A: Karger s Min-Cut Algorithm (Lecture Date: 5/11/06) Evan Ettinger May 19, 006 1 General Min-Cut Problem There are typically main types of cut problems. The s-t cut problem asks how we can find
More informationGRAPH MINORS: WHEN BEING SHALLOW IS HARD
GRAPH MINORS: WHEN BEING SHALLOW IS HARD @BlairDSullivan JOINT WORK WITH I. MUZI, M. P. O BRIEN, AND F. REIDL 29 th Cumberland Conference Vanderbilt University May 20, 2017 blair_sullivan@ncsu.edu http://www.csc.ncsu.edu/faculty/bdsullivan
More informationBOOLEAN MATRIX FACTORIZATIONS. with applications in data mining Pauli Miettinen
BOOLEAN MATRIX FACTORIZATIONS with applications in data mining Pauli Miettinen MATRIX FACTORIZATIONS BOOLEAN MATRIX FACTORIZATIONS o THE BOOLEAN MATRIX PRODUCT As normal matrix product, but with addition
More informationW[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017
1 W[1]-hardness Dániel Marx Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 2 Lower bounds So far we have seen positive results: basic algorithmic techniques for fixed-parameter
More informationThe Ordered Covering Problem
The Ordered Covering Problem Uriel Feige Yael Hitron November 8, 2016 Abstract We introduce the Ordered Covering (OC) problem. The input is a finite set of n elements X, a color function c : X {0, 1} and
More informationOn Finding Dense Subgraphs
On Finding Dense Subgraphs Barna Saha (Joint work with Samir Khuller) Department of Computer Science University of Maryland, College Park, MD 20742 36th ICALP, 2009 Density for Undirected Graphs Given
More informationNetwork monitoring: detecting node failures
Network monitoring: detecting node failures 1 Monitoring failures in (communication) DS A major activity in DS consists of monitoring whether all the system components work properly To our scopes, we will
More information1 Minimum Cut Problem
CS 6 Lecture 6 Min Cut and Karger s Algorithm Scribes: Peng Hui How, Virginia Williams (05) Date: November 7, 07 Anthony Kim (06), Mary Wootters (07) Adapted from Virginia Williams lecture notes Minimum
More informationParameterized Edge Hamiltonicity
Parameterized Edge Hamiltonicity Joint with Valia Mitsou JST ERATO Minato Project Michael Lampis Université Paris Dauphine Kazuhisa Makino RIMS, Kyoto University Yushi Uno Osaka Prefecture University Edge-Hamiltonian
More informationKernelization via Sampling with Applications to Finding Matchings and Related Problems in Dynamic Graph Streams
Kernelization via Sampling with Applications to Finding Matchings and Related Problems in Dynamic Graph Streams Sofya Vorotnikova University of Massachusetts Amherst Joint work with Rajesh Chitnis, Graham
More informationQuestions? You are given the complete graph of Facebook. What questions would you ask? (What questions could we hope to answer?)
P vs. NP What now? Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2011 by Grant Schoenebeck Large parts of these
More informationSolutions for the Exam 6 January 2014
Mastermath and LNMB Course: Discrete Optimization Solutions for the Exam 6 January 2014 Utrecht University, Educatorium, 13:30 16:30 The examination lasts 3 hours. Grading will be done before January 20,
More informationPCP and Hardness of Approximation
PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationComplexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games
Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with
More informationV1.0: Seth Gilbert, V1.1: Steven Halim August 30, Abstract. d(e), and we assume that the distance function is non-negative (i.e., d(x, y) 0).
CS4234: Optimisation Algorithms Lecture 4 TRAVELLING-SALESMAN-PROBLEM (4 variants) V1.0: Seth Gilbert, V1.1: Steven Halim August 30, 2016 Abstract The goal of the TRAVELLING-SALESMAN-PROBLEM is to find
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can
More informationThe Parameterized Complexity of Finding Point Sets with Hereditary Properties
The Parameterized Complexity of Finding Point Sets with Hereditary Properties David Eppstein University of California, Irvine Daniel Lokshtanov University of Bergen University of California, Santa Barbara
More informationThe Method of Extremal Structure on the k-maximum CUT Problem
The Method of Extremal Structure on the k-maximum CUT Problem Elena Prieto School of Electrical Engineering and Computer Science The University of Newcastle Australia Abstract Using the Method of Extremal
More informationPTAS for Matroid Matching
PTAS for Matroid Matching Jon Lee 1 Maxim Sviridenko 1 Jan Vondrák 2 1 IBM Watson Research Center Yorktown Heights, NY 2 IBM Almaden Research Center San Jose, CA May 6, 2010 Jan Vondrák (IBM Almaden) PTAS
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationA Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses
A Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses Julián Mestre Department of Computer Science University of Maryland, College Park, MD 20742 jmestre@cs.umd.edu Abstract
More informationReductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements.
Desiderata Reductions Desiderata. Classify problems according to their computational requirements. Frustrating news. Huge number of fundamental problems have defied classification for decades. Desiderata'.
More informationNew Approximation Algorithms for (1,2)-TSP
New Approximation Algorithms for (1,2)-TSP Anna Adamaszek University of Copenhagen, Denmark anad@di.ku.dk Matthias Mnich 1 Universität Bonn, Germany and Maastricht University, The Netherlands mmnich@uni-bonn.de
More information