The Multiple Unicast Network Coding Conjecture. and a geometric framework for studying it

Size: px
Start display at page:

Download "The Multiple Unicast Network Coding Conjecture. and a geometric framework for studying it"

Transcription

1 The Multiple Unicast Network Coding Conjecture and a geometric framework for studying it Tang Xiahou, Chuan Wu, Jiaqing Huang, Zongpeng Li June

2 Multiple Unicast: Network Coding = Routing? Undirected Network. Each link has unit capacity 1 in this example. S 1 S 2 a b S1 S 2 a1 a1 a a+b b a2 b1 b1 b1 a1 b2 a+b a+b a2 a2 T 2 T 1 b2 b2 T 2 T 1 2

3 Multiple Unicast: Network Coding = Routing? Undirected Network. Each link has unit capacity 1 in this example. a a c a b b c a+b a+c a+b a+b b b+c b+c a+b+c b c c b+c a a2 c1 a b c c c1 a1 a1 b1 c2 b1 c2 b1 a2 c2 b1 c1 a1 b2 c1 c2 a2 b1 a2 b a1 b2 b2 c1 b2 c2 b2 a1 a2 a 3

4 The MU-NC Conjecture Network coding = routing, for multiple unicast sessions in an undirected network. Given k independent unicast sessions in an undirected linkcapacitated network, a throughput vector r is feasible with network coding if and only if it is feasible with routing. 4

5 The MU-NC Conjecture For k pairs of independent unicast sessions in an undirected network, a throughput vector r is feasible with network coding if and only if it is feasible with routing. Proposed in 2004, by Harvey et al. and by Li and Li Sounds intuitive and simple Studied extensively, not much progress so far No counter example known yet Mitzenmach, Ho, Sprintson, 2007: a list of 7 open problems in NC: MU-NC conjecture is problem #1 Chekuri: Claiming an equivalence between network coding and routing for all undirected networks is a bold conjecture. A full understanding of the problem is wild open 5

6 The MU-NC Conjecture For k pairs of independent unicast sessions in an undirected network, a throughput vector r is feasible with network coding if and only if it is feasible with routing. Langberg, 2011: the MU-NC conjecture has driven many crazy A growing agreement: probably need new tools, beyond a simple blend of graph theory and information theory Network coding for general multiple sessions(multi-source, multi-destination) is hard, not much known Multiple unicast is the most basic case of multiple session network coding. Good understanding desired. 6

7 known to be true: # of sessions = 1 or 2 The MU-NC Conjecture common sender/receiver location planar network, all terminal nodes on same face star outer planar Okamura-Seymour network (uniform-capacity K 3,2 ) in general: coding advantage O(logk) 7

8 known to be true: # of sessions = 1 or 2 The MU-NC Conjecture common sender/receiver location planar network, all terminal nodes on same face star outer planar Okamura-Seymour network (uniform-capacity K 3,2 ) in general: coding advantage O(logk) 8

9 Space Information Flow: Multiple Unicast Min-costnetworkinformationflow: cost= e (w(e)f(e)) Min-costspaceinformationflow: cost= e ( e f(e)) x D C 1 A B x 1 Unit rate demand: A B, A C, B D 9

10 Space Information Flow: Multiple Unicast x D C 1 A B x 1 Cost = i r i d i Is optimal cost without network coding still optimal with network coding? 10

11 MU-NC conjecture: Network vs. Space true in networks = true in any geometric space with distance trueinnetworks= trueinl 2 (Euclideandistance) true in l 2 = not too far off in networks true in networks true in l (Chebyshev distance) 11

12 The Geometric Framework Step 1. From Throughput to Cost: LP Duality Step 2. From Network to Space: Graph Embedding Step 3. From h-d to 1-D: Projection Step 4. Proof in 1-D: Integrating Cut Inequality 12

13 Example Application: Two Unicast Sessions For two unicast sessions in an undirected network (G, c), network coding is equivalent to routing(mcf). i.e., a throughput vector (r 1,r 2 ) is feasible with network coding if and only if it is feasible with routing. 13

14 Example Application: Two Unicast Sessions Step 1. Transformation: Apply the following result to all network configurations with k = 2, to translate the statement from its throughput version to cost version. [Li and Li, 2004] Given an undirected network G with k pairs of unicast terminals specified, and any desired throughput vector r, the maximum coding advantage in (G,c) over all c Q E +, equals the maximum cost advantage in (G,w) over all w Q E +. 14

15 Example Application: Two Unicast Sessions Step 2. Embedding: Isometric (distance-preserving) embedding of G into l. n ( n )1 p u,v = lim x ui x vi p = max x ui x vi p i i=1 Embed each node u i in G to (x i1 = d i1,x i2 = d i2,...,x ii = d ii = 0,...,x i,n = d i,n ), where d ij is the shortest path length between u i and u j in G No counter example for space information flow problem in l n = no counter example for network information flow problem in G 15

16 Example Application: Two Unicast Sessions Step 3. Projection: (3.a.) from l n to l 2, then (3.b.) from l 2 to l 1 (3.a.) Theorem: If network coding can outperform routing in l n, then it can do so in l k. k = 2 in this case. idea: keep k primary coordinates, truncate the other n k coordinates (3.b.) idea: a unit vector in l 2, when projected to the two diagonal lines, has constant total projected length N 1 y C /4 M D -1 E o 1 x -16

17 Example Application: Two Unicast Sessions Step 4. 1-D Proof: Integrating the cut inequality over the 1-D space s1 t2 s3 t3 t1 s2 x0 x x= f x dx x= Demand((, x) (x, ))dx LFH = e ( e 1 f e ) RHS = i s i t i 1 r i Therefore: e ( e 1f e ) i ( s it i 1 r i ). 17

18 Example Application: The O(log k) Upper-bound For k unicast sessions in an undirected network(g, c), if a throughput vector r can be achieved by network r coding, then routing can achieve at least O(logk). 18

19 Example Application: The O(log k) Upper-bound Step 1. Transformation: Apply the following result to all network configurations with k unicast sessions, to translate the statement from its throughput version to cost version. [Li and Li, 2004] Given an undirected network G with k pairs of unicast terminals specified, and any desired throughput vector r, the maximum coding advantage in (G,c) over all c Q E +, equals the maximum cost advantage in (G,w) over all w Q E +. 19

20 Example Application: The O(log k) Upper-bound Step 2. Embedding: O(log k)-distortion embedding of G into l 2 (Euclidean space). ( n )1 2 u,v 2 = (x ui x vi ) 2 i=1 [Bourgain, 1985] The closure of an edge-weighted graph (G,w) with n nodes can be embedded into l p for any 1 p, with distortion O(logn). No counter example for space information flow problem in l n 2 = Throughput gap for network information flow problem in G upper-bounded by distortion O(log k) 20

21 Example Application: The O(log k) Upper-bound Step 3. Projection: from l n 2 to l 1 Theorem: If network coding can outperform routing in l n 2, then it can do so in l 1 Find good 1-D space for projection onto: enumerate all possible p, by integrating over Φ. Prove: (f e e p )dφ < ( s i t i p r i )dφ Φ e Φ i p 21

22 Example Application: The O(log k) Upper-bound Step 4. 1-D Proof: Integrating the cut inequality over the 1-D space s1 t2 s3 t3 t1 s2 x0 x x= f x dx x= Demand((, x) (x, ))dx LFH = e ( e 1 f e ) RHS = i s i t i 1 r i Therefore: e ( e 1f e ) i ( s it i 1 r i ). 22

23 Example Application: Complete Networks Network Coding is equivalent to routing in a complete network with uniform link weights. Isometrically embed G into l n 2, then project to l 1 : for each vertex i, i = 1,2,,n, let all the coordinates of i be zero, except that the ith coordinate is 2 2 : ( ) 2 0,...,0,x i = 2,0,...,0 23

24 A Possible Proof to the MU-NC Conjecture? Step 1. From Throughput to Cost: translate to cost version. done Step 2. From Network to Space: Graph Embedding. Isometrically embed G into l k. done Step 3. From l k to l 1 (or l 2 ): Projection.??? (l n 2 to l1, done; l 2 to l1, done) Step 4. Proof in 1-D: Integrating Cut Inequality. done 24

A Geometric Framework for Investigating the Multiple Unicast Network Coding Conjecture

A Geometric Framework for Investigating the Multiple Unicast Network Coding Conjecture A Geometric Framework for Investigating the Multiple Unicast Network Coding Conjecture Tang Xiahou, Chuan Wu, Jiaqing Huang, Zongpeng Li Department of Computer Science, Universit of Calgar, Canada Department

More information

Lecture 6: Linear Programming for Sparsest Cut

Lecture 6: Linear Programming for Sparsest Cut Lecture 6: Linear Programming for Sparsest Cut Sparsest Cut and SOS The SOS hierarchy captures the algorithms for sparsest cut, but they were discovered directly without thinking about SOS (and this is

More information

Lecture Overview. 2 Shortest s t path. 2.1 The LP. 2.2 The Algorithm. COMPSCI 530: Design and Analysis of Algorithms 11/14/2013

Lecture Overview. 2 Shortest s t path. 2.1 The LP. 2.2 The Algorithm. COMPSCI 530: Design and Analysis of Algorithms 11/14/2013 COMPCI 530: Design and Analysis of Algorithms 11/14/2013 Lecturer: Debmalya Panigrahi Lecture 22 cribe: Abhinandan Nath 1 Overview In the last class, the primal-dual method was introduced through the metric

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

Embedding Bounded Bandwidth Graphs into l 1

Embedding Bounded Bandwidth Graphs into l 1 Embedding Bounded Bandwidth Graphs into l 1 Douglas E. Carroll Ashish Goel Adam Meyerson November 2, 2005 Abstract We introduce the first embedding of graphs of low bandwidth into l 1, with distortion

More information

Probabilistic embedding into trees: definitions and applications. Fall 2011 Lecture 4

Probabilistic embedding into trees: definitions and applications. Fall 2011 Lecture 4 Probabilistic embedding into trees: definitions and applications. Fall 2011 Lecture 4 Instructor: Mohammad T. Hajiaghayi Scribe: Anshul Sawant September 21, 2011 1 Overview Some problems which are hard

More information

Cross-Monotonic Multicast

Cross-Monotonic Multicast Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live

More information

Embedding Bounded Bandwidth Graphs into l 1

Embedding Bounded Bandwidth Graphs into l 1 Embedding Bounded Bandwidth Graphs into l 1 Douglas E. Carroll 1, Ashish Goel 2, and Adam Meyerson 1 1 UCLA 2 Stanford University Abstract. We introduce the first embedding of graphs of low bandwidth into

More information

CSC Linear Programming and Combinatorial Optimization Lecture 12: Semidefinite Programming(SDP) Relaxation

CSC Linear Programming and Combinatorial Optimization Lecture 12: Semidefinite Programming(SDP) Relaxation CSC411 - Linear Programming and Combinatorial Optimization Lecture 1: Semidefinite Programming(SDP) Relaxation Notes taken by Xinwei Gui May 1, 007 Summary: This lecture introduces the semidefinite programming(sdp)

More information

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks 570 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Bounding the Coding Advantage of Combination Network Coding in Undirected Networks Shreya Maheshwar, Zongpeng Li, Member, IEEE,

More information

Space Information Flow

Space Information Flow Space Information Flow Zongpeng Li Dept. of Computer Science, University of Calgary and Institute of Network Coding, CUHK zongpeng@ucalgary.ca Chuan Wu Department of Computer Science The University of

More information

Lecture Online Algorithms and the k-server problem June 14, 2011

Lecture Online Algorithms and the k-server problem June 14, 2011 Approximation Algorithms Workshop June 13-17, 2011, Princeton Lecture Online Algorithms and the k-server problem June 14, 2011 Joseph (Seffi) Naor Scribe: Mohammad Moharrami 1 Overview In this lecture,

More information

Solutions to Assignment# 4

Solutions to Assignment# 4 Solutions to Assignment# 4 Liana Yepremyan 1 Nov.12: Text p. 651 problem 1 Solution: (a) One example is the following. Consider the instance K = 2 and W = {1, 2, 1, 2}. The greedy algorithm would load

More information

2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into

2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into 2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into the viewport of the current application window. A pixel

More information

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming

More information

Embedding Bounded Bandwidth Graphs into l p

Embedding Bounded Bandwidth Graphs into l p UCLA Tech Report 070002 Embedding Bounded Bandwidth Graphs into l p Douglas E. Carroll Adam Meyerson February 16, 2007 Abstract We prove that graphs can be embedded randomly into l p (for any p 1) with

More information

Network flows and Menger s theorem

Network flows and Menger s theorem Network flows and Menger s theorem Recall... Theorem (max flow, min cut strong duality). Let G be a network. The maximum value of a flow equals the minimum capacity of a cut. We prove this strong duality

More information

The Design of Approximation Algorithms

The Design of Approximation Algorithms The Design of Approximation Algorithms David P. Williamson Cornell University David B. Shmoys Cornell University m Щ0 CAMBRIDGE UNIVERSITY PRESS Contents Preface page ix I An Introduction to the Techniques

More information

Graph Theory and Optimization Approximation Algorithms

Graph Theory and Optimization Approximation Algorithms Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and

More information

On Benefits of Network Coding in Bidirected Networks and Hyper-networks

On Benefits of Network Coding in Bidirected Networks and Hyper-networks On Benefits of Network Coding in Bidirected Networks and Hyper-networks Zongpeng Li University of Calgary / INC, CUHK December 1 2011, at UNSW Joint work with: Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Frédéric Giroire FG Simplex 1/11 Motivation Goal: Find good solutions for difficult problems (NP-hard). Be able to quantify the goodness of the given solution. Presentation of

More information

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:

More information

Computer Science & Engineering 423/823 Design and Analysis of Algorithms

Computer Science & Engineering 423/823 Design and Analysis of Algorithms Computer Science & Engineering 423/823 Design and Analysis of Algorithms Lecture 07 Single-Source Shortest Paths (Chapter 24) Stephen Scott and Vinodchandran N. Variyam sscott@cse.unl.edu 1/36 Introduction

More information

Network Coding in Planar Networks

Network Coding in Planar Networks Network Coding in Planar Networks Zongpeng Li Department of Computer Science, University of Calgary Institute of Network Coding, CUHK April 30, 2012 @ PolyU 1 joint work with: Tang Xiahou, University of

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 36 CS 473: Algorithms, Spring 2018 LP Duality Lecture 20 April 3, 2018 Some of the

More information

Materials Voyage 200/TI-92+ calculator with Cabri Geometry Student activity sheet Shortest Distance Problems. Introduction

Materials Voyage 200/TI-92+ calculator with Cabri Geometry Student activity sheet Shortest Distance Problems. Introduction s (Adapted from T 3 Geometry/C. Vonder Embse) Concepts Triangle inequality Distance between two points Distance between a point and a line Distance between two points and a line Perpendicularity Materials

More information

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017

CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017 CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017 Reading: Section 9.2 of DPV. Section 11.3 of KT presents a different approximation algorithm for Vertex Cover. Coping

More information

Fall CS598CC: Approximation Algorithms. Chandra Chekuri

Fall CS598CC: Approximation Algorithms. Chandra Chekuri Fall 2006 CS598CC: Approximation Algorithms Chandra Chekuri Administrivia http://www.cs.uiuc.edu/homes/chekuri/teaching/fall2006/approx.htm Grading: 4 home works (60-70%), 1 take home final (30-40%) Mailing

More information

Notes for Lecture 20

Notes for Lecture 20 U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

Homework 2: Multi-unit combinatorial auctions (due Nov. 7 before class)

Homework 2: Multi-unit combinatorial auctions (due Nov. 7 before class) CPS 590.1 - Linear and integer programming Homework 2: Multi-unit combinatorial auctions (due Nov. 7 before class) Please read the rules for assignments on the course web page. Contact Vince (conitzer@cs.duke.edu)

More information

8 Matroid Intersection

8 Matroid Intersection 8 Matroid Intersection 8.1 Definition and examples 8.2 Matroid Intersection Algorithm 8.1 Definitions Given two matroids M 1 = (X, I 1 ) and M 2 = (X, I 2 ) on the same set X, their intersection is M 1

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

I can position figures in the coordinate plane for use in coordinate proofs. I can prove geometric concepts by using coordinate proof.

I can position figures in the coordinate plane for use in coordinate proofs. I can prove geometric concepts by using coordinate proof. Page 1 of 14 Attendance Problems. 1. Find the midpoint between (0, x) and (y, z).. One leg of a right triangle has length 1, and the hypotenuse has length 13. What is the length of the other leg? 3. Find

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,

More information

Trees, Trees and More Trees

Trees, Trees and More Trees Trees, Trees and More Trees August 9, 01 Andrew B. Kahng abk@cs.ucsd.edu http://vlsicad.ucsd.edu/~abk/ How You ll See Trees in CS Trees as mathematical objects Trees as data structures Trees as tools for

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems

More information

Discrete Mathematics Course Review 3

Discrete Mathematics Course Review 3 21-228 Discrete Mathematics Course Review 3 This document contains a list of the important definitions and theorems that have been covered thus far in the course. It is not a complete listing of what has

More information

Exercise set 2 Solutions

Exercise set 2 Solutions Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T

More information

Outline. Combinatorial Optimization 2. Finite Systems of Linear Inequalities. Finite Systems of Linear Inequalities. Theorem (Weyl s theorem :)

Outline. Combinatorial Optimization 2. Finite Systems of Linear Inequalities. Finite Systems of Linear Inequalities. Theorem (Weyl s theorem :) Outline Combinatorial Optimization 2 Rumen Andonov Irisa/Symbiose and University of Rennes 1 9 novembre 2009 Finite Systems of Linear Inequalities, variants of Farkas Lemma Duality theory in Linear Programming

More information

Graphs. Pseudograph: multiple edges and loops allowed

Graphs. Pseudograph: multiple edges and loops allowed Graphs G = (V, E) V - set of vertices, E - set of edges Undirected graphs Simple graph: V - nonempty set of vertices, E - set of unordered pairs of distinct vertices (no multiple edges or loops) Multigraph:

More information

Circular Flows of Graphs

Circular Flows of Graphs Circular Flows of Graphs Hong-Jian Lai and Cunquan Zhang West Virginia University Rui Xu University of West Georgia Circular Flows of Graphs p. 1/16 Notation: G: = a graph, with vertex set V = V (G) =

More information

Lecture 4: Bipartite graphs and planarity

Lecture 4: Bipartite graphs and planarity Lecture 4: Bipartite graphs and planarity Anders Johansson 2011-10-22 lör Outline Bipartite graphs A graph G is bipartite with bipartition V1, V2 if V = V1 V2 and all edges ij E has one end in V1 and V2.

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

Basic Approximation algorithms

Basic Approximation algorithms Approximation slides Basic Approximation algorithms Guy Kortsarz Approximation slides 2 A ρ approximation algorithm for problems that we can not solve exactly Given an NP-hard question finding the optimum

More information

Given a graph, find an embedding s.t. greedy routing works

Given a graph, find an embedding s.t. greedy routing works Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there

More information

Insensitive Traffic Splitting in Data Networks

Insensitive Traffic Splitting in Data Networks Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

More information

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748 COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu http://www.cs.fiu.edu/~giri/teach/cot6936_s12.html https://moodle.cis.fiu.edu/v2.1/course/view.php?id=174

More information

Acyclic Subgraphs of Planar Digraphs

Acyclic Subgraphs of Planar Digraphs Acyclic Subgraphs of Planar Digraphs Noah Golowich Research Science Institute Department of Mathematics Massachusetts Institute of Technology Cambridge, Massachusetts, U.S.A. ngolowich@college.harvard.edu

More information

Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction

Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction 5339 - Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction Instructor: Anastasios Sidiropoulos January 8, 2014 Geometry & algorithms Geometry in algorithm design Computational

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees

Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees Lior Kamma 1 Introduction Embeddings and Distortion An embedding of a metric space (X, d X ) into a metric space (Y, d Y ) is

More information

The following is a summary, hand-waving certain things which actually should be proven.

The following is a summary, hand-waving certain things which actually should be proven. 1 Basics of Planar Graphs The following is a summary, hand-waving certain things which actually should be proven. 1.1 Plane Graphs A plane graph is a graph embedded in the plane such that no pair of lines

More information

Euclidean TSP Between Two Nested Convex Obstacles

Euclidean TSP Between Two Nested Convex Obstacles Euclidean TSP Between Two Nested Convex Obstacles August 11, 2005 Jeff Abrahamson, Dept. of Computer Science, Drexel University, Philadelphia, PA, USA, jeffa@cs.drexel.edu. Ali Shokoufandeh, Dept. of Computer

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization Frank de Zeeuw EPFL 2012 Today Introduction Graph problems - What combinatorial things will we be optimizing? Algorithms - What kind of solution are we looking for? Linear Programming

More information

[Ramalingam, 4(12): December 2017] ISSN DOI /zenodo Impact Factor

[Ramalingam, 4(12): December 2017] ISSN DOI /zenodo Impact Factor GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES FORCING VERTEX TRIANGLE FREE DETOUR NUMBER OF A GRAPH S. Sethu Ramalingam * 1, I. Keerthi Asir 2 and S. Athisayanathan 3 *1,2 & 3 Department of Mathematics,

More information

Eulerian disjoint paths problem in grid graphs is NP-complete

Eulerian disjoint paths problem in grid graphs is NP-complete Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information

More information

Math 485, Graph Theory: Homework #3

Math 485, Graph Theory: Homework #3 Math 485, Graph Theory: Homework #3 Stephen G Simpson Due Monday, October 26, 2009 The assignment consists of Exercises 2129, 2135, 2137, 2218, 238, 2310, 2313, 2314, 2315 in the West textbook, plus the

More information

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3) COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms

More information

LAMC Advanced Circle October 9, Oleg Gleizer. Warm-up

LAMC Advanced Circle October 9, Oleg Gleizer. Warm-up LAMC Advanced Circle October 9, 2016 Oleg Gleizer prof1140g@math.ucla.edu Warm-up Problem 1 Prove that a straight line tangent to a circle is perpendicular to the radius connecting the tangency point to

More information

and 6.855J March 6, Maximum Flows 2

and 6.855J March 6, Maximum Flows 2 5.08 and.855j March, 00 Maximum Flows Network Reliability Communication Network What is the maximum number of arc disjoint paths from s to t? How can we determine this number? Theorem. Let G = (N,A) be

More information

Lecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates

Lecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates CSE 51: Design and Analysis of Algorithms I Spring 016 Lecture 11: Clustering and the Spectral Partitioning Algorithm Lecturer: Shayan Oveis Gharan May nd Scribe: Yueqi Sheng Disclaimer: These notes have

More information

MTH 362 Study Guide Exam 1 System of Euclidean Geometry 1. Describe the building blocks of Euclidean geometry. a. Point, line, and plane - undefined

MTH 362 Study Guide Exam 1 System of Euclidean Geometry 1. Describe the building blocks of Euclidean geometry. a. Point, line, and plane - undefined MTH 362 Study Guide Exam 1 System of Euclidean Geometry 1. Describe the building blocks of Euclidean geometry. a. Point, line, and plane - undefined terms used to create definitions. Definitions are used

More information

A Verification Based Method to Generate Cutting Planes for IPs

A Verification Based Method to Generate Cutting Planes for IPs A Verification Based Method to Generate Cutting Planes for IPs Santanu S. Dey Sebastian Pokutta Georgia Institute of Technology, USA. Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany. SIAM Conference

More information

Discrete Wiskunde II. Lecture 6: Planar Graphs

Discrete Wiskunde II. Lecture 6: Planar Graphs , 2009 Lecture 6: Planar Graphs University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Planar Graphs Given an undirected graph (or multigraph) G = (V, E). A planar embedding of G is

More information

Linear Programming and its Applications

Linear Programming and its Applications Linear Programming and its Applications Outline for Today What is linear programming (LP)? Examples Formal definition Geometric intuition Why is LP useful? A first look at LP algorithms Duality Linear

More information

Linear Programming Duality and Algorithms

Linear Programming Duality and Algorithms COMPSCI 330: Design and Analysis of Algorithms 4/5/2016 and 4/7/2016 Linear Programming Duality and Algorithms Lecturer: Debmalya Panigrahi Scribe: Tianqi Song 1 Overview In this lecture, we will cover

More information

Lecture 7: Asymmetric K-Center

Lecture 7: Asymmetric K-Center Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Impact of Network Coding on Combinatorial Optimization

Impact of Network Coding on Combinatorial Optimization Impact of Network Coding on Combinatorial Optimization Chandra Chekuri Univ. of Illinois, Urbana-Champaign DIMACS Workshop on Network Coding: Next 15 Years December 16, 015 Network Coding [Ahlswede-Cai-Li-Yeung]

More information

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 2009) Lecture 10,11: General Matching Polytope, Maximum Flow Lecturer: Mohammad R Salavatipour Date: Oct 6 and 8, 2009 Scriber: Mohammad

More information

ACO Comprehensive Exam October 12 and 13, Computability, Complexity and Algorithms

ACO Comprehensive Exam October 12 and 13, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Given a simple directed graph G = (V, E), a cycle cover is a set of vertex-disjoint directed cycles that cover all vertices of the graph. 1. Show that there

More information

CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES

CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES M. M. KANTÉ 1 B. COURCELLE 1 C. GAVOILLE 1 A. TWIGG 2 1 Université Bordeaux 1, LaBRI, CNRS. 2 Computer Laboratory, Cambridge University. Topological

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can

More information

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Lecture Overview. 2 The Steiner Tree Problem. 2.1 Steiner tree: a 2-approximation algorithm. COMPSCI 590.1: Graph Algorithms March 22, 2015

Lecture Overview. 2 The Steiner Tree Problem. 2.1 Steiner tree: a 2-approximation algorithm. COMPSCI 590.1: Graph Algorithms March 22, 2015 COMPCI 590.1: Graph Algorithms March 22, 2015 Lecturer: Debmalya Panigrahi Lecture 16-17 cribe: Yuhao Hu 1 Overview The main topics of this lecture are the offline edge-weighted teiner tree and teiner

More information

Minimum Weight Constrained Forest Problems. Problem Definition

Minimum Weight Constrained Forest Problems. Problem Definition Slide 1 s Xiaoyun Ji, John E. Mitchell Department of Mathematical Sciences Rensselaer Polytechnic Institute Troy, NY, USA jix@rpi.edu, mitchj@rpi.edu 2005 Optimization Days Montreal, Canada May 09, 2005

More information

Computer Science 280 Fall 2002 Homework 10 Solutions

Computer Science 280 Fall 2002 Homework 10 Solutions Computer Science 280 Fall 2002 Homework 10 Solutions Part A 1. How many nonisomorphic subgraphs does W 4 have? W 4 is the wheel graph obtained by adding a central vertex and 4 additional "spoke" edges

More information

Light Spanners with Stack and Queue Charging Schemes

Light Spanners with Stack and Queue Charging Schemes Light Spanners with Stack and Queue Charging Schemes Vincent Hung 1 1 Department of Math & CS Emory University The 52nd Midwest Graph Theory Conference, 2012 Outline Motivation Metrical Optimization Problems

More information

8 NP-complete problem Hard problems: demo

8 NP-complete problem Hard problems: demo Ch8 NPC Millennium Prize Problems http://en.wikipedia.org/wiki/millennium_prize_problems 8 NP-complete problem Hard problems: demo NP-hard (Non-deterministic Polynomial-time hard), in computational complexity

More information

In this lecture, we ll look at applications of duality to three problems:

In this lecture, we ll look at applications of duality to three problems: Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,

More information

Reductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements.

Reductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements. Desiderata Reductions Desiderata. Classify problems according to their computational requirements. Frustrating news. Huge number of fundamental problems have defied classification for decades. Desiderata'.

More information

Shannon Switching Game

Shannon Switching Game EECS 495: Combinatorial Optimization Lecture 1 Shannon s Switching Game Shannon Switching Game In the Shannon switching game, two players, Join and Cut, alternate choosing edges on a graph G. Join s objective

More information

3. Voronoi Diagrams. 3.1 Definitions & Basic Properties. Examples :

3. Voronoi Diagrams. 3.1 Definitions & Basic Properties. Examples : 3. Voronoi Diagrams Examples : 1. Fire Observation Towers Imagine a vast forest containing a number of fire observation towers. Each ranger is responsible for extinguishing any fire closer to her tower

More information

Approximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs

Approximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 1 An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 2 Linear independence A collection of row vectors {v T i } are independent

More information

6 Randomized rounding of semidefinite programs

6 Randomized rounding of semidefinite programs 6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can

More information

On the multiple unicast network coding conjecture

On the multiple unicast network coding conjecture On the multiple unicast networ coding conjecture The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Langberg,

More information

Dual-fitting analysis of Greedy for Set Cover

Dual-fitting analysis of Greedy for Set Cover Dual-fitting analysis of Greedy for Set Cover We showed earlier that the greedy algorithm for set cover gives a H n approximation We will show that greedy produces a solution of cost at most H n OPT LP

More information

Mth 97 Winter 2013 Sections 4.3 and 4.4

Mth 97 Winter 2013 Sections 4.3 and 4.4 Section 4.3 Problem Solving Using Triangle Congruence Isosceles Triangles Theorem 4.5 In an isosceles triangle, the angles opposite the congruent sides are congruent. A Given: ABC with AB AC Prove: B C

More information

MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms

MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms Ann-Brith Strömberg 2018 04 24 Lecture 9 Linear and integer optimization with applications

More information

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 29 CS 473: Algorithms, Spring 2018 Simplex and LP Duality Lecture 19 March 29, 2018

More information

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

CSE 417 Network Flows (pt 3) Modeling with Min Cuts CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined

More information

The k-center problem Approximation Algorithms 2009 Petros Potikas

The k-center problem Approximation Algorithms 2009 Petros Potikas Approximation Algorithms 2009 Petros Potikas 1 Definition: Let G=(V,E) be a complete undirected graph with edge costs satisfying the triangle inequality and k be an integer, 0 < k V. For any S V and vertex

More information

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V -93-11. Graph Theory Example: V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V b e f V={a, b, c, d, e, f, g} a c d f E={(a,b), (b,c), (c,a),... } Note: (a,

More information

Planarity. 1 Introduction. 2 Topological Results

Planarity. 1 Introduction. 2 Topological Results Planarity 1 Introduction A notion of drawing a graph in the plane has led to some of the most deep results in graph theory. Vaguely speaking by a drawing or embedding of a graph G in the plane we mean

More information

be a polytope. has such a representation iff it contains the origin in its interior. For a generic, sort the inequalities so that

be a polytope. has such a representation iff it contains the origin in its interior. For a generic, sort the inequalities so that ( Shelling (Bruggesser-Mani 1971) and Ranking Let be a polytope. has such a representation iff it contains the origin in its interior. For a generic, sort the inequalities so that. a ranking of vertices

More information