The Online Median Problem
|
|
- Clara Allen
- 6 years ago
- Views:
Transcription
1 The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas the -median problem involves optimizing the simultaneous placement of facilities, the online median problem imposes the following additional constraints: the facilities are placed one at a time; a facility, once placed, cannot be moved; the total number of facilities to be placed,, is not known in advance. The objective of an online median algorithm is to minimize competitive ratio, that is, the worst-case ratio of the cost of an online placement to that of an optimal offline placement. Our main result is a linear-time constant-competitive algorithm for the online median problem. In addition, we present a related, though substantially simpler, linear-time constant-factor approximation algorithm for the (metric uncapacitated) facility location problem. The latter algorithm is similar in spirit to the recent primal-dual-based facility location algorithm of Jain and Vazirani, but our approach is more elementary and yields an improved running time. Department of Computer Science, University of Texas at Austin, Austin, TX This research was supported by NSF Grant CCR ramgopal, plaxton@cs.utexas.edu.
2 1 Introduction Recently the first constant-factor approximation algorithm was discovered for the -median problem by Charikar et al. [3]; in this paper, we ask whether a constant competitive ratio can be achieved for a natural online extension of the -median problem. Let Í be a nonempty set of Ò points and let be a metric distance function on Í. The -median problem is concerned with marking points such that the sum over all points Ü of the weight of Ü times the distance from Ü to the closest marked point is minimized. For the online median problem, we wish to find an ordering of the Ò points such that for all, ¼ Ò, the first points provide a good solution (e.g. constant factor approximation) to the -median problem. An obvious approach to the online median problem is to iteratively choose the point that minimizes the objective function. Greedy strategies of this kind are commonly applied in the design of online algorithms [1, 9]. It turns out, however, that for the online median problem, the simple strategy suggested above has an unbounded competitive ratio. We show that a modification of this strategy that we call hierarchically greedy can be used to obtain a constant-competitive linear-time algorithm for the online median problem. We develop this strategy by first considering a simple greedy algorithm for facility location. 1.1 Problem Definitions Without loss of generality, throughout this paper we consider a fixed set of points Í with an associated distance function Í Í ÁÊ and nonnegative functions Û Í ÁÊ. We are primarily interested in the case where the function is a metric, that is, where is nonnegative, symmetric, satisfies the triangle inequality, and Ü Ýµ ¼ iff Ü Ý. For the online median problem, it will prove to be useful to consider a slightly more general class of distance functions in which the triangle inequality is relaxed to the following -approximate È triangle inequality, where ½: For any sequence of points Ü ¼ Ü in Í, Ü ¼ Ü µ ¼ Ü Ü ½ µ. We refer to such a distance function as a -approximate metric. We let Ò Í, and define a subset of Í to be a configuration iff it is nonempty. For any point Ü and configuration, we define Ü µ as ÑÒ Ý¾ Ü Ýµ. We consider three computational problems: -median, online median, and facility location. For the -median and online median problems, the cost of a configuration, denoted Ó Ø µ, is defined to be È Ü¾Í Ü µ Û Üµ. The input to the -median problem is Í µ, Û, and an integer, ¼ Ò. The output is a minimum-cost configuration of size. The input to the online median problem is Í µ and Û. The output is a total order on Í. We define the competitive ratio of such an ordering as the maximum over all, ¼ Ò, of the ratio of the cost of the configuration given by the first points in the ordering to that of an optimal -median configuration. We define the competitive ratio of an online median algorithm as the supremum, over all possible choices of the input instance Í µ and Û, of the competitive ratio of the ordering produced by the algorithm. For the facility location problem, the cost of a configuration, denoted Ó Ø µ, is defined as the sum of È Ü¾ ܵ and È Ü¾Í Ü µ Û Üµ. The input to the facility location problem is Í µ,, and Û. The output is a minimum-cost configuration. 1.2 Previous Work There has been much prior work on the facility location and -median problems; here we focus on the work that is most relevant to our results. The first constant-factor approximation algorithm for facility location is due to Shmoys et al. [17] and is based on rounding the (fractional) solution to a linear program. Chudak [4] gives an LP-based ½ ¾µ-approximation algorithm for facility location. This was the best constant factor known until the recent work of Charikar and Guha [2], which establishes a slightly lower approximation ratio of ½¾. The first constant-factor approximation for the -median problem was recently given by 1
3 Charikar et al. [3] and is also LP-based. That work follows a sequence of bicriteria results utilizing LPbased techniques [14, 15]. Jain and Vazirani [10] give the first nearly linear-time combinatorial algorithms for the facility location and -median problems, achieving approximation ratios of and, respectively. While the latter algorithms are combinatorial, the primal-dual approach used in their analysis is based on linear programming theory. (See [6] for an excellent introduction to the primal-dual method.) Strategies based on local search and greedy techniques for facility location and the -median problem have been previously studied. The work of Korupolu et al. [11] shows that a simple local search heuristic proposed Kuehn and Hamburger [13] yields both a constant-factor approximation for the facility location problem and a bicriteria approximation for the -median problem [11]. Guha and Khuller [7] showed that greedy improvement can be used as a postprocessing step to improve the approximation guarantee of certain facility location algorithms. Guha and Khuller also provide the best lower bound known of ½ on the approximation ratio for this problem. More recently, Charikar and Guha [2] achieved the best approximation ratio known for facility location by combining a local search heuristic with the best LP-based algorithm known. Charikar and Guha also give a -approximation for the -median problem by building on the techniques of Jain and Vazirani [10]. To the best of our knowledge, the online median problem has not been previously studied. Note that any constant-competitive algorithm for the online median problem is also a constant-factor approximation algorithm for the -median problem, but the converse does not hold. In particular, constant-factor approximation algorithms for the -median problem known prior to this work [2, 3, 10] seem to rely heavily on the knowledge of. As such it is unclear whether any of these algorithms can be easily modified to obtain a constant-competitive online median algorithm. 1.3 Contributions Algorithms for problems in discrete location theory arise in many practical applications; see [5, 16], for example, for numerous pointers to the literature. Given that many of these problems are NP-hard, it is desirable to develop fast approximation algorithms. As mentioned above, it is not uncommon for approximation algorithms to be based on a greedy approach. In this paper, we show that greedy strategies yield a fast constant-factor approximation algorithm for the facility location problem and a fast constant-competitive algorithm for the online median problem. We give a linear-time algorithm for the facility location problem that achieves an approximation ratio of. The main idea of the algorithm is to compute and use the value of balls about every point in the metric space. In retrospect, the idea of value is implicit in the work of Jain and Vazirani [10]. We make this idea explicit and use the values of balls to make greedy choices. Additionally, our algorithm is faster than the Jain-Vazirani algorithm by a logarithmic factor. While a simple greedy algorithm yields a constant-factor approximation bound for the facility location problem, it appears that a more sophisticated approach is needed to obtain a constant-factor approximation guarantee for the -median problem, let alone a constant-competitiveness result for the online median problem. For example, in Section 3 we show that perhaps the most natural greedy approach to the -median (resp., online median) problem leads to an unbounded approximation (resp., competitive) ratio. Our main result is a linear-time constant competitive algorithm for the online median problem. We achieve this result using a hierarchically greedy approach. The basic idea behind this approach is as follows: Rather than selecting a point based on a single greedy criterion, we greedily choose a region (the set of points lying within some ball) and then recursively select a point within that region. Thus, the choice of point is influenced by a sequence of greedy criteria addressing successively finer levels of granularity. 2
4 1.4 Outline The rest of this paper is organized as follows. In Section 2, we present our facility location algorithm and prove that it achieves a constant approximation ratio. In Section 3, we present our online median algorithm and prove that it is constant-competitive. Section 4 offers some concluding remarks. 2 Facility Location The following definitions are used throughout the present section as well as Section 3. For any nonnegative integer, let denote the set ¼. A ball is a pair Ü Öµ, where the center Ü of, denoted ÒØÖ µ, belongs to Í, and the radius Ö of, denoted ÖÙ µ, is a nonnegative real. Given a ball Ü Öµ, we let ÈÓÒØ µ denote the set Ý ¾ Í Ü Ýµ Ö. However, for the sake of brevity, we tend to write instead of ÈÓÒØ µ. For example, we write Ü ¾ and instead of Ü ¾ ÈÓÒØ µ and ÈÓÒØ µ ÈÓÒØ µ, respectively. È The value of a ball Ü Öµ, denoted ÚÐÙ µ, is ݾ Ö Ü Ýµµ Û Ýµ. For any ball Ü Öµ and any nonnegative real, we define as the ball Ü Öµ. 2.1 Algorithm In the first step of the following algorithm, we assume for the sake of convenience that there is at least one point Ü such that Û Üµ ¼. (The problem is trivial otherwise.) The output of the algorithm is the configuration Ò, which we also refer to as. Remark: The indexing of the sets has been introduced solely to facilitate the analysis. For each point Ü, determine an associated ball Ü Ü Ö Ü µ such that ÚÐÙ Ü µ ܵ. Determine a bijection ³ Ò Í such that Ö ³ ½µ Ö ³ µ, ¼ Ò. Let Ü Ö µ denote the ball ³ µ, ¼ Ò. Let ¼. For ¼ to Ò ½: If ¾ then let ½ Ü ; otherwise, let ½. We now sketch a simple linear-time implementation of the above algorithm. For each point Ü, the associated radius Ö Ü can be computed in Ç Òµ time. (This is essentially a weighted selection problem.) Thus the first step requires Ç Ò ¾ µ time. The second step involves sorting Ò values and can be accomplished in Ç Ò ÐÓ Òµ time. The running time for the third step is negligible. Each iteration of the fourth step can be easily implemented in Ç Òµ time, for a total of Ç Ò ¾ µ time. 2.2 Approximation Ratio In this section we establish the following theorem. Theorem 1 For any configuration, Ó Ø µ Ó Ø µ. Immediate from Lemmas 2.3 and 2.7 below. 3
5 Lemma 2.1 For any point Ü, there exists a point Ü in such that and Ü Ü µ ¾Ö. If there is no such point Ü with, then ¾ is empty, and so Ü belongs to. Lemma 2.2 Let Ü and Ü be distinct points in. Then Ü Ü µ ¾ ÑÜÖ Ö. Assume without loss of generality that. Thus Ö Ö. Furthermore, Ü Ü µ ¾Ö since Ü belongs to and ¾ is empty. For any point Ü and any configuration, let charge Ü µ Ü µ Ü ¾ Ñܼ Ö Ü Üµ È Lemma 2.3 For any configuration, Ü¾Í Ö Ü µ Û Üµ Ó Ø µ. Note that Ü¾Í Ö Ü µ Û Üµ Ü ¾ Ü ¾ which is equal to Ó Ø µ since ÚÐÙ µ Ü µ. ܾ Ö Ü Üµµ Û Üµ ÚÐÙ µ Ü¾Í Ü¾Í Ü µ Û Üµ Ü µ Û Üµ Lemma 2.4 Let Ü be a point, let be a configuration, and let Ü belong to. If Ü Ü µ Ü µ then Ö Ü µ ÑÜÖ Ü Ü µ. If Ü does not belong to, then Ö Ü µ Ü Ü µ Ö. Otherwise, Ö Ü µ Ö Ü Ü µµ Ü Ü µ Ö Ü Ü µ. Lemma 2.5 Let Ü be a point and let Ü belong to. If Ü belongs to, then Ö Ü µ Ö. By Lemma 2.2, there is no point Ü in such that and Ü belongs to. The claim now follows from the definition of Ö Ü µ, since Ü µ Ü Ü µ. Lemma 2.6 Let Ü be a point and let Ü belong to. If Ü does not belong to, then Ö Ü µ Ü Ü µ. The claim is immediate unless there is a point Ü in such that Ü belongs to. If such a point Ü exists, then Lemmas 2.2 and 2.5 imply Ü Ü µ ¾ ÑÜÖ Ö and Ö Ü µ Ö, respectively. The claim now follows since Ü Ü µ Ü Ü µ Ü Ü µ ¾Ö Ö Ö. Lemma 2.7 For any point Ü and configuration, Ö Ü µ Ö Ü µ. Let Ü be some point in such that Ü Ü µ Ü µ. By Lemma 2.1, there exists a point Ü in such that and Ü Ü µ ¾Ö. If Ü belongs to, then Ö Ü µ Ö by Lemma 2.5. The claim follows since implies Ö Ö and Lemma 2.4 implies Ö Ü µ Ö. If Ü does not belong to, then Ö Ü µ Ü Ü µ by Lemma 2.6. Thus Ö Ü µ Ü Ü µ Ü Ü µ Ü Ü µ ¾Ö. The claim now follows by Lemma 2.4, since the ratio of Ü Ü µ ¾Ö to ÑÜÖ Ü Ü µ is at most 3. 4
6 3 Online Median Placement In the previous section, we found that a simple greedy algorithm yields interesting results for the facility location problem. Ideally, we would like to formulate a similar algorithm for the online median problem. The most obvious greedy algorithm is to select as the next point in the ordering the one that minimizes the objective function. Unfortunately, this algorithm gives an unbounded competitive (resp., approximation) ratio for the online median (resp., -median) problem. To see this, consider an instance consisting of Ò points, one red and the rest blue, such that the following conditions are satisfied: the red point has weight ¼; each blue point has weight ½; the distance from the red point to any blue point is ½; the distance between any pair of distinct blue points is ¾. The aforementioned greedy algorithm chooses the red point first in the ordering, since that gives a cost of Ò ½ while choosing any other point gives a cost of ¾Ò. But then the ratio for a configuration of size Ò ½ is unbounded since the greedy cost is ½ and the optimal cost is ¼. (This example also shows that no online median algorithm can achieve a competitive ratio below ¾ ¾.) Ò ½ We show that a more careful choice of the point, which we call hierarchically greedy, works well. Let (resp., Æ) denote the largest (resp., smallest) distance between two distinct points in the metric space. We define a certain ball about each point, and select a ball of maximum value. But rather than simply choosing the center of ball as the next point in the ordering, we apply the approach recursively to select a point within. At each successive level of recursion, we consider geometrically smaller balls about the remaining candidate points. Within Ç ÐÓ µ levels of recursion, we arrive at a ball containing only a single Æ point, and we return this point as the next one in the ordering. Note that whereas the greedy algorithm discussed in the previous paragraph makes a single greedy choice to select a point, the hierarchically greedy algorithm makes Ç ÐÓ µ greedy choices per point. Æ Throughout this section, let, «,, and denote real numbers satisfying the following inequalities. ½ (1) «½ (2) «½µ «½ «¾ «««½ (3) (4) The online median algorithm of Section 3.1 below makes use of the following additional definitions. A child of a ball Ü Öµ is any ball Ý Ö µ where Ü Ýµ Ö. For any point Ü, let ÓÐØ Ü µ denote «the ball Ü ÑÜ Ý¾Í Ü Ýµµ. For any point Ü and configuration, let ÓÐØ Ü µ denote the ball Ü Ü µ µ. For any nonempty sequence ±, we let ±µ (resp., ØÐ ±µ) denote the first (resp., last) element of ±. 3.1 Algorithm Let ¼. For ¼ to Ò ½, execute the following steps: Let denote the singleton sequence where is a maximum value ball in ÓÐØ Ü µ Ü ¾ Í Ò. While the ball ØÐ µ has more than one child, append a maximum value child of ØÐ µ to. Let ½ ÒØÖ ØÐ µµ. 5
7 The output of the online median algorithm is a collection of point sets such that, ¼ Ò, and ½, ¼ Ò. Note that it is sufficient for an implementation of the algorithm to maintain the ball ØÐ µ, as opposed to the entire sequence. The sequence has been introduced in order to facilitate the analysis. We discuss two implementations of the online median algorithm in Section 3.4. The first implementation has a slightly superlinear running time. The second implementation runs in linear time, but assumes a (linear) preprocessing phase in which all distances are rounded down to the nearest integral power of. (Note that for the preprocessing phase to be well-defined, we require ½.) If the input distance function is a metric, it is straightforward to see that such rounding produces a -approximate metric. 3.2 Competitive Ratio Before proceeding with the analysis, we introduce a number of additional definitions. Let Þ denote the unique point in ½ Ò, ¼ Ò. For any configuration and set of points, let Ó Ø µ È Ý¾ Ý µ Û Ýµ. For any configuration, we partition Í into sets ÐÐ Ü µ Ü ¾ as follows: For each point Ý in Í, we choose a point Ü in such that Ý µ Ü Ýµ and add Ý to ÐÐ Ü µ. For any configuration, point Ü in, and set of points, we define Ò Ü µ as ÐÐ Ü µ ÓÐØ Ü µ and ÓÙØ Ü µ as ÐÐ Ü µ Ò Ò Ü µ. For any configuration and set of points, we define Ò µ as ܾ Ò Ü µ and ÓÙØ µ as Í Ò Ò µ. In this section we present our main result, Theorem 2 below. In order to minimize the competitive ratio of ¾ ½µ implied by the theorem, we set to ½, set «to approximately and set and to the right-hand sides of Equations (3) and (4), respectively. We thereby establish a competitive ratio of slightly below ¼ for the online median problem. In Section 3.4 we describe a linear-time implementation of the online median algorithm for which the parameter is required to be strictly greater than ½. The degradation in the competitive ratio that results by setting greater than ½ can be made arbitrarily small by choosing sufficiently close to ½. Theorem 2 For any configuration, Ó Ø µ ¾ ½µ Ó Ø µ. Let Ò µ and let ¼ ÓÙØ µ Í Ò. Note that Ó Ø µ Ó Ø µ Ó Ø ¼ µ and Ó Ø µ Ó Ø µ Ó Ø ¼ µ. Thus the theorem follows immediately from Lemmas 3.2, 3.4, and 3.5 below. Lemma 3.1 For any configuration, point Ü in, and point Ý in ÓÙØ Ü µ, Ý µ ½µ Ý µ. Let ÓÐØ Ü µ Ü Öµ. Note that Ü Ýµ Ö. Also, by the definition of ÓÐØ Ü µ, there is a point Þ in such that Ü Þµ Ö. Hence Ý Þµ Ü Ýµ Ü Þµ Ü Ýµ Ö Ü Ýµ Ü Ýµ ½µ Ü Ýµ ½µ Ý µ. The claim follows since Ý Þµ Ý µ. 6
8 Lemma 3.2 For any configuration, cost ÓÙØ µµ ½µ Ó Ø ÓÙØ µµ Summing the inequality of Lemma 3.1 over all Ý in ÓÙØ Ü µ, we obtain cost ÓÙØ Ü µµ ½µ Ó Ø ÓÙØ Ü µµ The claim now follows by summing the above inequality over all Ü in. Lemma 3.3 For any configuration and point Ü in, cost Ò Ü µµ ½µÓ Ø Ò Ü µµ ÚÐÙ ÓÐØ Ü µµ Assume that ÓÐØ Ü µ Ü Öµ. Note that Ü Ýµ Ö for some Ý in. Thus, for any Þ in ÓÐØ Ü µ, Ý Þµ Ý Üµ Ü Þµ ½µÖ. It follows that Ó Ø Ò Ü µµ is at most ½µ times Þ¾Ò Ü µ Ö Û Þµ Þ¾Ò Ü µ Ü Þµ Û Þµ Þ¾ ÓÐØ Ü µ cost Ò Ü µµ ÚÐÙ ÓÐØ Ü µµ Ö Ü Þµµ Û Þµ Lemma 3.4 For any configuration and point Ü in, cost Ò µµ ½µÓ Ø Ò µµ The claim follows by summing the inequality of Lemma 3.3 over all Ü in. Our main technical lemma is stated below. The proof is given in the next subsection. Lemma 3.5 For any configuration, È Ü¾ ÚÐÙ ÓÐØ Ü µµ Ó Ø µ. 3.3 Proof of Lemma 3.5 In this section we establish our main technical lemma, Lemma 3.5. Lemma 3.6 Let Ü Öµ belong to. Then Ü µ Ö. ܾ ÚÐÙ ÓÐØ Ü µµ Let Þ be a point in such that Ü Þµ Ü µ. If µ then ÓÐØ Ü µ and the result is immediate. Otherwise, let Ý µ denote the predecessor of in and assume inductively that Ý µ. Note that Ü Ýµ and «Ö. Thus Ü µ Ü Þµ Ý Þµ Ü Ýµ µ«ö Ö, where the last step follows from Equation (4). Lemma 3.7 Let Ü Öµ belong to and let Ý µ belong to. If and Ü Ýµ Ö, then the following claims hold: (i) ÖÙ µµ Ö «; (ii) ØÐ µ; (iii) the successor of in, call it, satisfies ÚÐÙ µ ÚÐÙ µµ. 7
9 Let µ Ý ¼ ¼ µ. For part (i), we know that Ý ¼ Þ µ ¼ by Lemma 3.6. Also, we have Ý ¼ Þ µ Ý ¼ ݵ Ý Üµ Ü Þ µ ¼ ¼ ««½ Ö ¼ µ Ö ««Ö Ö Ö «Combining the two inequalities and applying Equation (4), we obtain «¾ «««¼ «½ «½ Ö ¼ µ Ö Multiplying through by «½µ and rearranging, we get Ö «¾ «¾ «««½ ¼ «¼, establishing the claim. For part (ii), note that Ü Ýµ Ö Ö Ö by part (i) and Equation (3). Thus has at least two «children; the claim follows. For part (iii), we use Equations (2) and (3) and part (i) to observe that Ü Ý ¼ µ Ü Ýµ Ý Ý ¼ µ Ö Ö ««½ ¼ Ö «Ö «½ ««½ ½ ««¾ ¼ which is at most Ö by Equation (3). It follows that µ is contained in a child of. Thus ÚÐÙ µ ÚÐÙ µµ. For ease of notation, throughout the remainder of this section we fix a configuration, and let denote. We now describe a pruning procedure that takes as input the sequences, ¼, and produces as output sequences, ¼. The sequence is initialized to, ¼. The (nondeterministic) pruning procedure then performs a number of iterations. In a general iteration, the pruning procedure checks whether there exist two balls Ü Öµ and Ý µ in distinct sequences and, respectively, such that and Ü Ýµ Ö. If not, the pruning procedure terminates. If so, the sequence is redefined as the proper suffix of (the current) beginning at the successor of. Note that part (ii) of Lemma 3.7 ensures that the pruning procedure is well-defined. Furthermore, the procedure is guaranteed to terminate since each iteration reduces the length of some sequence. Lemma 3.8 Let Ü Öµ belong to and let Ý µ belong to. If then Ü Ýµ Ö. Ö Immediate from the definition of the pruning procedure. Lemma 3.9 Each sequence is nonempty. Immediate from part (ii) of Lemma 3.7 and the definition of the pruning procedure. 8
10 Lemma 3.10 Let Ü be a point and assume that ¼ Ò. Then ÚÐÙ ÓÐØ Ü µµ ÚÐÙ ÓÐØ Ü µµ Since, ÖÙ ÓÐØ Ü µµ ÖÙ ÓÐØ Ü µµ. The claim follows. Lemma 3.11 Let Ü be a point and assume that ¼. Then ÚÐÙ µµ ÚÐÙ ÓÐØ Ü µµ If Ü belongs to, then ÖÙ ÓÐØ Ü µµ ¼, so ÚÐÙ ÓÐØ Ü µµ ¼ and there is nothing to prove. Otherwise, ÚÐÙ µµ ÚÐÙ ÓÐØ Ü µµ by the definition of the online median algorithm, and the claim follows by Lemma Lemma 3.12 Let Ü be a point and assume that ¼. Then ÚÐÙ µµ ÚÐÙ ÓÐØ Ü µµ We prove that the claim holds before and after each iteration of the pruning procedure. Initially, and the claim holds by Lemma If the claim holds before an iteration of the pruning procedure, then it holds after the iteration by part (iii) of Lemma 3.7. A ball Ü Öµ is defined to be covered iff Ü µ Ö. A ball is uncovered iff it is not covered. Lemma 3.13 For any uncovered ball Ü Öµ, Ó Ø µ ÚÐÙ µ. È È Note that Ó Ø µ ݾ Ý µ Û Ýµ ݾ Ö Ý Üµµ Û Ýµ ÚÐÙ µ. Let Á denote the set of all indices in such that some ball in is covered. We now construct a matching between the sets and as follows. First, for each in Á, we match with a point Ü in that belongs to the last covered ball in the sequence. (Note that such a point Ü is guaranteed to exist by the definition of Á. Furthermore, Lemma 3.8 ensures that we do not match the same point with more than one index.) Second, for each in Ò Á in turn, we match with an arbitrary unmatched point Ü in. We now construct a function ³ mapping each point Ü in to an uncovered ball. For each Ü in that is matched with an index in Ò Á, we set ³ ܵ to µ. For each Ü in that is matched with an index in Á, we set ³ ܵ to the successor of the last covered ball in unless ØÐ µ is covered, in which case we set ³ ܵ to the ball Ü ¼µ. Lemma 3.14 For any pair of distinct points Ü and Ý in, ³ ܵ ³ ݵ. Immediate from Lemma 3.8 and the fact that the ball Ü ¼µ is contained in ØÐ µ. Lemma 3.15 For any point Ü in, ÚÐÙ ³ ܵµ ÚÐÙ ÓÐØ Ü µµ. If Ü is matched with an index in Ò Á, the claim follows by Lemma If Ü is matched with an index in Á, we consider two cases. If ØÐ µ is covered, then Ü Þ since ØÐ µ has exactly one child. The claim follows since ³ ܵ ÓÐØ Ü µ Ü ¼µ. If ØÐ µ is uncovered, then the predecessor of ³ ܵ in, call it Ý Öµ, exists and contains Ü. It follows that ÚÐÙ ³ ܵµ ÚÐÙ µ, where Ü Ö«µ is the child of centered at Ü. Let Ü µ denote the ball ÓÐØ Ü µ. 9
11 Below we complete the proof of the claim by showing that Ö«, which implies that and hence ÚÐÙ µ ÚÐÙ µ. It remains to prove that Ö«in the final case considered above. We have Ü Þ µ Ü Ýµ Ý Þ µ Ö Ö Ö «½ «Ö «½ which is less than Ö«by Equation (4). The desired inequality follows since Ü Þ µ by the definition of. Lemmas 3.13, 3.14, and 3.15 together yield a proof of Lemma Time Complexity In this section we describe two implementations of the online median algorithm given in Section 3.1. Throughout this section, let denote the quantity ÐÓ. The first implementation runs in Ç Ò µ Ò ÐÓ Òµ Æ time. The second implementation runs in Ç Ò ¾ Òµ time and assumes an Ç Ò ¾ µ-time preprocessing phase in which all distances are rounded down to the nearest integral power of. To analyze the running time of the implementations given below, we make use of the following lemma. Lemma 3.16 Let Ü Öµ be a child of a ball in sequence and let ¼ Ü Ö ¼ µ be a child of a ball ¼ in sequence. If then Ö «½µÖ ¼. First, note that Ü Þ µ Ö Ö«µ «Ö «½µ. By Lemma 3.6, Ö ¼ Ü µ Ü Þ µ. Combining these inequalities and using Equation (4), we obtain Ö «½µ Ö ¼ ««½ «¾ «Ö ¼ ««½ «½µÖ ¼ In the first implementation, for each point Ü in Í, we sort the remaining points by their distance from Ü. The total sorting time is Ç Ò ¾ ÐÓ Òµ. Using these sorted arrays, we can compute the value of any given ball in Ç ÐÓ Òµ time. We also maintain the distance from Ü to the nearest point in. Note that Ü ½ µ can be determined in constant time given Ü µ and Þ. The total time to maintain such distances is thus Ç Ò ¾ µ. It follows that the first step of each iteration can be implemented in Ç Òµ time. The total time for the second step is Ç ÐÓ Òµ times the sum over all balls appearing in some sequence, ¼ Ò, of the number of children of. By Lemma 3.16, it is straightforward to see that the latter sum is Ç Òµ, and thus the total time for the second step is Ç Ò ÐÓ Òµ. The running time of the third step is negligible. Thus the running time of the first implementation is Ç Ò µ Ò ÐÓ Òµ, as claimed above. For the second implementation, note that after the preprocessing phase, there are Ç µ distinct distances. Thus, for each point Ü, Ç Ò µ time is sufficient to construct an Ç µ-sized table that can be used to compute the value of any ball Ü Öµ in Ç ½µ time. It follows that the total time for the second step can be improved to Ç Òµ. The running time of the second implementation is therefore Ç Ò ¾ Òµ, which is linear in the size of the input (in bits). 10
12 4 Concluding Remarks We plan to investigate whether the ideas presented above can be applied to other problems. The work of Indyk [8] gives a technique to achieve sublinear time bounds for various location problems through random sampling of the distance function; we would like to see if application of these techniques to our algorithms yield sublinear time bounds. Korupolu et al. [12] give an algorithm and an efficient distributed implementation for hierarchical cooperative caching in which the distance function is an ultrametric. We would like to see if the hierarchical greedy strategy can be used or extended to solve the problem for an arbitrary metric space. It would also be interesting to see if the hierarchical greedy strategy admits an efficient distributed implementation for this problem. A nice feature of our online median algorithm is its simplicity. Although we deal with a harder problem, the algorithm is actually simpler to specify than existing constant-factor approximation algorithms for the -median problem. It would be interesting to see whether our approach could be simplified to yield a fast -median algorithm achieving a small approximation ratio. References [1] A. Borodin and R. El-Yaniv. Online Computation and Competitive Analysis. Cambridge University Press, Cambridge, UK, [2] M. Charikar and S. Guha. Improved combinatorial algorithms for facility location and -median problems. In Proceedings of the 40th Annual IEEE Symposium on Foundations of Computer Science, October To appear. [3] M. Charikar, S. Guha, É. Tardos, and D. B. Shmoys. A constant-factor approximation algorithm for the -median problem. In Proceedings of the 31st Annual ACM Symposium on Theory of Computing, pages 1 10, May [4] F. A. Chudak. Improved approximation algorithms for uncapacitated facility location. In R. E. Bixby, E. A. Boyd, and R. Z. Ríos-Mercado, editors, Integer Programming and Combinatorial Optimization, volume 1412 of Lecture Notes in Computer Science, pages , Berlin, Springer. [5] W. Domschke and A. Drexl. Location and Layout Planning: An International Bibliography, volume 238 of Lecture Notes in Economics and Mathematical Systems. Springer-Verlag, Berlin, [6] M. X. Goemans and D. P. Williamson. The primal-dual method for approximation algorithms and its application to network design problems. In D. S. Hochbaum, editor, Approximation Algorithms for NP-Hard Problems. PWS Publishing Company, Boston, MA, [7] S. Guha and S. Khuller. Greedy strikes back: Improved facility location algorithms. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, pages , January [8] P. Indyk. Sublinear time algorithms for metric space problems. In Proceedings of the 31st Annual ACM Symposium on Theory of Computing, pages , May [9] S. Irani and Karlin A. R. Online computation. In D. S. Hochbaum, editor, Approximation Algorithms for NP-Hard Problems. PWS Publishing Company, Boston, MA, [10] K. Jain and V. V. Vazirani. Primal-dual approximation algorithms for metric facility location and - median problems. In Proceedings of the 40th Annual IEEE Symposium on Foundations of Computer Science, October To appear. 11
13 [11] M. R. Korupolu, C. G. Plaxton, and R. Rajaraman. Analysis of a local search heuristic for facility location problems. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1 10, January [12] M. R. Korupolu, C. G. Plaxton, and R. Rajaraman. Placement algorithms for hierarchical cooperative caching. In Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms, pages , January [13] A. A. Kuehn and M. J. Hamburger. A heuristic program for locating warehouses. Management Science, 9: , [14] J.-H. Lin and J. S. Vitter. Approximation algorithms for geometric median problems. Information Processing Letters, 44: , [15] J.-H. Lin and J. S. Vitter. -approximations with minimum packing constraint violation. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing, pages , May [16] P. Mirchandani and R. Francis, editors. Discrete Location Theory. Wiley, New York, NY, [17] D. B. Shmoys, É. Tardos, and K. Aardal. Approximation algorithms for facility location problems. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing, pages , May
Optimal Time Bounds for Approximate Clustering
Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract
More informationOnline Facility Location
Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these
More informationA 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem
A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem Mohammad Mahdian Yinyu Ye Ý Jiawei Zhang Þ Abstract This paper is divided into two parts. In the first part of this paper,
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationDesigning Networks Incrementally
Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying
More informationTopic: Local Search: Max-Cut, Facility Location Date: 2/13/2007
CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be
More informationOn the Performance of Greedy Algorithms in Packet Buffering
On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,
More information15-854: Approximations Algorithms Lecturer: Anupam Gupta Topic: Direct Rounding of LP Relaxations Date: 10/31/2005 Scribe: Varun Gupta
15-854: Approximations Algorithms Lecturer: Anupam Gupta Topic: Direct Rounding of LP Relaxations Date: 10/31/2005 Scribe: Varun Gupta 15.1 Introduction In the last lecture we saw how to formulate optimization
More informationSFU CMPT Lecture: Week 9
SFU CMPT-307 2008-2 1 Lecture: Week 9 SFU CMPT-307 2008-2 Lecture: Week 9 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on July 8, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 9 Binary search trees
More informationEfficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms
Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu
More informationLower-Bounded Facility Location
Lower-Bounded Facility Location Zoya Svitkina Abstract We study the lower-bounded facility location problem, which generalizes the classical uncapacitated facility location problem in that it comes with
More informationOn Clusterings Good, Bad and Spectral
On Clusterings Good, Bad and Spectral Ravi Kannan Computer Science, Yale University. kannan@cs.yale.edu Santosh Vempala Ý Mathematics, M.I.T. vempala@math.mit.edu Adrian Vetta Þ Mathematics, M.I.T. avetta@math.mit.edu
More informationCompetitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling
Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu
More informationThe Online Connected Facility Location Problem
The Online Connected Facility Location Problem Mário César San Felice 1, David P. Willamson 2, and Orlando Lee 1 1 Unicamp, Institute of Computing, Campinas SP 13083-852, Brazil felice@ic.unicamp.br, lee@ic.unicamp.br
More informationA General Greedy Approximation Algorithm with Applications
A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been
More informationProvisioning a Virtual Private Network: A Network Design problem for Multicommodity flows
Carnegie Mellon University Research Showcase @ CMU Computer Science Department School of Computer Science 2001 Provisioning a Virtual Private Network: A Network Design problem for Multicommodity flows
More informationJOB SHOP SCHEDULING WITH UNIT LENGTH TASKS
JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS MEIKE AKVELD AND RAPHAEL BERNHARD Abstract. In this paper, we consider a class of scheduling problems that are among the fundamental optimization problems in
More informationCorrelation Clustering
Correlation Clustering Nikhil Bansal Avrim Blum Shuchi Chawla Abstract We consider the following clustering problem: we have a complete graph on Ò vertices (items), where each edge Ù Úµ is labeled either
More informationData Caching under Number Constraint
1 Data Caching under Number Constraint Himanshu Gupta and Bin Tang Abstract Caching can significantly improve the efficiency of information access in networks by reducing the access latency and bandwidth
More informationApproximation Algorithms for NP-Hard Clustering Problems
Approximation Algorithms for NP-Hard Clustering Problems Ramgopal R. Mettu Dissertation Advisor: Greg Plaxton Department of Computer Science University of Texas at Austin What Is Clustering? The goal of
More informationFrom Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols
From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms
More informationApproximation Algorithms
Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours
More informationApproximation Algorithms
Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours
More informationNon-Metric Multicommodity and Multilevel Facility Location
Non-Metric Multicommodity and Multilevel Facility Location Rudolf Fleischer, Jian Li, Shijun Tian, and Hong Zhu Department of Computer Science and Engineering Shanghai Key Laboratory of Intelligent Information
More informationA Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses
A Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses Julián Mestre Department of Computer Science University of Maryland, College Park, MD 20742 jmestre@cs.umd.edu Abstract
More informationPrimal-Dual Approximation Algorithms for. Metric Facility Location and k-median Problems. Kamal Jain. Vijay V. Vazirani. Abstract
Primal-Dual Approximation Algorithms for Metric Facility Location and k-median Problems Kamal Jain Vijay V. Vazirani Abstract We present approximation algorithms for the metric uncapacitated facility location
More informationA Fast Algorithm for Optimal Alignment between Similar Ordered Trees
Fundamenta Informaticae 56 (2003) 105 120 105 IOS Press A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Jesper Jansson Department of Computer Science Lund University, Box 118 SE-221
More informationSimultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk
Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk Ashish Goel Ý Stanford University Deborah Estrin Þ University of California, Los Angeles Abstract We consider
More informationOptimal Static Range Reporting in One Dimension
of Optimal Static Range Reporting in One Dimension Stephen Alstrup Gerth Stølting Brodal Theis Rauhe ITU Technical Report Series 2000-3 ISSN 1600 6100 November 2000 Copyright c 2000, Stephen Alstrup Gerth
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationComputing optimal linear layouts of trees in linear time
Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm
More informationKey Grids: A Protocol Family for Assigning Symmetric Keys
Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationFuzzy Hamming Distance in a Content-Based Image Retrieval System
Fuzzy Hamming Distance in a Content-Based Image Retrieval System Mircea Ionescu Department of ECECS, University of Cincinnati, Cincinnati, OH 51-3, USA ionescmm@ececs.uc.edu Anca Ralescu Department of
More informationPrimal-Dual Approximation Algorithms for. Metric Facility Location and k-median Problems. Kamal Jain. Vijay V. Vazirani. Abstract
Primal-Dual Approximation Algorithms for Metric Facility Location and k-median Problems Kamal Jain Vijay V. Vazirani Abstract We present approximation algorithms for the metric uncapacitated facility location
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationAn Improved Approximation Algorithm For Vertex Cover with Hard Capacities
An Improved Approximation Algorithm For Vertex Cover with Hard Capacities (Extended Abstract) Rajiv Gandhi 1, Eran Halperin 2, Samir Khuller 3, Guy Kortsarz 4, and Aravind Srinivasan 5 1 Department of
More informationA more efficient algorithm for perfect sorting by reversals
A more efficient algorithm for perfect sorting by reversals Sèverine Bérard 1,2, Cedric Chauve 3,4, and Christophe Paul 5 1 Département de Mathématiques et d Informatique Appliquée, INRA, Toulouse, France.
More informationAdvanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret
Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely
More informationResponse Time Analysis of Asynchronous Real-Time Systems
Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationLecture 7: Asymmetric K-Center
Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationLecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.
CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear
More informationCS264: Homework #4. Due by midnight on Wednesday, October 22, 2014
CS264: Homework #4 Due by midnight on Wednesday, October 22, 2014 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Turn in your solutions
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationAlgorithms for Euclidean TSP
This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation
More informationTime-space tradeoff lower bounds for randomized computation of decision problems
Time-space tradeoff lower bounds for randomized computation of decision problems Paul Beame Ý Computer Science and Engineering University of Washington Seattle, WA 98195-2350 beame@cs.washington.edu Xiaodong
More informationSFU CMPT Lecture: Week 8
SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing
More informationAn experimental evaluation of incremental and hierarchical k-median algorithms
An experimental evaluation of incremental and hierarchical k-median algorithms Chandrashekhar Nagarajan David P. Williamson January 2, 20 Abstract In this paper, we consider different incremental and hierarchical
More informationNetwork Design Foundations Fall 2011 Lecture 10
Network Design Foundations Fall 2011 Lecture 10 Instructor: Mohammad T. Hajiaghayi Scribe: Catalin-Stefan Tiseanu November 2, 2011 1 Overview We study constant factor approximation algorithms for CONNECTED
More informationTime-Space Tradeoffs, Multiparty Communication Complexity, and Nearest-Neighbor Problems
Time-Space Tradeoffs, Multiparty Communication Complexity, and Nearest-Neighbor Problems Paul Beame Computer Science and Engineering University of Washington Seattle, WA 98195-2350 beame@cs.washington.edu
More informationApproximability Results for the p-center Problem
Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center
More informationDepartment of Computer Science
Yale University Department of Computer Science Pass-Efficient Algorithms for Facility Location Kevin L. Chang Department of Computer Science Yale University kchang@cs.yale.edu YALEU/DCS/TR-1337 Supported
More informationOnline Scheduling for Sorting Buffers
Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102
More informationCollege of Computer & Information Science Fall 2007 Northeastern University 14 September 2007
College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 CS G399: Algorithmic Power Tools I Scribe: Eric Robinson Lecture Outline: Linear Programming: Vertex Definitions
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationsolved optimally in a tree metric, Bartal gave a randomized O(log n log log n)-approximation algorithm for the k-median problem. This algorithm was su
A constant-factor approximation algorithm for the k-median problem (Extended Abstract) Moses Charikar Λ Sudipto Guha y Éva Tardos z David B. Shmoys x Abstract We present the first constant-factor approximation
More informationA SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES)
Chapter 1 A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Piotr Berman Department of Computer Science & Engineering Pennsylvania
More informationA General Class of Heuristics for Minimum Weight Perfect Matching and Fast Special Cases with Doubly and Triply Logarithmic Errors 1
Algorithmica (1997) 18: 544 559 Algorithmica 1997 Springer-Verlag New York Inc. A General Class of Heuristics for Minimum Weight Perfect Matching and Fast Special Cases with Doubly and Triply Logarithmic
More informationOnline algorithms for clustering problems
University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Summary of the Ph.D. thesis by Gabriella Divéki Supervisor Dr. Csanád Imreh
More informationDual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems
Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Benjamin Grimmer bdg79@cornell.edu arxiv:1508.05567v2 [cs.ds] 20 Jul 2017 Abstract We consider a variety of NP-Complete network
More informationStanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011
Stanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011 Lecture 1 In which we describe what this course is about and give two simple examples of approximation algorithms 1 Overview
More informationParameterized graph separation problems
Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.
More informationIn this lecture, we ll look at applications of duality to three problems:
Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,
More informationOn a Cardinality-Constrained Transportation Problem With Market Choice
On a Cardinality-Constrained Transportation Problem With Market Choice Matthias Walter a, Pelin Damcı-Kurt b, Santanu S. Dey c,, Simge Küçükyavuz b a Institut für Mathematische Optimierung, Otto-von-Guericke-Universität
More informationCycle cover with short cycles
Cycle cover with short cycles Nicole Immorlica Mohammad Mahdian Vahab S. Mirrokni Abstract Cycle covering is a well-studied problem in computer science. In this paper, we develop approximation algorithms
More information6. Lecture notes on matroid intersection
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm
More informationIntroduction to Approximation Algorithms
Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background
More informationLearning to Align Sequences: A Maximum-Margin Approach
Learning to Align Sequences: A Maximum-Margin Approach Thorsten Joachims Department of Computer Science Cornell University Ithaca, NY 14853 tj@cs.cornell.edu August 28, 2003 Abstract We propose a discriminative
More informationApproximating Minimum Spanning Sets in Hypergraphs and Polymatroids
Approximating Minimum Spanning Sets in Hypergraphs and Polymatroids Gregor Baudis, Clemens Gröpl, Stefan Hougardy, Till Nierhoff, and Hans Jürgen Prömel Institut für Informatik, Humboldt-Universität zu
More informationExternal-Memory Breadth-First Search with Sublinear I/O
External-Memory Breadth-First Search with Sublinear I/O Kurt Mehlhorn and Ulrich Meyer Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85, 66123 Saarbrücken, Germany. Abstract. Breadth-first search
More informationApproximation Via Cost-Sharing: A Simple Approximation Algorithm for the Multicommodity Rent-or-Buy Problem
Approximation Via Cost-Sharing: A Simple Approximation Algorithm for the Multicommodity Rent-or-Buy Problem Anupam Gupta Amit Kumar Ý Martin Pál Þ Tim Roughgarden Þ Abstract We study the multicommodity
More informationNotes on Binary Dumbbell Trees
Notes on Binary Dumbbell Trees Michiel Smid March 23, 2012 Abstract Dumbbell trees were introduced in [1]. A detailed description of non-binary dumbbell trees appears in Chapter 11 of [3]. These notes
More informationSteiner Trees and Forests
Massachusetts Institute of Technology Lecturer: Adriana Lopez 18.434: Seminar in Theoretical Computer Science March 7, 2006 Steiner Trees and Forests 1 Steiner Tree Problem Given an undirected graph G
More informationDirected Single Source Shortest Paths in Linear Average Case Time
Directed Single Source Shortest Paths in inear Average Case Time Ulrich Meyer MPI I 2001 1-002 May 2001 Author s Address ÍÐÖ ÅÝÖ ÅܹÈÐÒ¹ÁÒ ØØÙØ ĐÙÖ ÁÒÓÖÑØ ËØÙÐ ØÞÒÙ Û ½¾ ËÖÖĐÙÒ umeyer@mpi-sb.mpg.de www.uli-meyer.de
More informationConstructive floorplanning with a yield objective
Constructive floorplanning with a yield objective Rajnish Prasad and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 13 E-mail: rprasad,koren@ecs.umass.edu
More informationInteger Programming ISE 418. Lecture 7. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint
More information11. APPROXIMATION ALGORITHMS
Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem
More information1 The range query problem
CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition
More informationCombinatorial Algorithms for Minimizing the Weighted Sum of Completion Times on a Single Machine
Combinatorial Algorithms for Minimizing the Weighted Sum of Completion Times on a Single Machine James M. Davis 1 Department of Operations Research, Cornell University, Ithaca, NY 14850. Rajiv Gandhi Department
More information1 Introduction and Results
On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationExponentiated Gradient Algorithms for Large-margin Structured Classification
Exponentiated Gradient Algorithms for Large-margin Structured Classification Peter L. Bartlett U.C.Berkeley bartlett@stat.berkeley.edu Ben Taskar Stanford University btaskar@cs.stanford.edu Michael Collins
More informationA Survey of Correlation Clustering
COMS E6998: Advanced Topics in Computational Learning Theory. Author: Hila Becker Date: May 5, 2005 A Survey of Correlation Clustering Abstract The problem of partitioning a set of data points into clusters
More informationPrimal-Dual Algorithms for Connected Facility Location Problems
Primal-Dual Algorithms for Connected Facility Location Problems Lecture Notes for the course Approximation algorithms by Martin Korff (korff@diku.dk) Matias Sevel Rasmussen (sevel@math.ku.dk) Tor Justesen
More informationA 2-APPROXIMATION ALGORITHM FOR THE MINIMUM KNAPSACK PROBLEM WITH A FORCING GRAPH. Yotaro Takazawa Shinji Mizuno Tokyo Institute of Technology
Journal of the Operations Research Society of Japan Vol. 60, No. 1, January 2017, pp. 15 23 c The Operations Research Society of Japan A 2-APPROXIMATION ALGORITHM FOR THE MINIMUM KNAPSACK PROBLEM WITH
More informationApproximation by NURBS curves with free knots
Approximation by NURBS curves with free knots M Randrianarivony G Brunnett Technical University of Chemnitz, Faculty of Computer Science Computer Graphics and Visualization Straße der Nationen 6, 97 Chemnitz,
More informationAn Efficient Approximation for the Generalized Assignment Problem
An Efficient Approximation for the Generalized Assignment Problem Reuven Cohen Liran Katzir Danny Raz Department of Computer Science Technion Haifa 32000, Israel Abstract We present a simple family of
More information11.1 Facility Location
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local
More informationLocal Search Approximation Algorithms for the Complement of the Min-k-Cut Problems
Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems Wenxing Zhu, Chuanyin Guo Center for Discrete Mathematics and Theoretical Computer Science, Fuzhou University, Fuzhou
More informationVertex-Colouring Edge-Weightings
Vertex-Colouring Edge-Weightings L. Addario-Berry a, K. Dalal a, C. McDiarmid b, B. A. Reed a and A. Thomason c a School of Computer Science, McGill University, University St. Montreal, QC, H3A A7, Canada
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems
More informationApproximation Algorithms: The Primal-Dual Method. My T. Thai
Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the
More informationImproved algorithms for constructing fault-tolerant spanners
Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.
More informationExpander-based Constructions of Efficiently Decodable Codes
Expander-based Constructions of Efficiently Decodable Codes (Extended Abstract) Venkatesan Guruswami Piotr Indyk Abstract We present several novel constructions of codes which share the common thread of
More informationScribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu
CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.
More informationAnalysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two
Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Nabiha Asghar Department of Combinatorics & Optimization University of Waterloo, Ontario, Canada
More informationAnalysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks
Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall
More information