The Online Median Problem

Size: px
Start display at page:

Download "The Online Median Problem"

Transcription

1 The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas the -median problem involves optimizing the simultaneous placement of facilities, the online median problem imposes the following additional constraints: the facilities are placed one at a time; a facility, once placed, cannot be moved; the total number of facilities to be placed,, is not known in advance. The objective of an online median algorithm is to minimize competitive ratio, that is, the worst-case ratio of the cost of an online placement to that of an optimal offline placement. Our main result is a linear-time constant-competitive algorithm for the online median problem. In addition, we present a related, though substantially simpler, linear-time constant-factor approximation algorithm for the (metric uncapacitated) facility location problem. The latter algorithm is similar in spirit to the recent primal-dual-based facility location algorithm of Jain and Vazirani, but our approach is more elementary and yields an improved running time. Department of Computer Science, University of Texas at Austin, Austin, TX This research was supported by NSF Grant CCR ramgopal, plaxton@cs.utexas.edu.

2 1 Introduction Recently the first constant-factor approximation algorithm was discovered for the -median problem by Charikar et al. [3]; in this paper, we ask whether a constant competitive ratio can be achieved for a natural online extension of the -median problem. Let Í be a nonempty set of Ò points and let be a metric distance function on Í. The -median problem is concerned with marking points such that the sum over all points Ü of the weight of Ü times the distance from Ü to the closest marked point is minimized. For the online median problem, we wish to find an ordering of the Ò points such that for all, ¼ Ò, the first points provide a good solution (e.g. constant factor approximation) to the -median problem. An obvious approach to the online median problem is to iteratively choose the point that minimizes the objective function. Greedy strategies of this kind are commonly applied in the design of online algorithms [1, 9]. It turns out, however, that for the online median problem, the simple strategy suggested above has an unbounded competitive ratio. We show that a modification of this strategy that we call hierarchically greedy can be used to obtain a constant-competitive linear-time algorithm for the online median problem. We develop this strategy by first considering a simple greedy algorithm for facility location. 1.1 Problem Definitions Without loss of generality, throughout this paper we consider a fixed set of points Í with an associated distance function Í Í ÁÊ and nonnegative functions Û Í ÁÊ. We are primarily interested in the case where the function is a metric, that is, where is nonnegative, symmetric, satisfies the triangle inequality, and Ü Ýµ ¼ iff Ü Ý. For the online median problem, it will prove to be useful to consider a slightly more general class of distance functions in which the triangle inequality is relaxed to the following -approximate È triangle inequality, where ½: For any sequence of points Ü ¼ Ü in Í, Ü ¼ Ü µ ¼ Ü Ü ½ µ. We refer to such a distance function as a -approximate metric. We let Ò Í, and define a subset of Í to be a configuration iff it is nonempty. For any point Ü and configuration, we define Ü µ as ÑÒ Ý¾ Ü Ýµ. We consider three computational problems: -median, online median, and facility location. For the -median and online median problems, the cost of a configuration, denoted Ó Ø µ, is defined to be È Ü¾Í Ü µ Û Üµ. The input to the -median problem is Í µ, Û, and an integer, ¼ Ò. The output is a minimum-cost configuration of size. The input to the online median problem is Í µ and Û. The output is a total order on Í. We define the competitive ratio of such an ordering as the maximum over all, ¼ Ò, of the ratio of the cost of the configuration given by the first points in the ordering to that of an optimal -median configuration. We define the competitive ratio of an online median algorithm as the supremum, over all possible choices of the input instance Í µ and Û, of the competitive ratio of the ordering produced by the algorithm. For the facility location problem, the cost of a configuration, denoted Ó Ø µ, is defined as the sum of È Ü¾ ܵ and È Ü¾Í Ü µ Û Üµ. The input to the facility location problem is Í µ,, and Û. The output is a minimum-cost configuration. 1.2 Previous Work There has been much prior work on the facility location and -median problems; here we focus on the work that is most relevant to our results. The first constant-factor approximation algorithm for facility location is due to Shmoys et al. [17] and is based on rounding the (fractional) solution to a linear program. Chudak [4] gives an LP-based ½ ¾µ-approximation algorithm for facility location. This was the best constant factor known until the recent work of Charikar and Guha [2], which establishes a slightly lower approximation ratio of ½¾. The first constant-factor approximation for the -median problem was recently given by 1

3 Charikar et al. [3] and is also LP-based. That work follows a sequence of bicriteria results utilizing LPbased techniques [14, 15]. Jain and Vazirani [10] give the first nearly linear-time combinatorial algorithms for the facility location and -median problems, achieving approximation ratios of and, respectively. While the latter algorithms are combinatorial, the primal-dual approach used in their analysis is based on linear programming theory. (See [6] for an excellent introduction to the primal-dual method.) Strategies based on local search and greedy techniques for facility location and the -median problem have been previously studied. The work of Korupolu et al. [11] shows that a simple local search heuristic proposed Kuehn and Hamburger [13] yields both a constant-factor approximation for the facility location problem and a bicriteria approximation for the -median problem [11]. Guha and Khuller [7] showed that greedy improvement can be used as a postprocessing step to improve the approximation guarantee of certain facility location algorithms. Guha and Khuller also provide the best lower bound known of ½ on the approximation ratio for this problem. More recently, Charikar and Guha [2] achieved the best approximation ratio known for facility location by combining a local search heuristic with the best LP-based algorithm known. Charikar and Guha also give a -approximation for the -median problem by building on the techniques of Jain and Vazirani [10]. To the best of our knowledge, the online median problem has not been previously studied. Note that any constant-competitive algorithm for the online median problem is also a constant-factor approximation algorithm for the -median problem, but the converse does not hold. In particular, constant-factor approximation algorithms for the -median problem known prior to this work [2, 3, 10] seem to rely heavily on the knowledge of. As such it is unclear whether any of these algorithms can be easily modified to obtain a constant-competitive online median algorithm. 1.3 Contributions Algorithms for problems in discrete location theory arise in many practical applications; see [5, 16], for example, for numerous pointers to the literature. Given that many of these problems are NP-hard, it is desirable to develop fast approximation algorithms. As mentioned above, it is not uncommon for approximation algorithms to be based on a greedy approach. In this paper, we show that greedy strategies yield a fast constant-factor approximation algorithm for the facility location problem and a fast constant-competitive algorithm for the online median problem. We give a linear-time algorithm for the facility location problem that achieves an approximation ratio of. The main idea of the algorithm is to compute and use the value of balls about every point in the metric space. In retrospect, the idea of value is implicit in the work of Jain and Vazirani [10]. We make this idea explicit and use the values of balls to make greedy choices. Additionally, our algorithm is faster than the Jain-Vazirani algorithm by a logarithmic factor. While a simple greedy algorithm yields a constant-factor approximation bound for the facility location problem, it appears that a more sophisticated approach is needed to obtain a constant-factor approximation guarantee for the -median problem, let alone a constant-competitiveness result for the online median problem. For example, in Section 3 we show that perhaps the most natural greedy approach to the -median (resp., online median) problem leads to an unbounded approximation (resp., competitive) ratio. Our main result is a linear-time constant competitive algorithm for the online median problem. We achieve this result using a hierarchically greedy approach. The basic idea behind this approach is as follows: Rather than selecting a point based on a single greedy criterion, we greedily choose a region (the set of points lying within some ball) and then recursively select a point within that region. Thus, the choice of point is influenced by a sequence of greedy criteria addressing successively finer levels of granularity. 2

4 1.4 Outline The rest of this paper is organized as follows. In Section 2, we present our facility location algorithm and prove that it achieves a constant approximation ratio. In Section 3, we present our online median algorithm and prove that it is constant-competitive. Section 4 offers some concluding remarks. 2 Facility Location The following definitions are used throughout the present section as well as Section 3. For any nonnegative integer, let denote the set ¼. A ball is a pair Ü Öµ, where the center Ü of, denoted ÒØÖ µ, belongs to Í, and the radius Ö of, denoted ÖÙ µ, is a nonnegative real. Given a ball Ü Öµ, we let ÈÓÒØ µ denote the set Ý ¾ Í Ü Ýµ Ö. However, for the sake of brevity, we tend to write instead of ÈÓÒØ µ. For example, we write Ü ¾ and instead of Ü ¾ ÈÓÒØ µ and ÈÓÒØ µ ÈÓÒØ µ, respectively. È The value of a ball Ü Öµ, denoted ÚÐÙ µ, is ݾ Ö Ü Ýµµ Û Ýµ. For any ball Ü Öµ and any nonnegative real, we define as the ball Ü Öµ. 2.1 Algorithm In the first step of the following algorithm, we assume for the sake of convenience that there is at least one point Ü such that Û Üµ ¼. (The problem is trivial otherwise.) The output of the algorithm is the configuration Ò, which we also refer to as. Remark: The indexing of the sets has been introduced solely to facilitate the analysis. For each point Ü, determine an associated ball Ü Ü Ö Ü µ such that ÚÐÙ Ü µ ܵ. Determine a bijection ³ Ò Í such that Ö ³ ½µ Ö ³ µ, ¼ Ò. Let Ü Ö µ denote the ball ³ µ, ¼ Ò. Let ¼. For ¼ to Ò ½: If ¾ then let ½ Ü ; otherwise, let ½. We now sketch a simple linear-time implementation of the above algorithm. For each point Ü, the associated radius Ö Ü can be computed in Ç Òµ time. (This is essentially a weighted selection problem.) Thus the first step requires Ç Ò ¾ µ time. The second step involves sorting Ò values and can be accomplished in Ç Ò ÐÓ Òµ time. The running time for the third step is negligible. Each iteration of the fourth step can be easily implemented in Ç Òµ time, for a total of Ç Ò ¾ µ time. 2.2 Approximation Ratio In this section we establish the following theorem. Theorem 1 For any configuration, Ó Ø µ Ó Ø µ. Immediate from Lemmas 2.3 and 2.7 below. 3

5 Lemma 2.1 For any point Ü, there exists a point Ü in such that and Ü Ü µ ¾Ö. If there is no such point Ü with, then ¾ is empty, and so Ü belongs to. Lemma 2.2 Let Ü and Ü be distinct points in. Then Ü Ü µ ¾ ÑÜÖ Ö. Assume without loss of generality that. Thus Ö Ö. Furthermore, Ü Ü µ ¾Ö since Ü belongs to and ¾ is empty. For any point Ü and any configuration, let charge Ü µ Ü µ Ü ¾ Ñܼ Ö Ü Üµ È Lemma 2.3 For any configuration, Ü¾Í Ö Ü µ Û Üµ Ó Ø µ. Note that Ü¾Í Ö Ü µ Û Üµ Ü ¾ Ü ¾ which is equal to Ó Ø µ since ÚÐÙ µ Ü µ. ܾ Ö Ü Üµµ Û Üµ ÚÐÙ µ Ü¾Í Ü¾Í Ü µ Û Üµ Ü µ Û Üµ Lemma 2.4 Let Ü be a point, let be a configuration, and let Ü belong to. If Ü Ü µ Ü µ then Ö Ü µ ÑÜÖ Ü Ü µ. If Ü does not belong to, then Ö Ü µ Ü Ü µ Ö. Otherwise, Ö Ü µ Ö Ü Ü µµ Ü Ü µ Ö Ü Ü µ. Lemma 2.5 Let Ü be a point and let Ü belong to. If Ü belongs to, then Ö Ü µ Ö. By Lemma 2.2, there is no point Ü in such that and Ü belongs to. The claim now follows from the definition of Ö Ü µ, since Ü µ Ü Ü µ. Lemma 2.6 Let Ü be a point and let Ü belong to. If Ü does not belong to, then Ö Ü µ Ü Ü µ. The claim is immediate unless there is a point Ü in such that Ü belongs to. If such a point Ü exists, then Lemmas 2.2 and 2.5 imply Ü Ü µ ¾ ÑÜÖ Ö and Ö Ü µ Ö, respectively. The claim now follows since Ü Ü µ Ü Ü µ Ü Ü µ ¾Ö Ö Ö. Lemma 2.7 For any point Ü and configuration, Ö Ü µ Ö Ü µ. Let Ü be some point in such that Ü Ü µ Ü µ. By Lemma 2.1, there exists a point Ü in such that and Ü Ü µ ¾Ö. If Ü belongs to, then Ö Ü µ Ö by Lemma 2.5. The claim follows since implies Ö Ö and Lemma 2.4 implies Ö Ü µ Ö. If Ü does not belong to, then Ö Ü µ Ü Ü µ by Lemma 2.6. Thus Ö Ü µ Ü Ü µ Ü Ü µ Ü Ü µ ¾Ö. The claim now follows by Lemma 2.4, since the ratio of Ü Ü µ ¾Ö to ÑÜÖ Ü Ü µ is at most 3. 4

6 3 Online Median Placement In the previous section, we found that a simple greedy algorithm yields interesting results for the facility location problem. Ideally, we would like to formulate a similar algorithm for the online median problem. The most obvious greedy algorithm is to select as the next point in the ordering the one that minimizes the objective function. Unfortunately, this algorithm gives an unbounded competitive (resp., approximation) ratio for the online median (resp., -median) problem. To see this, consider an instance consisting of Ò points, one red and the rest blue, such that the following conditions are satisfied: the red point has weight ¼; each blue point has weight ½; the distance from the red point to any blue point is ½; the distance between any pair of distinct blue points is ¾. The aforementioned greedy algorithm chooses the red point first in the ordering, since that gives a cost of Ò ½ while choosing any other point gives a cost of ¾Ò. But then the ratio for a configuration of size Ò ½ is unbounded since the greedy cost is ½ and the optimal cost is ¼. (This example also shows that no online median algorithm can achieve a competitive ratio below ¾ ¾.) Ò ½ We show that a more careful choice of the point, which we call hierarchically greedy, works well. Let (resp., Æ) denote the largest (resp., smallest) distance between two distinct points in the metric space. We define a certain ball about each point, and select a ball of maximum value. But rather than simply choosing the center of ball as the next point in the ordering, we apply the approach recursively to select a point within. At each successive level of recursion, we consider geometrically smaller balls about the remaining candidate points. Within Ç ÐÓ µ levels of recursion, we arrive at a ball containing only a single Æ point, and we return this point as the next one in the ordering. Note that whereas the greedy algorithm discussed in the previous paragraph makes a single greedy choice to select a point, the hierarchically greedy algorithm makes Ç ÐÓ µ greedy choices per point. Æ Throughout this section, let, «,, and denote real numbers satisfying the following inequalities. ½ (1) «½ (2) «½µ «½ «¾ «««½ (3) (4) The online median algorithm of Section 3.1 below makes use of the following additional definitions. A child of a ball Ü Öµ is any ball Ý Ö µ where Ü Ýµ Ö. For any point Ü, let ÓÐØ Ü µ denote «the ball Ü ÑÜ Ý¾Í Ü Ýµµ. For any point Ü and configuration, let ÓÐØ Ü µ denote the ball Ü Ü µ µ. For any nonempty sequence ±, we let ±µ (resp., ØÐ ±µ) denote the first (resp., last) element of ±. 3.1 Algorithm Let ¼. For ¼ to Ò ½, execute the following steps: Let denote the singleton sequence where is a maximum value ball in ÓÐØ Ü µ Ü ¾ Í Ò. While the ball ØÐ µ has more than one child, append a maximum value child of ØÐ µ to. Let ½ ÒØÖ ØÐ µµ. 5

7 The output of the online median algorithm is a collection of point sets such that, ¼ Ò, and ½, ¼ Ò. Note that it is sufficient for an implementation of the algorithm to maintain the ball ØÐ µ, as opposed to the entire sequence. The sequence has been introduced in order to facilitate the analysis. We discuss two implementations of the online median algorithm in Section 3.4. The first implementation has a slightly superlinear running time. The second implementation runs in linear time, but assumes a (linear) preprocessing phase in which all distances are rounded down to the nearest integral power of. (Note that for the preprocessing phase to be well-defined, we require ½.) If the input distance function is a metric, it is straightforward to see that such rounding produces a -approximate metric. 3.2 Competitive Ratio Before proceeding with the analysis, we introduce a number of additional definitions. Let Þ denote the unique point in ½ Ò, ¼ Ò. For any configuration and set of points, let Ó Ø µ È Ý¾ Ý µ Û Ýµ. For any configuration, we partition Í into sets ÐÐ Ü µ Ü ¾ as follows: For each point Ý in Í, we choose a point Ü in such that Ý µ Ü Ýµ and add Ý to ÐÐ Ü µ. For any configuration, point Ü in, and set of points, we define Ò Ü µ as ÐÐ Ü µ ÓÐØ Ü µ and ÓÙØ Ü µ as ÐÐ Ü µ Ò Ò Ü µ. For any configuration and set of points, we define Ò µ as ܾ Ò Ü µ and ÓÙØ µ as Í Ò Ò µ. In this section we present our main result, Theorem 2 below. In order to minimize the competitive ratio of ¾ ½µ implied by the theorem, we set to ½, set «to approximately and set and to the right-hand sides of Equations (3) and (4), respectively. We thereby establish a competitive ratio of slightly below ¼ for the online median problem. In Section 3.4 we describe a linear-time implementation of the online median algorithm for which the parameter is required to be strictly greater than ½. The degradation in the competitive ratio that results by setting greater than ½ can be made arbitrarily small by choosing sufficiently close to ½. Theorem 2 For any configuration, Ó Ø µ ¾ ½µ Ó Ø µ. Let Ò µ and let ¼ ÓÙØ µ Í Ò. Note that Ó Ø µ Ó Ø µ Ó Ø ¼ µ and Ó Ø µ Ó Ø µ Ó Ø ¼ µ. Thus the theorem follows immediately from Lemmas 3.2, 3.4, and 3.5 below. Lemma 3.1 For any configuration, point Ü in, and point Ý in ÓÙØ Ü µ, Ý µ ½µ Ý µ. Let ÓÐØ Ü µ Ü Öµ. Note that Ü Ýµ Ö. Also, by the definition of ÓÐØ Ü µ, there is a point Þ in such that Ü Þµ Ö. Hence Ý Þµ Ü Ýµ Ü Þµ Ü Ýµ Ö Ü Ýµ Ü Ýµ ½µ Ü Ýµ ½µ Ý µ. The claim follows since Ý Þµ Ý µ. 6

8 Lemma 3.2 For any configuration, cost ÓÙØ µµ ½µ Ó Ø ÓÙØ µµ Summing the inequality of Lemma 3.1 over all Ý in ÓÙØ Ü µ, we obtain cost ÓÙØ Ü µµ ½µ Ó Ø ÓÙØ Ü µµ The claim now follows by summing the above inequality over all Ü in. Lemma 3.3 For any configuration and point Ü in, cost Ò Ü µµ ½µÓ Ø Ò Ü µµ ÚÐÙ ÓÐØ Ü µµ Assume that ÓÐØ Ü µ Ü Öµ. Note that Ü Ýµ Ö for some Ý in. Thus, for any Þ in ÓÐØ Ü µ, Ý Þµ Ý Üµ Ü Þµ ½µÖ. It follows that Ó Ø Ò Ü µµ is at most ½µ times Þ¾Ò Ü µ Ö Û Þµ Þ¾Ò Ü µ Ü Þµ Û Þµ Þ¾ ÓÐØ Ü µ cost Ò Ü µµ ÚÐÙ ÓÐØ Ü µµ Ö Ü Þµµ Û Þµ Lemma 3.4 For any configuration and point Ü in, cost Ò µµ ½µÓ Ø Ò µµ The claim follows by summing the inequality of Lemma 3.3 over all Ü in. Our main technical lemma is stated below. The proof is given in the next subsection. Lemma 3.5 For any configuration, È Ü¾ ÚÐÙ ÓÐØ Ü µµ Ó Ø µ. 3.3 Proof of Lemma 3.5 In this section we establish our main technical lemma, Lemma 3.5. Lemma 3.6 Let Ü Öµ belong to. Then Ü µ Ö. ܾ ÚÐÙ ÓÐØ Ü µµ Let Þ be a point in such that Ü Þµ Ü µ. If µ then ÓÐØ Ü µ and the result is immediate. Otherwise, let Ý µ denote the predecessor of in and assume inductively that Ý µ. Note that Ü Ýµ and «Ö. Thus Ü µ Ü Þµ Ý Þµ Ü Ýµ µ«ö Ö, where the last step follows from Equation (4). Lemma 3.7 Let Ü Öµ belong to and let Ý µ belong to. If and Ü Ýµ Ö, then the following claims hold: (i) ÖÙ µµ Ö «; (ii) ØÐ µ; (iii) the successor of in, call it, satisfies ÚÐÙ µ ÚÐÙ µµ. 7

9 Let µ Ý ¼ ¼ µ. For part (i), we know that Ý ¼ Þ µ ¼ by Lemma 3.6. Also, we have Ý ¼ Þ µ Ý ¼ ݵ Ý Üµ Ü Þ µ ¼ ¼ ««½ Ö ¼ µ Ö ««Ö Ö Ö «Combining the two inequalities and applying Equation (4), we obtain «¾ «««¼ «½ «½ Ö ¼ µ Ö Multiplying through by «½µ and rearranging, we get Ö «¾ «¾ «««½ ¼ «¼, establishing the claim. For part (ii), note that Ü Ýµ Ö Ö Ö by part (i) and Equation (3). Thus has at least two «children; the claim follows. For part (iii), we use Equations (2) and (3) and part (i) to observe that Ü Ý ¼ µ Ü Ýµ Ý Ý ¼ µ Ö Ö ««½ ¼ Ö «Ö «½ ««½ ½ ««¾ ¼ which is at most Ö by Equation (3). It follows that µ is contained in a child of. Thus ÚÐÙ µ ÚÐÙ µµ. For ease of notation, throughout the remainder of this section we fix a configuration, and let denote. We now describe a pruning procedure that takes as input the sequences, ¼, and produces as output sequences, ¼. The sequence is initialized to, ¼. The (nondeterministic) pruning procedure then performs a number of iterations. In a general iteration, the pruning procedure checks whether there exist two balls Ü Öµ and Ý µ in distinct sequences and, respectively, such that and Ü Ýµ Ö. If not, the pruning procedure terminates. If so, the sequence is redefined as the proper suffix of (the current) beginning at the successor of. Note that part (ii) of Lemma 3.7 ensures that the pruning procedure is well-defined. Furthermore, the procedure is guaranteed to terminate since each iteration reduces the length of some sequence. Lemma 3.8 Let Ü Öµ belong to and let Ý µ belong to. If then Ü Ýµ Ö. Ö Immediate from the definition of the pruning procedure. Lemma 3.9 Each sequence is nonempty. Immediate from part (ii) of Lemma 3.7 and the definition of the pruning procedure. 8

10 Lemma 3.10 Let Ü be a point and assume that ¼ Ò. Then ÚÐÙ ÓÐØ Ü µµ ÚÐÙ ÓÐØ Ü µµ Since, ÖÙ ÓÐØ Ü µµ ÖÙ ÓÐØ Ü µµ. The claim follows. Lemma 3.11 Let Ü be a point and assume that ¼. Then ÚÐÙ µµ ÚÐÙ ÓÐØ Ü µµ If Ü belongs to, then ÖÙ ÓÐØ Ü µµ ¼, so ÚÐÙ ÓÐØ Ü µµ ¼ and there is nothing to prove. Otherwise, ÚÐÙ µµ ÚÐÙ ÓÐØ Ü µµ by the definition of the online median algorithm, and the claim follows by Lemma Lemma 3.12 Let Ü be a point and assume that ¼. Then ÚÐÙ µµ ÚÐÙ ÓÐØ Ü µµ We prove that the claim holds before and after each iteration of the pruning procedure. Initially, and the claim holds by Lemma If the claim holds before an iteration of the pruning procedure, then it holds after the iteration by part (iii) of Lemma 3.7. A ball Ü Öµ is defined to be covered iff Ü µ Ö. A ball is uncovered iff it is not covered. Lemma 3.13 For any uncovered ball Ü Öµ, Ó Ø µ ÚÐÙ µ. È È Note that Ó Ø µ ݾ Ý µ Û Ýµ ݾ Ö Ý Üµµ Û Ýµ ÚÐÙ µ. Let Á denote the set of all indices in such that some ball in is covered. We now construct a matching between the sets and as follows. First, for each in Á, we match with a point Ü in that belongs to the last covered ball in the sequence. (Note that such a point Ü is guaranteed to exist by the definition of Á. Furthermore, Lemma 3.8 ensures that we do not match the same point with more than one index.) Second, for each in Ò Á in turn, we match with an arbitrary unmatched point Ü in. We now construct a function ³ mapping each point Ü in to an uncovered ball. For each Ü in that is matched with an index in Ò Á, we set ³ ܵ to µ. For each Ü in that is matched with an index in Á, we set ³ ܵ to the successor of the last covered ball in unless ØÐ µ is covered, in which case we set ³ ܵ to the ball Ü ¼µ. Lemma 3.14 For any pair of distinct points Ü and Ý in, ³ ܵ ³ ݵ. Immediate from Lemma 3.8 and the fact that the ball Ü ¼µ is contained in ØÐ µ. Lemma 3.15 For any point Ü in, ÚÐÙ ³ ܵµ ÚÐÙ ÓÐØ Ü µµ. If Ü is matched with an index in Ò Á, the claim follows by Lemma If Ü is matched with an index in Á, we consider two cases. If ØÐ µ is covered, then Ü Þ since ØÐ µ has exactly one child. The claim follows since ³ ܵ ÓÐØ Ü µ Ü ¼µ. If ØÐ µ is uncovered, then the predecessor of ³ ܵ in, call it Ý Öµ, exists and contains Ü. It follows that ÚÐÙ ³ ܵµ ÚÐÙ µ, where Ü Ö«µ is the child of centered at Ü. Let Ü µ denote the ball ÓÐØ Ü µ. 9

11 Below we complete the proof of the claim by showing that Ö«, which implies that and hence ÚÐÙ µ ÚÐÙ µ. It remains to prove that Ö«in the final case considered above. We have Ü Þ µ Ü Ýµ Ý Þ µ Ö Ö Ö «½ «Ö «½ which is less than Ö«by Equation (4). The desired inequality follows since Ü Þ µ by the definition of. Lemmas 3.13, 3.14, and 3.15 together yield a proof of Lemma Time Complexity In this section we describe two implementations of the online median algorithm given in Section 3.1. Throughout this section, let denote the quantity ÐÓ. The first implementation runs in Ç Ò µ Ò ÐÓ Òµ Æ time. The second implementation runs in Ç Ò ¾ Òµ time and assumes an Ç Ò ¾ µ-time preprocessing phase in which all distances are rounded down to the nearest integral power of. To analyze the running time of the implementations given below, we make use of the following lemma. Lemma 3.16 Let Ü Öµ be a child of a ball in sequence and let ¼ Ü Ö ¼ µ be a child of a ball ¼ in sequence. If then Ö «½µÖ ¼. First, note that Ü Þ µ Ö Ö«µ «Ö «½µ. By Lemma 3.6, Ö ¼ Ü µ Ü Þ µ. Combining these inequalities and using Equation (4), we obtain Ö «½µ Ö ¼ ««½ «¾ «Ö ¼ ««½ «½µÖ ¼ In the first implementation, for each point Ü in Í, we sort the remaining points by their distance from Ü. The total sorting time is Ç Ò ¾ ÐÓ Òµ. Using these sorted arrays, we can compute the value of any given ball in Ç ÐÓ Òµ time. We also maintain the distance from Ü to the nearest point in. Note that Ü ½ µ can be determined in constant time given Ü µ and Þ. The total time to maintain such distances is thus Ç Ò ¾ µ. It follows that the first step of each iteration can be implemented in Ç Òµ time. The total time for the second step is Ç ÐÓ Òµ times the sum over all balls appearing in some sequence, ¼ Ò, of the number of children of. By Lemma 3.16, it is straightforward to see that the latter sum is Ç Òµ, and thus the total time for the second step is Ç Ò ÐÓ Òµ. The running time of the third step is negligible. Thus the running time of the first implementation is Ç Ò µ Ò ÐÓ Òµ, as claimed above. For the second implementation, note that after the preprocessing phase, there are Ç µ distinct distances. Thus, for each point Ü, Ç Ò µ time is sufficient to construct an Ç µ-sized table that can be used to compute the value of any ball Ü Öµ in Ç ½µ time. It follows that the total time for the second step can be improved to Ç Òµ. The running time of the second implementation is therefore Ç Ò ¾ Òµ, which is linear in the size of the input (in bits). 10

12 4 Concluding Remarks We plan to investigate whether the ideas presented above can be applied to other problems. The work of Indyk [8] gives a technique to achieve sublinear time bounds for various location problems through random sampling of the distance function; we would like to see if application of these techniques to our algorithms yield sublinear time bounds. Korupolu et al. [12] give an algorithm and an efficient distributed implementation for hierarchical cooperative caching in which the distance function is an ultrametric. We would like to see if the hierarchical greedy strategy can be used or extended to solve the problem for an arbitrary metric space. It would also be interesting to see if the hierarchical greedy strategy admits an efficient distributed implementation for this problem. A nice feature of our online median algorithm is its simplicity. Although we deal with a harder problem, the algorithm is actually simpler to specify than existing constant-factor approximation algorithms for the -median problem. It would be interesting to see whether our approach could be simplified to yield a fast -median algorithm achieving a small approximation ratio. References [1] A. Borodin and R. El-Yaniv. Online Computation and Competitive Analysis. Cambridge University Press, Cambridge, UK, [2] M. Charikar and S. Guha. Improved combinatorial algorithms for facility location and -median problems. In Proceedings of the 40th Annual IEEE Symposium on Foundations of Computer Science, October To appear. [3] M. Charikar, S. Guha, É. Tardos, and D. B. Shmoys. A constant-factor approximation algorithm for the -median problem. In Proceedings of the 31st Annual ACM Symposium on Theory of Computing, pages 1 10, May [4] F. A. Chudak. Improved approximation algorithms for uncapacitated facility location. In R. E. Bixby, E. A. Boyd, and R. Z. Ríos-Mercado, editors, Integer Programming and Combinatorial Optimization, volume 1412 of Lecture Notes in Computer Science, pages , Berlin, Springer. [5] W. Domschke and A. Drexl. Location and Layout Planning: An International Bibliography, volume 238 of Lecture Notes in Economics and Mathematical Systems. Springer-Verlag, Berlin, [6] M. X. Goemans and D. P. Williamson. The primal-dual method for approximation algorithms and its application to network design problems. In D. S. Hochbaum, editor, Approximation Algorithms for NP-Hard Problems. PWS Publishing Company, Boston, MA, [7] S. Guha and S. Khuller. Greedy strikes back: Improved facility location algorithms. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, pages , January [8] P. Indyk. Sublinear time algorithms for metric space problems. In Proceedings of the 31st Annual ACM Symposium on Theory of Computing, pages , May [9] S. Irani and Karlin A. R. Online computation. In D. S. Hochbaum, editor, Approximation Algorithms for NP-Hard Problems. PWS Publishing Company, Boston, MA, [10] K. Jain and V. V. Vazirani. Primal-dual approximation algorithms for metric facility location and - median problems. In Proceedings of the 40th Annual IEEE Symposium on Foundations of Computer Science, October To appear. 11

13 [11] M. R. Korupolu, C. G. Plaxton, and R. Rajaraman. Analysis of a local search heuristic for facility location problems. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1 10, January [12] M. R. Korupolu, C. G. Plaxton, and R. Rajaraman. Placement algorithms for hierarchical cooperative caching. In Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms, pages , January [13] A. A. Kuehn and M. J. Hamburger. A heuristic program for locating warehouses. Management Science, 9: , [14] J.-H. Lin and J. S. Vitter. Approximation algorithms for geometric median problems. Information Processing Letters, 44: , [15] J.-H. Lin and J. S. Vitter. -approximations with minimum packing constraint violation. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing, pages , May [16] P. Mirchandani and R. Francis, editors. Discrete Location Theory. Wiley, New York, NY, [17] D. B. Shmoys, É. Tardos, and K. Aardal. Approximation algorithms for facility location problems. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing, pages , May

Optimal Time Bounds for Approximate Clustering

Optimal Time Bounds for Approximate Clustering Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract

More information

Online Facility Location

Online Facility Location Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these

More information

A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem

A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem Mohammad Mahdian Yinyu Ye Ý Jiawei Zhang Þ Abstract This paper is divided into two parts. In the first part of this paper,

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007 CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

More information

On the Performance of Greedy Algorithms in Packet Buffering

On the Performance of Greedy Algorithms in Packet Buffering On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,

More information

15-854: Approximations Algorithms Lecturer: Anupam Gupta Topic: Direct Rounding of LP Relaxations Date: 10/31/2005 Scribe: Varun Gupta

15-854: Approximations Algorithms Lecturer: Anupam Gupta Topic: Direct Rounding of LP Relaxations Date: 10/31/2005 Scribe: Varun Gupta 15-854: Approximations Algorithms Lecturer: Anupam Gupta Topic: Direct Rounding of LP Relaxations Date: 10/31/2005 Scribe: Varun Gupta 15.1 Introduction In the last lecture we saw how to formulate optimization

More information

SFU CMPT Lecture: Week 9

SFU CMPT Lecture: Week 9 SFU CMPT-307 2008-2 1 Lecture: Week 9 SFU CMPT-307 2008-2 Lecture: Week 9 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on July 8, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 9 Binary search trees

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

Lower-Bounded Facility Location

Lower-Bounded Facility Location Lower-Bounded Facility Location Zoya Svitkina Abstract We study the lower-bounded facility location problem, which generalizes the classical uncapacitated facility location problem in that it comes with

More information

On Clusterings Good, Bad and Spectral

On Clusterings Good, Bad and Spectral On Clusterings Good, Bad and Spectral Ravi Kannan Computer Science, Yale University. kannan@cs.yale.edu Santosh Vempala Ý Mathematics, M.I.T. vempala@math.mit.edu Adrian Vetta Þ Mathematics, M.I.T. avetta@math.mit.edu

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

The Online Connected Facility Location Problem

The Online Connected Facility Location Problem The Online Connected Facility Location Problem Mário César San Felice 1, David P. Willamson 2, and Orlando Lee 1 1 Unicamp, Institute of Computing, Campinas SP 13083-852, Brazil felice@ic.unicamp.br, lee@ic.unicamp.br

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

Provisioning a Virtual Private Network: A Network Design problem for Multicommodity flows

Provisioning a Virtual Private Network: A Network Design problem for Multicommodity flows Carnegie Mellon University Research Showcase @ CMU Computer Science Department School of Computer Science 2001 Provisioning a Virtual Private Network: A Network Design problem for Multicommodity flows

More information

JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS

JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS MEIKE AKVELD AND RAPHAEL BERNHARD Abstract. In this paper, we consider a class of scheduling problems that are among the fundamental optimization problems in

More information

Correlation Clustering

Correlation Clustering Correlation Clustering Nikhil Bansal Avrim Blum Shuchi Chawla Abstract We consider the following clustering problem: we have a complete graph on Ò vertices (items), where each edge Ù Úµ is labeled either

More information

Data Caching under Number Constraint

Data Caching under Number Constraint 1 Data Caching under Number Constraint Himanshu Gupta and Bin Tang Abstract Caching can significantly improve the efficiency of information access in networks by reducing the access latency and bandwidth

More information

Approximation Algorithms for NP-Hard Clustering Problems

Approximation Algorithms for NP-Hard Clustering Problems Approximation Algorithms for NP-Hard Clustering Problems Ramgopal R. Mettu Dissertation Advisor: Greg Plaxton Department of Computer Science University of Texas at Austin What Is Clustering? The goal of

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours

More information

Non-Metric Multicommodity and Multilevel Facility Location

Non-Metric Multicommodity and Multilevel Facility Location Non-Metric Multicommodity and Multilevel Facility Location Rudolf Fleischer, Jian Li, Shijun Tian, and Hong Zhu Department of Computer Science and Engineering Shanghai Key Laboratory of Intelligent Information

More information

A Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses

A Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses A Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses Julián Mestre Department of Computer Science University of Maryland, College Park, MD 20742 jmestre@cs.umd.edu Abstract

More information

Primal-Dual Approximation Algorithms for. Metric Facility Location and k-median Problems. Kamal Jain. Vijay V. Vazirani. Abstract

Primal-Dual Approximation Algorithms for. Metric Facility Location and k-median Problems. Kamal Jain. Vijay V. Vazirani. Abstract Primal-Dual Approximation Algorithms for Metric Facility Location and k-median Problems Kamal Jain Vijay V. Vazirani Abstract We present approximation algorithms for the metric uncapacitated facility location

More information

A Fast Algorithm for Optimal Alignment between Similar Ordered Trees

A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Fundamenta Informaticae 56 (2003) 105 120 105 IOS Press A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Jesper Jansson Department of Computer Science Lund University, Box 118 SE-221

More information

Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk

Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk Ashish Goel Ý Stanford University Deborah Estrin Þ University of California, Los Angeles Abstract We consider

More information

Optimal Static Range Reporting in One Dimension

Optimal Static Range Reporting in One Dimension of Optimal Static Range Reporting in One Dimension Stephen Alstrup Gerth Stølting Brodal Theis Rauhe ITU Technical Report Series 2000-3 ISSN 1600 6100 November 2000 Copyright c 2000, Stephen Alstrup Gerth

More information

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018 CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.

More information

Computing optimal linear layouts of trees in linear time

Computing optimal linear layouts of trees in linear time Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm

More information

Key Grids: A Protocol Family for Assigning Symmetric Keys

Key Grids: A Protocol Family for Assigning Symmetric Keys Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Fuzzy Hamming Distance in a Content-Based Image Retrieval System

Fuzzy Hamming Distance in a Content-Based Image Retrieval System Fuzzy Hamming Distance in a Content-Based Image Retrieval System Mircea Ionescu Department of ECECS, University of Cincinnati, Cincinnati, OH 51-3, USA ionescmm@ececs.uc.edu Anca Ralescu Department of

More information

Primal-Dual Approximation Algorithms for. Metric Facility Location and k-median Problems. Kamal Jain. Vijay V. Vazirani. Abstract

Primal-Dual Approximation Algorithms for. Metric Facility Location and k-median Problems. Kamal Jain. Vijay V. Vazirani. Abstract Primal-Dual Approximation Algorithms for Metric Facility Location and k-median Problems Kamal Jain Vijay V. Vazirani Abstract We present approximation algorithms for the metric uncapacitated facility location

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

An Improved Approximation Algorithm For Vertex Cover with Hard Capacities

An Improved Approximation Algorithm For Vertex Cover with Hard Capacities An Improved Approximation Algorithm For Vertex Cover with Hard Capacities (Extended Abstract) Rajiv Gandhi 1, Eran Halperin 2, Samir Khuller 3, Guy Kortsarz 4, and Aravind Srinivasan 5 1 Department of

More information

A more efficient algorithm for perfect sorting by reversals

A more efficient algorithm for perfect sorting by reversals A more efficient algorithm for perfect sorting by reversals Sèverine Bérard 1,2, Cedric Chauve 3,4, and Christophe Paul 5 1 Département de Mathématiques et d Informatique Appliquée, INRA, Toulouse, France.

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Lecture 7: Asymmetric K-Center

Lecture 7: Asymmetric K-Center Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix. CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear

More information

CS264: Homework #4. Due by midnight on Wednesday, October 22, 2014

CS264: Homework #4. Due by midnight on Wednesday, October 22, 2014 CS264: Homework #4 Due by midnight on Wednesday, October 22, 2014 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Turn in your solutions

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Algorithms for Euclidean TSP

Algorithms for Euclidean TSP This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation

More information

Time-space tradeoff lower bounds for randomized computation of decision problems

Time-space tradeoff lower bounds for randomized computation of decision problems Time-space tradeoff lower bounds for randomized computation of decision problems Paul Beame Ý Computer Science and Engineering University of Washington Seattle, WA 98195-2350 beame@cs.washington.edu Xiaodong

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

An experimental evaluation of incremental and hierarchical k-median algorithms

An experimental evaluation of incremental and hierarchical k-median algorithms An experimental evaluation of incremental and hierarchical k-median algorithms Chandrashekhar Nagarajan David P. Williamson January 2, 20 Abstract In this paper, we consider different incremental and hierarchical

More information

Network Design Foundations Fall 2011 Lecture 10

Network Design Foundations Fall 2011 Lecture 10 Network Design Foundations Fall 2011 Lecture 10 Instructor: Mohammad T. Hajiaghayi Scribe: Catalin-Stefan Tiseanu November 2, 2011 1 Overview We study constant factor approximation algorithms for CONNECTED

More information

Time-Space Tradeoffs, Multiparty Communication Complexity, and Nearest-Neighbor Problems

Time-Space Tradeoffs, Multiparty Communication Complexity, and Nearest-Neighbor Problems Time-Space Tradeoffs, Multiparty Communication Complexity, and Nearest-Neighbor Problems Paul Beame Computer Science and Engineering University of Washington Seattle, WA 98195-2350 beame@cs.washington.edu

More information

Approximability Results for the p-center Problem

Approximability Results for the p-center Problem Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center

More information

Department of Computer Science

Department of Computer Science Yale University Department of Computer Science Pass-Efficient Algorithms for Facility Location Kevin L. Chang Department of Computer Science Yale University kchang@cs.yale.edu YALEU/DCS/TR-1337 Supported

More information

Online Scheduling for Sorting Buffers

Online Scheduling for Sorting Buffers Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102

More information

College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007

College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 CS G399: Algorithmic Power Tools I Scribe: Eric Robinson Lecture Outline: Linear Programming: Vertex Definitions

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

solved optimally in a tree metric, Bartal gave a randomized O(log n log log n)-approximation algorithm for the k-median problem. This algorithm was su

solved optimally in a tree metric, Bartal gave a randomized O(log n log log n)-approximation algorithm for the k-median problem. This algorithm was su A constant-factor approximation algorithm for the k-median problem (Extended Abstract) Moses Charikar Λ Sudipto Guha y Éva Tardos z David B. Shmoys x Abstract We present the first constant-factor approximation

More information

A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES)

A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Chapter 1 A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Piotr Berman Department of Computer Science & Engineering Pennsylvania

More information

A General Class of Heuristics for Minimum Weight Perfect Matching and Fast Special Cases with Doubly and Triply Logarithmic Errors 1

A General Class of Heuristics for Minimum Weight Perfect Matching and Fast Special Cases with Doubly and Triply Logarithmic Errors 1 Algorithmica (1997) 18: 544 559 Algorithmica 1997 Springer-Verlag New York Inc. A General Class of Heuristics for Minimum Weight Perfect Matching and Fast Special Cases with Doubly and Triply Logarithmic

More information

Online algorithms for clustering problems

Online algorithms for clustering problems University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Summary of the Ph.D. thesis by Gabriella Divéki Supervisor Dr. Csanád Imreh

More information

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Benjamin Grimmer bdg79@cornell.edu arxiv:1508.05567v2 [cs.ds] 20 Jul 2017 Abstract We consider a variety of NP-Complete network

More information

Stanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011

Stanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011 Stanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011 Lecture 1 In which we describe what this course is about and give two simple examples of approximation algorithms 1 Overview

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

In this lecture, we ll look at applications of duality to three problems:

In this lecture, we ll look at applications of duality to three problems: Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,

More information

On a Cardinality-Constrained Transportation Problem With Market Choice

On a Cardinality-Constrained Transportation Problem With Market Choice On a Cardinality-Constrained Transportation Problem With Market Choice Matthias Walter a, Pelin Damcı-Kurt b, Santanu S. Dey c,, Simge Küçükyavuz b a Institut für Mathematische Optimierung, Otto-von-Guericke-Universität

More information

Cycle cover with short cycles

Cycle cover with short cycles Cycle cover with short cycles Nicole Immorlica Mohammad Mahdian Vahab S. Mirrokni Abstract Cycle covering is a well-studied problem in computer science. In this paper, we develop approximation algorithms

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Introduction to Approximation Algorithms

Introduction to Approximation Algorithms Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background

More information

Learning to Align Sequences: A Maximum-Margin Approach

Learning to Align Sequences: A Maximum-Margin Approach Learning to Align Sequences: A Maximum-Margin Approach Thorsten Joachims Department of Computer Science Cornell University Ithaca, NY 14853 tj@cs.cornell.edu August 28, 2003 Abstract We propose a discriminative

More information

Approximating Minimum Spanning Sets in Hypergraphs and Polymatroids

Approximating Minimum Spanning Sets in Hypergraphs and Polymatroids Approximating Minimum Spanning Sets in Hypergraphs and Polymatroids Gregor Baudis, Clemens Gröpl, Stefan Hougardy, Till Nierhoff, and Hans Jürgen Prömel Institut für Informatik, Humboldt-Universität zu

More information

External-Memory Breadth-First Search with Sublinear I/O

External-Memory Breadth-First Search with Sublinear I/O External-Memory Breadth-First Search with Sublinear I/O Kurt Mehlhorn and Ulrich Meyer Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85, 66123 Saarbrücken, Germany. Abstract. Breadth-first search

More information

Approximation Via Cost-Sharing: A Simple Approximation Algorithm for the Multicommodity Rent-or-Buy Problem

Approximation Via Cost-Sharing: A Simple Approximation Algorithm for the Multicommodity Rent-or-Buy Problem Approximation Via Cost-Sharing: A Simple Approximation Algorithm for the Multicommodity Rent-or-Buy Problem Anupam Gupta Amit Kumar Ý Martin Pál Þ Tim Roughgarden Þ Abstract We study the multicommodity

More information

Notes on Binary Dumbbell Trees

Notes on Binary Dumbbell Trees Notes on Binary Dumbbell Trees Michiel Smid March 23, 2012 Abstract Dumbbell trees were introduced in [1]. A detailed description of non-binary dumbbell trees appears in Chapter 11 of [3]. These notes

More information

Steiner Trees and Forests

Steiner Trees and Forests Massachusetts Institute of Technology Lecturer: Adriana Lopez 18.434: Seminar in Theoretical Computer Science March 7, 2006 Steiner Trees and Forests 1 Steiner Tree Problem Given an undirected graph G

More information

Directed Single Source Shortest Paths in Linear Average Case Time

Directed Single Source Shortest Paths in Linear Average Case Time Directed Single Source Shortest Paths in inear Average Case Time Ulrich Meyer MPI I 2001 1-002 May 2001 Author s Address ÍÐÖ ÅÝÖ ÅܹÈÐÒ¹ÁÒ ØØÙØ ĐÙÖ ÁÒÓÖÑØ ËØÙÐ ØÞÒÙ Û ½¾ ËÖÖĐÙÒ umeyer@mpi-sb.mpg.de www.uli-meyer.de

More information

Constructive floorplanning with a yield objective

Constructive floorplanning with a yield objective Constructive floorplanning with a yield objective Rajnish Prasad and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 13 E-mail: rprasad,koren@ecs.umass.edu

More information

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem

More information

1 The range query problem

1 The range query problem CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition

More information

Combinatorial Algorithms for Minimizing the Weighted Sum of Completion Times on a Single Machine

Combinatorial Algorithms for Minimizing the Weighted Sum of Completion Times on a Single Machine Combinatorial Algorithms for Minimizing the Weighted Sum of Completion Times on a Single Machine James M. Davis 1 Department of Operations Research, Cornell University, Ithaca, NY 14850. Rajiv Gandhi Department

More information

1 Introduction and Results

1 Introduction and Results On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Exponentiated Gradient Algorithms for Large-margin Structured Classification

Exponentiated Gradient Algorithms for Large-margin Structured Classification Exponentiated Gradient Algorithms for Large-margin Structured Classification Peter L. Bartlett U.C.Berkeley bartlett@stat.berkeley.edu Ben Taskar Stanford University btaskar@cs.stanford.edu Michael Collins

More information

A Survey of Correlation Clustering

A Survey of Correlation Clustering COMS E6998: Advanced Topics in Computational Learning Theory. Author: Hila Becker Date: May 5, 2005 A Survey of Correlation Clustering Abstract The problem of partitioning a set of data points into clusters

More information

Primal-Dual Algorithms for Connected Facility Location Problems

Primal-Dual Algorithms for Connected Facility Location Problems Primal-Dual Algorithms for Connected Facility Location Problems Lecture Notes for the course Approximation algorithms by Martin Korff (korff@diku.dk) Matias Sevel Rasmussen (sevel@math.ku.dk) Tor Justesen

More information

A 2-APPROXIMATION ALGORITHM FOR THE MINIMUM KNAPSACK PROBLEM WITH A FORCING GRAPH. Yotaro Takazawa Shinji Mizuno Tokyo Institute of Technology

A 2-APPROXIMATION ALGORITHM FOR THE MINIMUM KNAPSACK PROBLEM WITH A FORCING GRAPH. Yotaro Takazawa Shinji Mizuno Tokyo Institute of Technology Journal of the Operations Research Society of Japan Vol. 60, No. 1, January 2017, pp. 15 23 c The Operations Research Society of Japan A 2-APPROXIMATION ALGORITHM FOR THE MINIMUM KNAPSACK PROBLEM WITH

More information

Approximation by NURBS curves with free knots

Approximation by NURBS curves with free knots Approximation by NURBS curves with free knots M Randrianarivony G Brunnett Technical University of Chemnitz, Faculty of Computer Science Computer Graphics and Visualization Straße der Nationen 6, 97 Chemnitz,

More information

An Efficient Approximation for the Generalized Assignment Problem

An Efficient Approximation for the Generalized Assignment Problem An Efficient Approximation for the Generalized Assignment Problem Reuven Cohen Liran Katzir Danny Raz Department of Computer Science Technion Haifa 32000, Israel Abstract We present a simple family of

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems

Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems Wenxing Zhu, Chuanyin Guo Center for Discrete Mathematics and Theoretical Computer Science, Fuzhou University, Fuzhou

More information

Vertex-Colouring Edge-Weightings

Vertex-Colouring Edge-Weightings Vertex-Colouring Edge-Weightings L. Addario-Berry a, K. Dalal a, C. McDiarmid b, B. A. Reed a and A. Thomason c a School of Computer Science, McGill University, University St. Montreal, QC, H3A A7, Canada

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems

More information

Approximation Algorithms: The Primal-Dual Method. My T. Thai

Approximation Algorithms: The Primal-Dual Method. My T. Thai Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the

More information

Improved algorithms for constructing fault-tolerant spanners

Improved algorithms for constructing fault-tolerant spanners Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.

More information

Expander-based Constructions of Efficiently Decodable Codes

Expander-based Constructions of Efficiently Decodable Codes Expander-based Constructions of Efficiently Decodable Codes (Extended Abstract) Venkatesan Guruswami Piotr Indyk Abstract We present several novel constructions of codes which share the common thread of

More information

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.

More information

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Nabiha Asghar Department of Combinatorics & Optimization University of Waterloo, Ontario, Canada

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information