The Maximum Concurrent Flow Problem
|
|
- Angelina Daniels
- 8 years ago
- Views:
Transcription
1 The Maximum Concurrent Flow Problem FARHAD SHAHROKHI University ofnorth Texas, Denton, Texas AND D. W. MATULA Southern Methodist University, Dallas, Texas Abstract. The maximum concurrent flow problem (MCFP) is a multicommodity flow problem in which every pair of entities can send and receive flow concurrently. The ratio of the flow supplied between a pair of entities to the predefined demand for that pair is called throughput and must be the same for all pairs of entities for a concurrent flow. The MCFP objective is to maximize the throughput, subject to the capacity constraints. We develop a fully polynomial-time approximation scheme for the MCFP for the case of arbitrary demands and uniform capacity. Computational results are presented. It is shown that the problem of associating costs (distances) to the edges so as to maximize the minimum-cost of routing the concurrent flow is the dual of the MCFP. A path-cut type duality theorem to expose the combinatorial structure of the MCFP is also derived. Our duality theorems are proved constructively for arbitrary demands and uniform capacity using the algorithm. Applications include packet-switched networks [ 1, 4, 81, and cluster analysis [ 161. Categories and Subject Descriptors: F.2.2 [Analysis of Algorithms and Problem Complexity]: Nonnumerical Algorithms and Problems-computations on discrete structures; routing; G.2.2 [Discrete Mathematics]: Graph Theory-graph algorithms; network problems; path and circuit problems General Terms: Algorithms, Experimentation, Theory Additional Key Words and Phrases: Concurrent network flow, cut saturation, duality theorems, multicommodity flow, network partitioning, polynomial-time approximation scheme, primal-dual algorithms, routing in networks, throughput I. Introduction The single commodity flow problem has a rich theory and many applications in operations research and combinatorics. The original flow-augmentation algorithm developed by Ford and Fulkerson [7] has all of the following features: (i) it identifies a maximum flow value and flow assignment achieving that value, (ii) it identifies a minimum capacity cut that contains edges saturated under any optimal solution, (iii) it provides a proof of the max-flow min-cut theorem. Authors addresses: F. Shahrokhi, Department of Computer Science, University of North Texas, Denton, TX 76203; D. W. Matula, Department of Computer Science, Southern Methodist University, Dallas, TX Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission ACM l/90/ $01.50 Journal of the Association for Computing Machinery. Vol. 37, No. 2, April pp
2 Maximum Concurrent Flow Problem 319 The elegance of this approach is in the understanding of the structure of the underlying flow problem provided by the interpretation of the dual problem (the min-cut problem) that is implicitly solved. The original labeling algorithm to solve the problem in [7] was not polynomially time bounded, but a series of progressively faster polynomial-time algorithms have been devised for the problem (see [25]). Unfortunately, not much of the structure attendant to the single commodity flow problem has been discovered for multicommodity flow problems. More specifically, no efficient labeling algorithm is known to solve any multicommodity flow problems except for the cases in which the number of commodities is two [lo] or in which certain strong planarity conditions exist on the underlying graph [ 5, 14, 231. Our results here describe a multicommodity flow problem that is shown to possess many features analogous to the single commodity flow problem. The maximum concurrent flow problem (MCFP) [ 151 is a multicommodity flow problem in which all pairs of entities can concurrently send or receive flow and is an optimization version of the feasibility problem in multicommodity flows [ 11, 181. The MCFP is best motivated by a variation of the routing problem in packet-switched telecommunication networks, for example, see [ 11, [4], and [8]. Informally, consider a network of entities (cities, computers, etc.) in which there exists a demand for flow between all pairs of entities. The flow is sustained through channels with certain capacities. For the MCFP, it is desired to assign flow to each route of the network, such that the ratio of the flow supplied between each pair of entities to the demand between that pair (termed the throughput) is the same for all pairs of entities. This flow assignment must respect the capacity constraints; that is, the total flow through a channel should not exceed its capacity. The MCFP is to assign flow to the routes such that the throughput is maximized. A flow rerouting approximation algorithm for the MCFP was introduced in [3] and also employed in [26]. An extension of this algorithm in [22] was shown computationally to provide for the solution of much larger problems than could be solved by specialized linear programming codes [ 131. No complexity results were presented in [2], [22], or [26]. The principle result of this paper is to prove that an appropriately modified version of the flow rerouting algorithm for the MCFP allowing arbitrary demands with uniform capacity is a fully polynomialtime approximation scheme. In this paper we also pursue the duality theory of the MCFP. The use of distance functions in the formulation of the dual of certain multicommodity flow problems was initially suggested by Ford and Fulkerson [6], and was a key feature of the supply consumption theorem for the feasibility problem [ 181. Our first duality theorem extends this dual distance relationship of multicommodity flow. We show that the maximum throughput of an MCFP can be alternatively obtained by minimizing (over all distance functions) a distance-derived upper bound on the throughput. As for a combinatorial dual for the MCFP, recall that Menger s theorem (see [9]) exhibits a fundamental path-cut duality for standard graph connectivity. Ford and Fulkerson extended this combinatorial path-cut duality to single-commodity network flow in their max-flow min-cut theorem [7]. Our effort to derive a natural combinatorial path-cut dual for the MCFP is embodied in a second duality theorem. We formalize the notion of the density of a k-partite cut, and then derive the following theorem: The maximum throughput of any concurrent flow equals the minimum density of any k-partite cut. Both of our duality theorems are proved constructively for the uniform-capacity MCFP case using our algorithm.
3 320 F.SHAHROKHIANDD.W.MATULA The MCFP is formally defined in Section 2. Two linear programming (LP) formulations of the MCFP are presented. From established LP theory, the MCFP is shown to be solvable in polynomially bounded time. Certain combinatorial properties of the MCFP are explored, and two convenient upper bounds on throughput are derived. In Section 3, we give our fully polynomial-time approximation scheme for the MCFP with arbitrary demands and uniform capacity. Computational results indicate that the algorithm is etlicient in practice. Finally, Section 4 is devoted to the duality theory of the MCFP. 2. The Maximum Concurrent Flow Problem (MCFP) We assume throughout this paper that graph G = ( V, E) is undirected and has vertex set I/= (1, 2,..., n 1. We denote by P, the set of all paths containing the edge e, for each edge e E E, and by Pij the set of all paths between end vertices i, j (called ij paths), for each distinct pair of vertices i, j E I. Also let P denote the set of all nontrivial paths in G. A capacity function on G is a function C: E * R+, where R+ is the set of nonnegative reals. A demand function D on G is a function D: V x V + R+, such that D(i, j) = D(j, i) and D(i, i) = 0 for all i, j E V, where D(i, j) > 0 for some i, j E V. A concurrent flow of throughput Z in G is a functionf: P ---, R+ such that (i) CPEPijf(p) = ZD(i, j) for all distinct pairs of vertices i, j E Vand (ii) Cpep,f(p) 1 C(e) for every edge e E E, where D and Care the given demand and capacity functions on G. For convenience of notation we extend the domain of a concurrent flowfto P U E using f(e) = Ep f(p) for all e E E. e A maximum concurreptflow is then a concurrent flow function having the largest attainable throughput Z. The maximum concurrent j7ow problem (MCFP) is to determine a maximum concurrent flow and the maximum throughput 2. For any particular concurrent flow functionf; we term the paths assigned nonzero flows active paths forf; and those edges e for whichf(e) = C(e) edges saturated by f: An edge of G is critical if it is saturated by every maximum concurrent flow. The established literature on linear programming and multicommodity network flow provides several immediate observations about the solution of an MCFP, and the active paths and saturated edges corresponding to particular maximum concurrent flows. First note that the MCFP can be formulated as a network linear program in either the edge-path form or the node-arc form. 2.1 EDGE-PATHFORMOFTHE MCFP. Maximize Z subject to LP,~~(P) - ZD(i, j) = 0 for all distinct i, j E V, (2.1) { C,H+J(P) 5 C(e), where D, C are the demand and capacity functions on G = ( V, E). 2.2 NODE-ARCFORMOFTHE MCFP Maximize Z subject to hf+(i(l) (.f;k - &> = Z Cj D(i, j) if I = i, -ZD(i >,) otherwise, for all edges e = lk in E, for all i, I E V, (2.2)
4 Maximum Concurrent Flow Problem 321 where fh, is the flow of the commodity i on the edge kl from k to 1 for all i, k, I E C/and N(I) is the set of vertices adjacent to 1, for all 1 E V. Observation 1. The MCFP is solvable in polynomially bounded time. Furthermore, the uniform demand MCFP is solvable by a strongly polynomial algorithm. Reason. The linear program (2.2) is solvable in polynomially bounded time by algorithms of either Khachiyan or Karmarkar [ 121. For uniform demand, the MCFP falls into a class of combinatorial linear programs for which Tardos exhibits a strongly polynomial-time solution [24]. Specifically, this latter case means the solution of (2.2) is obtained in polynomially bounded time where the number of arithmetic operations is polynomially bounded in ] V] + ] E ] and independent of the size of the numbers occurring as capacities. The node-arc solution of (2.2) is readily transformed in (strongly) polynomial time to an edge-path solution of (2.1) yielding at most ] T/J ] E ] active paths, so both the maximum throughput and a maximum concurrent flow are obtainable in polynomial time. Observation 2. For any MCFP there is a maximum concurrent flow with at most ( 2 ) + ] E ] active paths, that is, an average of at most two active paths per pair of vertices. Reason. Clearly an optimal basic solution to (2.1) provides a solution where at most ( 2 ) + ] E ] paths are active. Note that since any routing table requires at least one route per vertex pair, this observation affirms the existence of a solution to the MCFP with reasonably practical size in the resulting routing table. Two convenient upper bounds on throughput are given in the following lemma. One bound derives from determining flow across the most constraining cut. Notationally, the cut (A, 2) is the set of edges between A and 2 = V - A, where CM 3 = L(A,Z) C(e) and WA, 2) = CieA,jez D(i, j) denote, respectively, the capacity and demand across the cut. Another bound on throughput is obtained from relating the total available capacity to the total demand. The most restrictive form of this latter constraint is obtained by weighting the capacities and demands by a distance function, with the distance defined on the edges, vertex pairs, and paths as follows. A distance function on G = (V, E) is a function d: E + RC such that d(e) > 0 for at least one edge e, where the domain of d is extended to E U V X I/ U P by d(p) = C 44 for all p E P, eep d(i, j) = $;W(P)l for all i, j E V. A shortest distance ij path p E Pij has d(p) = d(i, j). We denote by Z, the distance ratio of capacity to demand for distance d, as given by zd = LE d(ek (e) J&j d(i, jp(i, j) LEMMA 2.1. Let G, D, and C be an instance ofthe MCFP. Then the throughput Z of any concurrent flow f satisfies (i) [Cut Upper Bound]. For any cut (A, 2) in G with C;EA,jEz D(i, j) > 0, (2.3) z I C(A, = CeE64,.z~ C(e) D(A, A) C;EA,jEZ D(i,j) (2.4)
5 322 F.SHAHROKHIANDD.W.MATULA (ii) [Distance Upper Bound]. For any distance don G with C;<j d(i, j)d(i, j) > 0, zrz,= LEE d(ejc(ej C;<, 46 jjd(i, jj PROOF OF (i). The total flow supplied between A and 2 is Z C;EA,jEz D(i, jj, while the total capacity available between A and 2 is CeEcA,z) C(e); therefore, (2.5) or Z5 c &A,.? C(e) CiEA,jEx DO, jj. PROOF OF (ii). Consider the expression CpEP d( p)f( p j. Then, C d(pjf(p) 2 C 46 j) E,,f(p) = Z C d(i, j)d(i, j). PEP i<j i<j Furthermore, It follows that C d(pjf(p) = & 44.Ecp f(p) 5.& d(e)c(e). PEP e z ( &E d(e)c(ej = z Ci<j d(i, j)d(i, j) d Q.E.D. Gerla [8] observed and employed the cut upper bound of Lemma 2.1 in his development of the cut saturation algorithm for packet-switched network routing (see also [4]). Unfortunately, the cut upper bound is subject to an inherent gap [ 15, 171. Specifically, the MCFP for the graph & with unit capacities on the edges and unit demands between all vertex pairs is readily seen (by employing d(e) = 1 on each edge in (2.5)) to have an optimal throughput of 3/7 with a lowest minimum-cut upper bound (over all cuts) of l/2. The possibility that an inherent gap can exist in (2.4) and that removal of the saturated (critical) edges may yield a partition into more than two parts means that less than complete solutions to the MCFP are obtainable by methods (e.g., [2, 81) focusing on a saturated-edges partition into two parts. Our methods derive from the more general Distance Upper Bound (2.5). We call d an optimal distancefunction for the MCFP whenever the corresponding distance ratio Zd equals the maximum throughput Z. Our results in Sections 3 and 4 are specific to MCFPs with uniform capacity and are sufficient to prove that an optimal distance function always exists for these instances. A further aspect of the duality between maximum concurrent flows and optimal distances valid for all MCFPs is given in the following lemma. LEMMA 2.2. f is a maximum concurrent flow and d is an optimal distance function for a given MCFP ifand only ifboth (i) all active paths for f are shortest paths under d, and (ii) edges assigned nonzero distance by d are saturated byf:
6 Maximum Concurrent Flow Problem PROOF. Assuming (i) and (ii) we have 323 Z C d(i,jp(i, j> = C 4kj) C f(p) i<j icj p-t, so then = C d(p)f(~) = C d(e) C f(p) = C d(e)c(e), PEP &E PEP, FGE z = LEE d(ek(e) Ci<j d(i, j)d(i, j) = zd confirming Z to be the maximum throughput, f to be a maximum concurrent flow, and d to be an optimal distance function. On the contrary, if(i) is false, then and if (ii) is false, then C 4L j).ecp f(p) < pzp d(~)f(p), i<j u C 44.Fp f(p) < EE 4dC(d, CEE e so if either (i) or (ii) is false, the throughput Z forfis strictly less than the distance ratio Zd for d. If 2 is the maximum throughput, then either Z < 2 and f is not a maximum concurrent flow, or Z < Zd and d is not an optimal distance function. Q.E.D. COROLLARY 2.3. Any optimal distancefunction dfor an MCFP assigns nonzero distances only on critical edges. PROOF. Assume the optimal distance function d assigns nonzero distance to some noncritical edge e. There must exist some maximum concurrent flow fe that does not saturate e since e is not critical. But these properties forfe and d contradict Lemma 2.2, verifying the corollary. Q.E.D. It is sometimes more convenient to treat maximizing the throughput of the concurrent flow as minimizing the utilized capacity to realize the demands. For a given G, D and C, a concurrent flow f: P -+ R+ of capacity utilization u in G satisfies Cpgp,j f(p) = D(i, j) for all i, j E Vand Cpsp, f(p) 5 UC(e) for all e E E. The minimum capacity utilization problem (MCUP) is to find the smallest capacity utilization u* achieved by a concurrent flowf: Observe that iff is a solution to the MCUP with the capacity utilization u *, then jdefmed by j (p) = f(p)/u* for all p E P is a maximum concurrent flow of throughput 2 = l/u*. 3. An Approximation Algorithm for the Uniform Capacity MCFP Although the linear programming technique for the MCFP (in Section 2) is polynomially bounded, it is practically ineffective on all but very small problems. The edge-path formulation of the MCFP can be solved using linear programming techniques that use special network structures [ 131. Such methods store the LP matrix implicitly. However, ( I 2 I ) + 1 E ] rows and at least as many columns must be explicitly stored. Thus, LP techniques are typically limited to problems of at most 40-odd vertices [20].
7 324 F. SHAHROKHI AND D. W. MATULA We now present an c-approximate algorithm [ 191 to solve the MCFP with uniform capacity for any t > 0. In this algorithm, there is an implicit need for very high precision computation. We give Algorithm R for analysis of the complexity, assuming sufficient precision. We have introduced in our implementation slight refinements to Algorithm R for finite precision computation. Regarding approximate solutions to the MCFP, we shall term fan t-optimal concurrent flow if its throughput 2 satisfies (Z - 2)/Z 5 t. We shall further term d an t-optimal distance function if its distance ratio & satisfies (Z, - 2)/Z, 5 t. Algorithm R [Reroute]. The input to the algorithm is a nontrivial connected graph G, a demand matrix D, constant capacity function C: E + c and 0 < t I 1. The output is an c-optimal concurrent flow 7 of throughput z and an e-optimal distance function d with distance ratio Z, such that (Z - 2)/Z I 6 and (Z, - z)/z, 5 E where 2 is the optimal throughput. Without loss of generality, we assume that C;<j D(i, j) = 1 and c = 1. The reader will note that these assumptions implyz2 1. Rl. [Determine the initial feasible solution.] Set d(e) = l/] E I for all edges e E E. For each pair of distinct vertices i, j E V, set f(p) = D(i, j) for one shortest distance ij path p. Setf(e) = CpEP,f(p) for all e E E. Set P = (p If(p) > 0). Set u. = e2/32 ] E I 3. (Here and in subsequent steps, we shall maintain CrEE d(e) = 1 and f(p) = 1. We further maintain for p E P that either f(p) 2 go or izp= D(i, j) < go for p an ij path.} R2. [Compute new distance function and find shortest paths.] Set d(e) = ewk2 I E I l4fcen L-Z exp((2 I E I */4f(e >) for all e E E. For each pair of distinct vertices i, j find a shortest distance ij path and the distance d(i, 3. R3. [Compute the throughput, distance upper bound, and check for termination.] Set f* = max{f(e) 1 e E El, 2 = l/f*, and Zd = l/xi<, d(i, j)d(i, j). If (Zd - z)/zd 5 6, then compute the concurrent flow 7 with the throughput z using Y(p) J$.$) for all paths p with f(p) > 0. Output 7, Z, d, and Zd and halt. {Note then that (Z - 2)/Z = 1 - z/z z/z, = (Zd - Z)/Z, 5 E. 1 R4. [Reroute flow.] For each i, j E V, denote by pi a particular active path between i and j whose length d(pij) computed using the edge distances d(e) is at least as great as any of the active paths (i.e., those currently assigned nonzero flow) between vertices i and j. Then determine a particular vertex pair k, 1 E Vsuch that d(pk ) - d(k, 1) = max(d(p j) - d(i, j) I i, j E V, D(i, j) 1 ao]. For this vertex pair k, 1 E V, denote by p * a particular shortest path between k and 1 (thus, d(p,) = d(k, I)), and let the notation pk - p.+ indicate those edges in pk and not in p,. Then set d* = &p~~--p. d(e) and d, = CeEp,+ d(e). Set d* fj = qg 1% d, *
8 Maximum Concurrent Flow Problem 325 Iff(pk ) 2 u + uo, then reroute u units of flow from pk to p* and set P = P U (p, ); otherwise, reroute all the flow on pk to p* and set P = P U (p, 1 - {p ). Update the flow valuesf(pk ),f(p*), andf(e) for edges in p*, pk. Go to R2. (Note that d* gives the sum of distances on edges whose flows are to be lowered and d, gives the sum of distances on edges whose flows must be raised.) The relationship between the MCFP and the MCUP is used by Algorithm R. In fact, Algorithm R solves the MCUP by supplying the demand between all pairs (step R 1) and assigning much larger distances to the edges hosting larger flows (step R2). This will make the paths containing highly utilized edges less attractive for future flow assignments, since rerouted flow is always sent on a shortest distance path. Step R3 computes a concurrent flow and its throughput using the current utilization factor which isf*. Step R4 is the most important part of the algorithm. In this step, the algorithm generally reduces the flow on highly utilized edges and increases the flow on poorly utilized edges. More important, it is not claimed that the computedf* should monotonically decrease with each cycle through steps R2-R4. Rather the result that Algorithm R eventually (and efficiently) achieves an acceptably low utilization factor without the possibility of cycling is proved in Theorem 3.3. We first obtain two lemmas. LEMMA 3.1. Let f and d be the existing flow and distance functions at R2. Then P - p~pfb)4p) = f - ezefcev(e) 5 &, wheref* = max(f(e) I e E El. PROOF. Observe that CpEP f(p)d(p) therefore = CeEE f(e)d(e) and CCE~ d(e) = 1, The nonzero terms of the right-hand side of (3.1) must correspond to e E E with f(e) c f*, for which Thus d(e) = ew((2 I E I /4f(e>) LTE w-%(2 I E I */4f(e )> 1 5 ew(@ I E I MP - f(e)>) I 5 (2 I E I */t)(f* - f(e)) * f* -f(e) CEE ' (p - f(e))d(e) 5 ee~,&=~* ((2 I E I */W* - f(e)>) implyingf* - CpEPf(p)d(p) I 42 1 E 1, which proves the lemma. QED.
9 326 F. SHAHROKHI AND D. W. MATULA LEMMA 3.2. Assume R has not terminated at R3. Then in R4 for pk, d*, d,, k, I, U, we have (i) d* - d, = d(pk ) - d(k, I) > c/31 E 1 and (ii) (T -z 2ao, where u. is defined as in R 1. PROOF. Assume that R has not terminated and that d* - d, = d(pk ) - d(k, I) 5 t/3 1 E I. We show that, for Zd and z as computed in R3 of the current iteration, we have (Zd - z)/z, 5 6. This will, however, contradict the assumption that R has not halted. We proceed as follows: p;pf 04r4 = r<i c p&f(p)d(p) + i;j P;ptjf(p)d(p)* D(l.jkq W,i)<e3 But d(pk ) - d(k,,) 5 c/3 1 E 1 implies that d(p) - d(i, j) 5 e/3 I E I for any active z j path p with D(i, j) I uo. Thus, icj D(i,j)BBrJ C p~ijf04a) = E icj D(i,j) O,J 5 izj d(i, jw, j> + C W, 3 - i<j 3l El = C d(i,jpg,j) + 3,cEl. i<j (3.2) Note that for any i, j E V with D(i, j) < u. the rerouting procedure in R4 guarantees that there is exactly one active jj path and that this path hosts D(i, j) < u. units of flow. Also, d(p) zs- 1 for all p E P. Therefore C pz,,jfw(p) 5 C, &f(p) 5 i-cj i<j 8, D(i,iFq D(i.Wo0 (3.3) Using (3.2) and (3.3), we get c2 C f(p)d(p) 5 C 44 jp(i, PEP i<j j) + fq + ~ 3w1 < ++d 2 IA (3.4) Also, by Lemma 3.1, p~pfw(p) rf* -& Combining this and (3.4) we have L+z.f*=& zd IEI Z (3.5) However, CeEE d(e) = 1 for any distance function constructed by R. Therefore, using the distance ratio in Lemma 2.1, we have l/z 2 l/z& Thus, (3.5) implies L+ E & - z -z=z- (3.6) & IEl z.& Or?-z,=z &
10 Maximum Concurrent Flow Problem 327 Note that assigning a distance of 1 to all edges and applying Lemma 2.1 will yield a distance ratio which is at most ] E 1. Thus, Z I Z I I E) and (3.6) implies (Z, - Z)/Zd 5 t, which is the desired contradiction for part (i). To prove (ii), note that 0 < d, 5 1 and by part (i) d* - d, 2 c/3 I E I. Thus, d*/d, = 1 + (d* - d, )/d, 1 1 f 43 I E 1, implying c a=qp -&)z 16;El,=2q,. Q.E.D. An t-approximate algorithm with computing time polynomially bounded both in problem size and 1 /E is called a fully polynomial-time approximation scheme. THEOREM 3.3. Algorithm R is a fully polynomial-time approximation scheme and terminates with an e-optimal concurrent flow and an t-optimal distance function. Furthermore, the concurrent flow constructed at any iteration of R does not utilize more than 0( I E I 3/e2) active paths. PROOF. Lemma 3.2 implies that in R4 u 2 coo; therefore, the rerouting procedure in R4 guarantees that in any iteration of the algorithm each active ij path has at least u. units of flow on it, unless D(i, j) < co. Since the sum of demands for all pairs is unity, it follows that there are at most (l/go) + ( 2 ) = 0( ] E ( 3/c2) active paths at any iteration of R. We now show that R terminates. Let Si denote J&E exp((2 I E I /c) f(e)) in iteration i of R, where f is the concurrent flow function as in step R2. The idea underlying the proof is to show that Si+r/Si is always less than some fixed positive constant (which is less than unity), yielding convergence (as we will show) in polynomially bounded time. Consider pki, p *, d*, d, as they are defined in R4. We consider two cases derived from whether part or all of the flow is rerouted from pk to p*, and obtain a general upper bound on Si+,/Sj. Case 1. [Partial rerouting from pk to p *.] This corresponds to f(pk ) z g + uo, so that u units of flow are rerouted from pk to p*. This then increases the flow on the edges of p * - pk by u and decreases the flow on the edges of pk - p* by u, all other edge flows remaining the same. Hence, employing functionsj; d as existing from step R2, si - s,,, = ILw-~, si ew((2 I E I 2/c)f(e)) si + CrEp,-~k/ w((:! I E I 2/t)f(e)) CrEpk~-p, wu C1jEp,--pk~ ww si I E I 2/c)(f(e) - a)) si I E I 2/E)(f(e) + a)) si = d* + d, - exp(-2 f 2u)d* - exp(f)d,. (3.7)
11 328 F. SHAHROKHI AND D. W. MATULA However, exp((2 ] E ] /t)o) = m. Therefore, (3.7) implies si - si+k Si =d*+d*+yi*-(~yd* = d* + d, - 2@& + < 5 2 and since R has not halted, by Lemma 3.2, d* - d, > 43 ] E 1. Thus, (3.8) implies (3.8) simsi+,, E2 Si - 36IEl* Case 2. the flow on pk is rerouted to p *. As in case 1, we have Si - Si+l Si (3.9) [Total rerouting from pk to p*.] In this case f(pk ) < u + u. and all = d* + d, - exp -2 1 E;I/(Pk ))d* _ exp(2 1 EI;f(Pk ))d,. c3.10j Treat the right-hand side of (3.10) as a function of the flow to be rerouted and observe that for any fixed d*, d, the function F(x) = d* + d, - exp (- Iflix)d* _ exp(??)& is monotonically increasing for x E [0, ~1 and monotonically decreasing for x E [a, 2~1; furthermore, for all x E [0, a], F(u + x) = F(u - x). Also, the rerouting procedure in R4 implies that u. 5 f(pk ) < u. + u. Thus, F(f(pk )) I min(f(uo), F(uo + u)). But by Lemma 3.2, u 2 2uo, implying that u - u. 1 uo, which implies that F(uo + u) = F(a - uo) 2 F(uo). Therefore, Si - Si+l Si = W(Pk >) 2 Rue) Considering u > uo, we have (d* - (d* - m = m(@ J* - d,)/2, sz by Lemma 3.2 = exp(2 I E I *UO/C) - 1 )(d* - exp( ] t 2uo)d,). (3.11) exp(2 I E I *uo/~ d* - exp (3.12) Also, exp(2 1 E I *uo/t) - 1 )= 1 -exp(-21f12uo) exp(2 I E I *u0/4 = 1 -exp -2IEl* t* t 32lE( = 1 -exp(*)zk(l-$&). (3.13)
12 Maximum Concurrent Flow Problem 329 It follows from (3.12) and (3.13) that Si-Sj+l 1 C * si Tic0 JEl. (4 Note that (3.14) and (3.9) indicate that in either case 1 or case 2, si+l -<I C2 100 IEl si i ) for all i I 1. Now assume that R did not halt after m iterations. Then (3.14) (3.15) For any concurrent flow f existing in any iteration of R, 0 I f(e) P 1, for all e E E. Thus, S, 5 ( E I exp(2 I E I /t) and S m+-l L I E I. Therefore, (3.15) implies and -2IEl* m 5 t log(1 - (l/loo)(~/l E I) 21E12 < t(l/loo)(t/l E I)* = 200lEl t3. (3.16) Note that R2 and R4 are the most expensive steps of R. At any iteration, R2 and R4 require 0( I 1/l ) and 0( I VI I P I ) time, respectively, where P is the set of all active paths in this iteration. But I P I = O() E) /t ) and R halts after at most 0( 1 E I /e3) iterations. Thus, Algorithm R has time complexity O( 1 I 1 ) E I /c ). Q.E.D. Observe in the proof of Theorem 3.3 that it is the quantity which experiences a guaranteed monotonically decreasing behavior through successive cycles of steps R2-R4 of Algorithm R. This fact confirms that successive flow functions cannot be identical even though some successive values off* may be identical. According to our analysis the worst case behavior of Algorithm R, although polynomially time bounded, does not look too promising. We feel that a better upper bound on the worst-case complexity probably exists. But of greater practical significance is the improved efficiency observed for our implementation over a wide selection of applications. PERFORMANCE OF ALGORITHM R. A slightly modified version of R was implemented using the Pascal language on a VAX 1 l/780 with the UNIX 4.2 operating system. In order to avoid overflow, the distance function was computed using d(e) = ew(df(e) - P>) LTE ew(4f(e ) - YV where f* = max( f(e) I e E EJ. In theory, for any CY 1 2 I E I */t, the algorithm
13 330 F. SHAHROKHI AND D. W. MATUL.A Graph K4.6 K 8.12 K K32,48 KSO.50 Q3 Q4 ii random random random TABLE I. PERFORMANCEOFTHEFLOWREROUTINGALGORITHMS No. of vertices No. of edges Avg no. of active Avg length CPU paths of active time Upper per pair paths set z bound I I converges to a desirable t-optimal solution, but large values of LY will cause underflow in finite precision computation. Our test results, however, indicate that small values of (Y(which do not cause underflow) will also result in convergence to reasonably good approximations. In our implementation the value of a is initially selected such that d(e) > for all e E E. If the convergence rate is slow, however, the value of (Y is increased. The values for (Y were observed to be in the range of 0.5 to 50 for all test cases in Table I. We ran our implementation on a wide range of data and the results summarized in Table I are selected from those described in [22]. Graphs 1 through 8 are from the current literature [3, 261. Since these benchmark cases did not go beyond graphs of 31 vertices, we supplemented them with sequences of bipartite and random graphs, and cubes. The capacity and demand are both unit functions for all cases in Table I. Our results in Table I show a significant improvement in the size of the problem solved compared to [3], [20], and [26], which only solve problems of size at most 40 vertices. Note that the random graph on 120 vertices and 3598 edges in Table I would yield a formidable linear program (node-arc or edge-path) of some 10,000 rows and at least 10,000 columns. Algorithm R took only 20 minutes of VAX time to solve this case. The upper bounds given in Table I are each the better of the computed distance upper bound 2, and a determined cut upper bound when available as per Lemma 2.1. As a final remark in this section, we compare the results summarized in Table I to the statement of Observation 2 in Section 2, by observing that the average number of active paths per pair of vertices is in all cases at most Duality Theory for the MCFP Various extensions of the max-flow min-cut theorem to multicommodity flow problems have been discussed by previous researchers. Ford and Fulkerson
14 Maximum Concurrent Flow Problem 331 employed a dual distance function for a multicommodity flow problem in an early application of this technique [6]. A duality result analogous to that of the single commodity flow problem for the 2-commodity flow problem was presented in [lo]. Regarding duality in the feasibility problem for multicommodity flow, an initial significant result was the supply consumption theorem of Onaga [ 181: Given the source-sink pairs (Si, ti), positive demands D(s,, ti) i E Q, and capacity function C, the demands are realizable iff for any distance function d on G, CeGE C(e)d(e) 2 CiEo D(si, ti)d(si, ti). hi [ 1 I] gave a concise proof of this theorem using the duality theory of linear programming. He also showed that it is sufficient to consider a finite number of inequalities involving only bounded integral values for distances. We now shall give two duality theorems for the MCFP. The first continues the development of associated distance functions and may be considered a natural generalization of Onaga s realizability result to the arena of dual optimization. For the case of uniform capacity, our result is shown constructively (in the limit) using our approximation algorithm. THEOREM 4.1 [Max-flow Min-distance ratio Theorem]. Let G, D, represent an instance of the MCFP with uniform capacity c on each edge and pn optimal throughput 2. Then where 2 = mini& 1 d is a distance function on G), Zd = c CeEE d(e) Ci<j d(i, j)d(i, j) PROOF. For simplicity and with no loss of generality assume that c = 1, Ci<j D(i, j) = 1, and CpEE d(e) = 1 for all distance functions d. Let S be the set of all distance ratios. By Lemma 2.1, Z is a lower bound of S. The correctness of Algorithm R implies that, for any e > 0, there exist concurrent flow and distance functions 7 and d, respectively, such that Z 2 Z 2 Z,-( 1 - t). Thus, Z = inf S. To complete the proof we show that inf S E S. Denote the edges in E by el, q,..., elel and let X be the subset of the Euclidean space RIEl with CXi = 1 for all (Xl, x2, **a, xl El ) E X, Xi z 0 for all i. Consider the function f: X + R by fh, x2,..., xl El ) = Ci<j d(i, j)d(i, j), where d is the distance function identified by assigning distance xi to the edge ei, i = 1, 2,..., ] E ]. It is readily seen that f is a continuous function from the compact metric space X to the metric space R+. Thus sup f(x) E f(x), implying that inf S = l/sup(f(x)) and that inf S E S. Q.E.D. Our second duality theorem is more revealing and exposes the combinatorial structure of the MCFP. Recall that the dual for the single commodity flow problem is characterized by a cut, in particular by the max flow-min cut theorem [7]. We now exhibit the cut structure of the MCFP through its dual relation to a unique partition into k 2 2 parts, where the value of k is determined by the instance of the MCFP. Let G = ( V, E) be a graph; denote by (A,, AZ,..., Ak) for k 2 2, the set of all edges in G whose end vertices are in distinct elements of the partition (A,, AZ,..., Ak) of V. We call (A,, AZ,..., Ak) a k-partite cut in G. The following theorem is an extension of [ 151 and explores the structure of the critical edges, that is, those edges that are necessarily saturated by any maximum concurrent flow. We point out that the following result holds for arbitrary capacities and demands.
15 332 F.SHAHROKHI AND D.W.MATUL,A THEOREM 4.2. Let G, D, C be an instance of the MCFP. Denote by fa maximum concurrent flow, by E,, the set of all saturated edges under f, andfinally by E,, the set oj critical edges. Then (i) G - E, is disconnected and (ii) E, is a k-partite cut, for some k 2 2. PROOF. Assume, to the contrary that G - E, is connected. Then there is a spanning tree T of G such that none of the edges in T are saturated under f We can increase the flow on some path p E Pij by ED(i, j) for all i, j E I/ and some c > 0, concurrently. This contradicts the optimality of 7 and proves (i). To prove (ii) note that if E = E,, then the result is trivially true. Assume that E # E,, then for every e E E - E, there must be a maximum concurrent flow function fe such that f,(e) < C(e) (i.e., fe does not saturate e, since e is not critical). Define 7: P + R+ by yyp) = LEE-E, fp(p) IEI - IEcl * Then 7 is a maximum concurrent flow in G only saturating the edges in E,. By part (i), G - E, is disconnected. Let A,, AZ,..., Ak denote the vertex sets of the components of G - E,. We have (A,, AZ,..., Ak) G E,. Assume that (A,, AZ,..., Ak) # E,; let e = tl E E, - (A,, AS,..., Ak). Then vertices t, 1 are in Aj for some j, 1 I j % k. Since Aj is connected, there is a tf path D (in A,) containing only unsaturated edges. Let c = mine,5 (C(e) - J (e)). Then t > 0. Let p E P, be an active mn path, m, n E V. There exists an mn path q such that q does not contain e, and every edge in q is either in p or p. Reroute min(c, f(p)] units of flow from p to q, maintaining the optimality of the new concurrent flow and contradicting the criticality of e, which proves part (ii). Q.E.D. From Theorems 4.1 and 4.2, we can now fashion a combinatorial duality relation between concurrent flow and k-partite cuts. Let G, D, and C represent an instance of the MCFP and let (A,, AZ,..., Ak) denote any k-partite cut of G. For 1 I i, j 5 k, let C(Ai, A,) denote the total capacity of all edges between Ai and A,, and let D(Ai, Aj) denote the total demand between vertices of Ai and Aj. Let den(a,, AZ,..., Ak) denote the density of the k-partite cut (A,, AZ,..., Ak) as defined by Clsi<jck WijC(Ai, Aj) den(a,, AZ,..., Ak) = min w Cisi<jsk wijd(a;, Aj) (4.1) where the minimum is over all symmetric distance functions w satisfying the triangle inequality Wij + Wj/ I Wi/ for all 1 5 i, j, 1~ k, where Crci<j5k w;jd(ai, Aj) # 0. Note that for any 2-partite cut (A, A) of G, the density is simply which is the expression for the cut upper bound in Lemma 2.1. Formula (4.1) generalizes the notion of density to k-partite cuts in a manner allowing us to formulate the following combinatorial duality theorem. In order to be consistent with Theorem 4.1, our proof here again is restricted to the case of uniform capacity. THEOREM 4.3 [Max-concurrent flow Min k-partite cut Theorem]. For any untform capacity MCFP, the maximum throughput of any concurrent jlow equals
16 Maximum Concurrent Flow Problem 333 TABLE II. ANALOGOU RESULTS IN THE THEORIES OF THE SINGLE COMMODITY NETWORK FLOW [7] AND THE CONCURRENT FLOW Objective Cut Inequality Properties Critical Saturated Edges Duality Theorem Proof/Algorithm Paradigm Single Commodity (Source-Sink) Flow Maximize value of sourceto-sink flow Plow value less than or equal to capacity of any cut Edges saturated by every maximum flow contain a minimum cut The maximum value of any flow equals the minimum capacity of any cut Plow augmentation proves duality and provides an efftcient algorithm Flow Type Concurrent (All Pairs) Flow Maximize throughput of concurrent flow Throughput less than or equal to density of any cut Edges saturated by every maximum concurrent flow constitute a k-partite cut The maximum throughput of any concurrent flow equals the minimum density of any k-partite cut Plow rerouting proves duality and provides an efticient algorithm the minimum density of any k-partite cut, and in particular, equals the density of the k-partite cut of critical edges. PROOF. Let G, D, and constant capacity C be an instance of the MCFP. By Corollary 2.3 any optimal distance function d assigns nonzero distance values only to critical edges, which by Theorem 4.2 compose the k-partite cut E, = (A,, A2, * *., Ak). Furthermore, an optimal distance function must clearly then ascribe the same distance d(u, v) for any u E A;, v E Aj for parts A;, Aj of E,. So we may set wij = d(u, v), and so determine W;j for all 1 I i, j 5 k, i # j, and from Theorem 4.1, then obtain den(a,, AZ,..., Ak) 5 2. Conversely, for any j-partite cut (A,, AZ,..., Aj), 2 I j P n, let w be a weight function minimizing (4.1). Now we may construct a distance function by setting d (e) = w (i, j) whenever the end vertices of e are in different parts Ai, Aj, i # j and d (e) = 0, otherwise. The shortest distance function extension of d in G to V X I/ yields d (u, v) 2 WQ for u E Ai, v E Aj, i # j, since w satisfies the triangle inequality. Furthermore, d (u, v) = wl: if some edge e E E joins a vertex Of Ai to a vertex of AI. If there are no edges between Ai and Aj, then C(Ai, Aj) = 0; hence, &GE d (e)c(e) = Cix;<jsk wbc(ai, Aj). Recalling d (u, V) 2 w,$ for u E Ai, v E Aj, i # j, we obtain w$ = d (u, v) since w minimizes the right-hand side of (4.1). Thus, den(ar, AZ,..., Aj) 2 & 1 2, and the theorem follows. Q.E.D. The form of Theorem 4.3 in our mind properly identifies the inherent path-cut duality in the MCFP, and illustrates the particular significance of distance as pertinent only between parts of the uniquely determined critical k-partite cut. We note that Theorem 4.3 can be readily extended by suitable linear programming arguments and shown to hold for arbitrary capacity and demand functions. Table II as extended from [ 151, summarizes the results for duality of the MCFP analogous to the important aspects of single commodity flow theory.
17 334 F. SHAHROKHI AND D. W. MATULA REFERENCES 1. AI-TAR, R. A Distributive Adaptive Multi-path Routing-Consistent and Conflicting Decision Making, 80/ 8 1, Aiken Computation Laboratory, Harvard Univ., Cambridge, Mass. 2. BIANCHINI, R. P., AND SHEN, J. P. Interprocessor traffic scheduling algorithms for multipleprocessor networks. IEEE Trans. Comput. C-36 (1987), BISWAS, J., AND MATULA, D. W. Two-flow routing algorithms for the maximum concurrent flow problem. In Proceedings of the ACM Fall Joint Conference. ACM, New York, 1986, pp BOORSTYN, R. R., AND FRANK, H. Large-scale network topological optimization. IEEE Communications (Jan. 1977), DIAZ, H., AND GHELLINK, G. Multicommodity maximum flow in planar networks (D-algorithm approach). CORE Discussion Paper No Center for Operations Research and Econometrics, Louvain-la-Neuve, Belgium, FORD, L. R., AND FULKERSON, D. R. A suggested computation for maximal multicommodity network flows. Manage. Sci. 5 (1958), FORD, L. R., AND FULKERSON, D. R. Flows in Networks. Princeton University Press, Princeton, N.J., GERLA, M. A cut saturation algorithm for topological design of packet-switched communication networks. In Proceedings of the National Telecommunication Conference. Dec. 1974, pp HARARY, F. Graph Theory. Addison-Wesley, Reading, Mass., Hu, T. C. Integer Programming and Network Flows. Addison-Wesley, Reading, Mass., IRI, M. On an extension of the maximum-flow minimum-cut theorem to multicommodity flows. J. Oper. Res. SOC. Japan 5,4 (Dec. 1967), KARMARKAR, N. A new polynomial time algorithm for linear programming. Combinatorics 4, 4 (1984), KENNINGTON, J. L., AND HELGASON, R. V. Algorithms for Network Programming. Wiley, New York, MATSUMOTO, K., NISHIZEKI, T., AND SAITO, N. Planar multicommodity flows, maximum matchings and negative cycles. SIAM J. Comput. 15,2 (May 1986), MATULA, D. W. Concurrent flow and concurrent connectivity in graphs. In Graph Theory and Its Applications to Algorithms and Computer Science, Alavi, Y., Chartrand, G., Lesniak, L., Lick, D., and Wall, C. E., eds. Wiley, New York, 1985, pp MATULA, D. W. Divisive vs. agglomerative average linkage hierarchical clustering. In Classification as a Tool of Research. Gaul, W., and Schader, M., eds. North-Holland, Amsterdam, 1986, pp OKAMURA, H., AND SEMOUR, P. D. Multicommodity flows in planar graphs. J. Comput. Theory, Ser. B 31 (1981), ONAGA, K. A multicommodity flow theorem. Trans. ZECE, Japan, 53-A, 7 (1970), PAPADIMITRIOU, H., AND STIEGLITZ, K. Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall, Englewood Cliffs, N.J., PATTY, B. W. The basis suppression method for linear programs with special structure excluded by an objective side column. Ph.D. dissertation, Dept. of Operations Research and Engineering Management. Southern Methodist Univ., Dallas, Tex., SHAHROKHI, F. Approximation algorithms for the maximum concurrent flow problem. ORSA J. Comput. 1, 2 (1989), SHAHROKHI, F., AND MATULA, D. W. On solving large maximum concurrent flow problems. In Proceedings of the ACM Computer Conference. ACM, New York, 1987, TANG, D. T. Bi-path networks and multicommodity flows. IEEE Trans. Circuit Theory CT-1 1 (1964), TARDOS, E. A strongly polynomial algorithm to solve combinatorial linear programs. J. Oper. Res. 34 (1986), TARJAN, R. E. Data Structures and Network Algorithms. Society for Industrial and Applied Mathematics, Philadelphia, Pa., THOMPSON, B., AND MATULA, D. W. A flow rerouting algorithm for the maximum concurrent flow problem with variable capacities and demands, and its applications to cluster analysis. Tech. Rep. 86-CSE-12. Dept. of Computer Science and Engineering. Southern Methodist Univ., RECEIVED MARCH 1987; REVISED FEBRUARY 1988 AND APRIL 1989; ACCEPTED JUNE 1989 Journal of the Association for Computing Machinery, Vol. 37, No. 2, April 1990
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationNan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
More informationDetermination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
More informationCycles in a Graph Whose Lengths Differ by One or Two
Cycles in a Graph Whose Lengths Differ by One or Two J. A. Bondy 1 and A. Vince 2 1 LABORATOIRE DE MATHÉMATIQUES DISCRÉTES UNIVERSITÉ CLAUDE-BERNARD LYON 1 69622 VILLEURBANNE, FRANCE 2 DEPARTMENT OF MATHEMATICS
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More informationARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.
A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More information1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
More informationLabeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
More informationDefinition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationOn Integer Additive Set-Indexers of Graphs
On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationA simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
More informationLarge induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
More informationCS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
More informationStationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
More informationA Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
More informationOn the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationLinear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
More informationMathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
More informationEvery tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
More informationPh.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
More informationFinding and counting given length cycles
Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected
More informationFIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS
Journal of the Operations Research Society of Japan Vol. 45, No. 3, September 2002 2002 The Operations Research Society of Japan FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME
More informationBicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
More informationMean Ramsey-Turán numbers
Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average
More informationA simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
More informationAll trees contain a large induced subgraph having all degrees 1 (mod k)
All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New
More informationAdaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
More informationA Sublinear Bipartiteness Tester for Bounded Degree Graphs
A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite
More informationHigh degree graphs contain large-star factors
High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
More informationAnalysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
More information24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
More informationNo: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
More informationBest Monotone Degree Bounds for Various Graph Parameters
Best Monotone Degree Bounds for Various Graph Parameters D. Bauer Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 S. L. Hakimi Department of Electrical and Computer
More informationSemi-Matchings for Bipartite Graphs and Load Balancing
Semi-Matchings for Bipartite Graphs and Load Balancing Nicholas J. A. Harvey Richard E. Ladner László Lovász Tami Tamir Abstract We consider the problem of fairly matching the left-hand vertices of a bipartite
More informationA REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
More informationBreaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
More informationCOMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
More informationEnergy Benefit of Network Coding for Multiple Unicast in Wireless Networks
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationThe Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/
The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Theory vs. Practice In theory, there is no difference between theory and practice.
More informationON INDUCED SUBGRAPHS WITH ALL DEGREES ODD. 1. Introduction
ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD A.D. SCOTT Abstract. Gallai proved that the vertex set of any graph can be partitioned into two sets, each inducing a subgraph with all degrees even. We prove
More informationA Turán Type Problem Concerning the Powers of the Degrees of a Graph
A Turán Type Problem Concerning the Powers of the Degrees of a Graph Yair Caro and Raphael Yuster Department of Mathematics University of Haifa-ORANIM, Tivon 36006, Israel. AMS Subject Classification:
More informationGraph Classification and Easy Reliability Polynomials
Mathematical Assoc. of America American Mathematical Monthly 121:1 November 18, 2014 1:11 a.m. AMM.tex page 1 Graph Classification and Easy Reliability Polynomials Pablo Romero and Gerardo Rubino Abstract.
More informationDuplicating and its Applications in Batch Scheduling
Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China
More information4.6 Linear Programming duality
4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal
More informationMATHEMATICAL ENGINEERING TECHNICAL REPORTS. An Improved Approximation Algorithm for the Traveling Tournament Problem
MATHEMATICAL ENGINEERING TECHNICAL REPORTS An Improved Approximation Algorithm for the Traveling Tournament Problem Daisuke YAMAGUCHI, Shinji IMAHORI, Ryuhei MIYASHIRO, Tomomi MATSUI METR 2009 42 September
More informationDegree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
More informationProximal mapping via network optimization
L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationCompetitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
More informationStiffie's On Line Scheduling Algorithm
A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical
More informationDATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
More informationGraphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More informationThe Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
More information1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA tsrinivasku@gmail.com
A New Allgoriitthm for Miiniimum Costt Liinkiing M. Sreenivas Alluri Institute of Management Sciences Hanamkonda 506001, AP, INDIA allurimaster@gmail.com Dr. T. Srinivas Department of Mathematics Kakatiya
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationIRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible
More informationIrreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients
DOI: 10.2478/auom-2014-0007 An. Şt. Univ. Ovidius Constanţa Vol. 221),2014, 73 84 Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients Anca
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationHow To Find An Optimal Search Protocol For An Oblivious Cell
The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,
More informationA Study of Sufficient Conditions for Hamiltonian Cycles
DeLeon 1 A Study of Sufficient Conditions for Hamiltonian Cycles Melissa DeLeon Department of Mathematics and Computer Science Seton Hall University South Orange, New Jersey 07079, U.S.A. ABSTRACT A graph
More informationModern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More information[2], [3], which realize a time bound of O(n. e(c + 1)).
SIAM J. COMPUT. Vol. 4, No. 1, March 1975 FINDING ALL THE ELEMENTARY CIRCUITS OF A DIRECTED GRAPH* DONALD B. JOHNSON Abstract. An algorithm is presented which finds all the elementary circuits-of a directed
More informationFactoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
More informationDuality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
More informationA Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,
More informationSteiner Tree Approximation via IRR. Randomized Rounding
Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related
More informationGraphical degree sequences and realizations
swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös
More informationCOUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics
More informationSmall Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
More informationMinimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling
6.854 Advanced Algorithms Lecture 16: 10/11/2006 Lecturer: David Karger Scribe: Kermin Fleming and Chris Crutchfield, based on notes by Wendy Chu and Tudor Leu Minimum cost maximum flow, Minimum cost circulation,
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationOn the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
More informationThe Characteristic Polynomial
Physics 116A Winter 2011 The Characteristic Polynomial 1 Coefficients of the characteristic polynomial Consider the eigenvalue problem for an n n matrix A, A v = λ v, v 0 (1) The solution to this problem
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationTHE SCHEDULING OF MAINTENANCE SERVICE
THE SCHEDULING OF MAINTENANCE SERVICE Shoshana Anily Celia A. Glass Refael Hassin Abstract We study a discrete problem of scheduling activities of several types under the constraint that at most a single
More informationCMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
More informationOptimal Bandwidth Reservation in Hose-Model VPNs with Multi-Path Routing
Optimal Bandwidth Reservation in Hose-Model VPNs with -Path Routing Thomas Erlebach Computer Engineering and Networks Laboratory (TIK) Dept. of Information Technology and Electrical Engineering ETH Zürich,
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More information4. Expanding dynamical systems
4.1. Metric definition. 4. Expanding dynamical systems Definition 4.1. Let X be a compact metric space. A map f : X X is said to be expanding if there exist ɛ > 0 and L > 1 such that d(f(x), f(y)) Ld(x,
More informationIE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
More informationBy choosing to view this document, you agree to all provisions of the copyright laws protecting it.
This material is posted here with permission of the IEEE Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services Internal
More informationRouting in Line Planning for Public Transport
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARC E. PFETSCH RALF BORNDÖRFER Routing in Line Planning for Public Transport Supported by the DFG Research
More informationDiversity Coloring for Distributed Data Storage in Networks 1
Diversity Coloring for Distributed Data Storage in Networks 1 Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Pasadena, CA 9115, U.S.A. {jax, bruck}@paradise.caltech.edu Abstract
More information