The best known algorithm that computes a minimum weight matching is due to Vaidya [6]; its running time is bounded by O(n 5=2 (log n) 4 ) if d = 2, an

Similar documents
Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, Chapter 7: Digraphs

Triangle deletion. Ernie Croot. February 3, 2010

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

On the k-path cover problem for cacti

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

Best Monotone Degree Bounds for Various Graph Parameters

Class One: Degree Sequences

8.1 Min Degree Spanning Tree

The Goldberg Rao Algorithm for the Maximum Flow Problem

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

A Note on Maximum Independent Sets in Rectangle Intersection Graphs

Cycles in a Graph Whose Lengths Differ by One or Two

Single machine parallel batch scheduling with unbounded capacity

SCORE SETS IN ORIENTED GRAPHS

Shortcut sets for plane Euclidean networks (Extended abstract) 1

Solving Geometric Problems with the Rotating Calipers *

Analysis of Algorithms, I

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Midterm Practice Problems

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Rising Rates in Random institute (R&I)

Mathematics Course 111: Algebra I Part IV: Vector Spaces

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

The Open University s repository of research publications and other research outputs

arxiv: v1 [math.co] 7 Mar 2012

Cycles and clique-minors in expanders

Full and Complete Binary Trees

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy

Connectivity and cuts

1. Prove that the empty set is a subset of every set.

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. An Improved Approximation Algorithm for the Traveling Tournament Problem

NP-Hardness Results Related to PPAD

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

Graphical degree sequences and realizations

All trees contain a large induced subgraph having all degrees 1 (mod k)

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

Every tree contains a large induced subgraph with all degrees odd

2.3 Convex Constrained Optimization Problems

x 2 f 2 e 1 e 4 e 3 e 2 q f 4 x 4 f 3 x 3

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

Lecture 22: November 10

About the inverse football pool problem for 9 games 1

Finding and counting given length cycles

Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity.

An inequality for the group chromatic number of a graph

GRAPH THEORY LECTURE 4: TREES

Shortest Inspection-Path. Queries in Simple Polygons

High degree graphs contain large-star factors

ON THE COMPLEXITY OF THE GAME OF SET.

Mean Ramsey-Turán numbers

A Turán Type Problem Concerning the Powers of the Degrees of a Graph

Removing Even Crossings

GREATEST COMMON DIVISOR

Tenacity and rupture degree of permutation graphs of complete bipartite graphs

Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes

Connected Identifying Codes for Sensor Network Monitoring

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

A 2-factor in which each cycle has long length in claw-free graphs

Degree Hypergroupoids Associated with Hypergraphs

Local search for the minimum label spanning tree problem with bounded color classes

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Binary Space Partitions

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs

Cycle transversals in bounded degree graphs

Exponential time algorithms for graph coloring

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov

SYSTEMS OF PYTHAGOREAN TRIPLES. Acknowledgements. I would like to thank Professor Laura Schueller for advising and guiding me

CMPSCI611: Approximating MAX-CUT Lecture 20

Examination paper for MA0301 Elementær diskret matematikk

24. The Branch and Bound Method

The positive minimum degree game on sparse graphs

Generalized Induced Factor Problems

Approximating Average Distortion of Embeddings into Line

On the independence number of graphs with maximum degree 3

3. Linear Programming and Polyhedral Combinatorics

Solutions to Homework 6

2.1 Complexity Classes

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Frans J.C.T. de Ruiter, Norman L. Biggs Applications of integer programming methods to cages

Graphs without proper subgraphs of minimum degree 3 and short cycles

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs

Estimating the Average Value of a Function

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

On the crossing number of K m,n

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

Duplicating and its Applications in Batch Scheduling

Extremal Wiener Index of Trees with All Degrees Odd

Determination of the normalization level of database schemas through equivalence classes of attributes

A simple criterion on degree sequences of graphs

Discrete Mathematics Problems

Transcription:

A lower bound for approximating the geometric minimum weight matching Gautam Das Michiel Smid y January 6, 1999 Abstract Given a set S of 2n points in R d, a perfect matching of S is a set of n edges such that each point of S is a vertex of exactly one edge. The weight of a perfect matching is the sum of the Euclidean lengths of all edges. Rao and Smith have recently shown that there is a constant r > 1, that only depends on the dimension d, such that a perfect matching whose weight is less than or equal to r times the weight of a minimum weight perfect matching can be computed in O(n log n) time. We show that this algorithm is optimal in the algebraic computation tree model. Keywords: Minimum weight matching, lower bounds, computational geometry. 1 Introduction Let S be a set of 2n points in R d, where d 1 is a (small) constant. We consider sets of edges having the points of S as vertices. Such a set M is called a perfect matching of S, if each point of S is a vertex of exactly one edge in M. In other words, a perfect matching is a partition of S into n subsets of size two. The weight wt(m) of a perfect matching M is dened as the sum of the Euclidean lengths of all edges in M. The minimum weight matching MWM (S) of S is the perfect matching of S that has minimum weight. Department of Mathematical Sciences, The University of Memphis, Memphis, TN 38152, USA. E-mail: dasg@msci.memphis.edu. y Department of Computer Science, University of Magdeburg, D-39106 Magdeburg, Germany. E-mail: michiel@isg.cs.uni-magdeburg.de. 1

The best known algorithm that computes a minimum weight matching is due to Vaidya [6]; its running time is bounded by O(n 5=2 (log n) 4 ) if d = 2, and O(n 3?1=cd ) if d > 2, for some constant c > 1. Rao and Smith [5] considered the easier problem of approximating the minimum weight matching. Let r > 1 be a real number. A perfect matching M of S is called an r-approximate MWM, if wt(m) r wt(mwm (S)). Rao and Smith have shown that an r-approximate MWM, for r = c exp(8 2 1?1=(d?1)p d) where c is a constant, can be computed in O(n log n) time. In this paper, we will show that Rao and Smith's algorithm is optimal in the algebraic computation tree model. That is, we will prove the following theorem. Theorem 1 Let d 1 be an integer. Every algebraic computation tree algorithm that, when given a set of 2n points in R d and a real number r > 1, computes an r-approximate MWM, has worst-case running time (n log n). Note that this lower bound even holds for dimension d = 1. Moreover, it holds for any approximation factor r, even one that depends on n. For example, computing a 2 2n -approximate MWM has worst-case running time (n log n). Our proof of Theorem 1 uses Ben-Or's theorem [1]. The proof technique that we use is related to those used in Chen, Das and Smid [2], and Das, Kapoor and Smid [3]. 2 The proof of Theorem 1 In this section, we prove Theorem 1 for the case when d = 1. Clearly, this implies an (n log n) lower bound for any dimension d 1. We assume that the reader is familiar with the algebraic computation tree model. (See Ben-Or [1], and Preparata and Shamos [4].) Our lower bound will use the following well known result. Theorem 2 (Ben-Or [1]) Let V be any set in R n and let B be any algorithm that belongs to the algebraic computation tree model and that accepts V. Let #V denote the number of connected components of V. Then the worst-case running time of B is (log #V? n). 2

Let A be an arbitrary algebraic computation tree algorithm that, when given as input a sequence of 2n real numbers x 1 ; x 2 ; : : : ; x 2n and a real number r > 1, computes an r-approximate MWM for the x i 's. We will use Theorem 2 to prove that A has worst-case running time (n log n). Note that algorithm A solves a computation problem. In order to apply Theorem 2, we need a decision problem, i.e., a problem having values YES and NO. Below, we will dene such a decision problem; in fact, we will dene the corresponding subset V R 2n of YES-inputs. Fix the integer n and the real number r > 1. We dene an algorithm B that takes as input any sequence of 2n real numbers. On input sequence x 1 ; x 2 ; : : : ; x 2n, algorithm B does the following. Step 1. Check if x i = i, for all i, 1 i n. If not, output NO, and terminate. Otherwise, go to Step 2. Step 2. Let := 1=(2rn). Run algorithm A on the input x 1 ; x 2 ; : : : ; x 2n ; r. Let M be the r-approximate MWM that is computed by A. Check if all edges of M have length. If so, output YES. Otherwise, output NO. Let T A (n) and T B (n) denote the worst-case running times of algorithms A and B, respectively. Then, it is clear that T B (n) T A (n) + cn; for some constant c. Therefore, if we can show that T B (n) = (n log n), then it follows immediately T A (n) = (n log n). Let V be the set of all points (x 1 ; x 2 ; : : : ; x 2n ) in R 2n that are accepted by algorithm B. We will show that V has at least n! connected components. As a result, Theorem 2 implies the (n log n) lower bound on the running time of B. Lemma 1 Let be any permutation of 1; 2; : : : ; n, and let = 1=(2rn). Then the point is contained in the set V. P := (1; 2; : : : ; n; (1) + ; (2) + ; : : : ; (n) + ) Proof. Let M be the MWM of the elements 1; 2; : : : ; n; (1) + ; (2) + ; : : : ; (n) +. Since 0 < < 1=2, it is easy to see that M consists of the edges (i; i + ), 1 i n. 3

Consider what happens when algorithm B is run on input P. Clearly, this input \survives" Step 1. Let M be the r-approximate MWM that is computed in Step 2. We will show below that M = M. Having proved this, it follows that algorithm B accepts the input P, i.e., P 2 V. Suppose that M 6= M. Then M contains an edge of the form (i; j), (i; j + ), or (i + ; j + ), for some integers i and j, i 6= j. (We consider edges to be undirected.) Since 0 < < 1=2, it follows that this edge and, hence, also the matching M, has weight more than 1=2. Clearly, the optimal matching M has weight n = 1=(2r). Therefore, wt(m) > 1=2 = r wt(m ). This is a contradiction, because M is an r-approximate MWM. Lemma 2 The set V has at least n! connected components. Proof. Let and be two dierent permutations of 1; 2; : : : ; n. Consider the points and P := (1; 2; : : : ; n; (1) + ; (2) + ; : : : ; (n) + ) R := (1; 2; : : : ; n; (1) + ; (2) + ; : : : ; (n) + ): in R 2n. By Lemma 1, both these points are contained in the set V. We will show that they are in dierent connected components of V. Let C be an arbitrary curve in R 2n that connects P and R. Since and are distinct permutations, there are indices i and j such that (i) < (j) and (i) > (j). Hence, the curve C contains a point Q, Q = (p 1 ; p 2 ; : : : ; p n ; q 1 ; q 2 ; : : : ; q n ); such that q i = q j. We claim that Q is not contained in V. This will prove that P and R are in dierent connected components of V. To prove the claim, rst assume that there is an index k, 1 k n, such that p k 6= k. Then point Q is rejected by algorithm B and, therefore, Q 62 V. Hence, we may assume that Q = (1; 2; : : : ; n; q 1 ; q 2 ; : : : ; q n ): Let us see what happens if we run algorithm B on input Q. This input \survives" Step 1. Let M be the r-approximate MWM that is constructed in Step 2. If M contains an edge of the form (p k ; p`) = (k; `), then algorithm B rejects point Q, because such an edge has length more than. Hence, we may assume that each edge of M has the form (p k ; q`) = (k; q`). Let a and b be the integers, 1 a; b n, such that (a; q i ) and (b; q j ) are edges of M. Since (i) a and b are distinct integers, (ii) q i = q j, and (iii) 0 < < 1=2, one of these two edges must have length more than. Hence, algorithm B rejects point Q. This completes the proof. 4

References [1] M. Ben-Or. Lower bounds for algebraic computation trees. In Proc. 15th Annu. ACM Sympos. Theory Comput., pages 80{86, 1983. [2] D. Z. Chen, G. Das, and M. Smid. Lower bounds for computing geometric spanners and approximate shortest paths. In Proc. 8th Canad. Conf. Comput. Geom., pages 155{160, 1996. [3] G. Das, S. Kapoor, and M. Smid. On the complexity of approximating Euclidean traveling salesman tours and minimum spanning trees. Algorithmica, 19:447{460, 1997. [4] F. P. Preparata and M. I. Shamos. Computational Geometry: An Introduction. Springer-Verlag, New York, NY, 1985. [5] S. B. Rao and W. D. Smith. Approximating geometrical graphs via \spanners" and \banyans". In Proc. 30th Annu. ACM Sympos. Theory Comput., pages 540{550, 1998. [6] P. M. Vaidya. Geometry helps in matching. SIAM J. Comput., 18:1201{ 1225, 1989. 5