-
The Bidirected Cut Relaxation for Steiner Tree has Integrality Gap Smaller than 2
Authors:
Jarosław Byrka,
Fabrizio Grandoni,
Vera Traub
Abstract:
The Steiner tree problem is one of the most prominent problems in network design. Given an edge-weighted undirected graph and a subset of the vertices, called terminals, the task is to compute a minimum-weight tree containing all terminals (and possibly further vertices). The best-known approximation algorithms for Steiner tree involve enumeration of a (polynomial but) very large number of candida…
▽ More
The Steiner tree problem is one of the most prominent problems in network design. Given an edge-weighted undirected graph and a subset of the vertices, called terminals, the task is to compute a minimum-weight tree containing all terminals (and possibly further vertices). The best-known approximation algorithms for Steiner tree involve enumeration of a (polynomial but) very large number of candidate components and are therefore slow in practice.
A promising ingredient for the design of fast and accurate approximation algorithms for Steiner tree is the bidirected cut relaxation (BCR): bidirect all edges, choose an arbitrary terminal as a root, and enforce that each cut containing some terminal but not the root has one unit of fractional edges leaving it. BCR is known to be integral in the spanning tree case [Edmonds'67], i.e., when all the vertices are terminals. For general instances, however, it was not even known whether the integrality gap of BCR is better than the integrality gap of the natural undirected relaxation, which is exactly 2. We resolve this question by proving an upper bound of 1.9988 on the integrality gap of BCR.
△ Less
Submitted 8 August, 2024; v1 submitted 29 July, 2024;
originally announced July 2024.
-
Unsplittable Flow on a Short Path
Authors:
Ilan Doron-Arad,
Fabrizio Grandoni,
Ariel Kulik
Abstract:
In the Unsplittable Flow on a Path problem UFP, we are given a path graph with edge capacities and a collection of tasks. Each task is characterized by a demand, a profit, and a subpath. Our goal is to select a maximum profit subset of tasks such that the total demand of the selected tasks that use each edge $e$ is at most the capacity of $e$. Bag-UFP is the generalization of UFP where tasks are p…
▽ More
In the Unsplittable Flow on a Path problem UFP, we are given a path graph with edge capacities and a collection of tasks. Each task is characterized by a demand, a profit, and a subpath. Our goal is to select a maximum profit subset of tasks such that the total demand of the selected tasks that use each edge $e$ is at most the capacity of $e$. Bag-UFP is the generalization of UFP where tasks are partitioned into bags, and we are allowed to select at most one task per bag. UFP admits a PTAS [Grandoni,M{ö}mke,Wiese'22] but not an EPTAS [Wiese'17]. Bag-UFP is APX-hard [Spieksma'99] and the current best approximation is $O(\log n/\log\log n)$ [Grandoni,Ingala,Uniyal'15], where $n$ is the number of tasks.
In this paper, we study the mentioned two problems when parameterized by the number $m$ of edges in the graph, with the goal of designing faster parameterized approximation algorithms. We present a parameterized EPTAS for Bag-UFP, and a substantially faster parameterized EPTAS for UFP (which is an FPTAS for $m=O(1)$). We also show that a parameterized FPTAS for UFP (hence for BagUFP) does not exist, therefore our results are qualitatively tight.
△ Less
Submitted 14 July, 2024;
originally announced July 2024.
-
Approximating the Maximum Independent Set of Convex Polygons with a Bounded Number of Directions
Authors:
Fabrizio Grandoni,
Edin Husić,
Mathieu Mari,
Antoine Tinguely
Abstract:
In the maximum independent set of convex polygons problem, we are given a set of $n$ convex polygons in the plane with the objective of selecting a maximum cardinality subset of non-overlapping polygons. Here we study a special case of the problem where the edges of the polygons can take at most $d$ fixed directions. We present an $8d/3$-approximation algorithm for this problem running in time…
▽ More
In the maximum independent set of convex polygons problem, we are given a set of $n$ convex polygons in the plane with the objective of selecting a maximum cardinality subset of non-overlapping polygons. Here we study a special case of the problem where the edges of the polygons can take at most $d$ fixed directions. We present an $8d/3$-approximation algorithm for this problem running in time $O((nd)^{O(d4^d)})$. The previous-best polynomial-time approximation (for constant $d$) was a classical $n^\varepsilon$ approximation by Fox and Pach [SODA'11] that has recently been improved to a $OPT^{\varepsilon}$-approximation algorithm by Cslovjecsek, Pilipczuk and Węgrzycki [SODA '24], which also extends to an arbitrary set of convex polygons. Our result builds on, and generalizes the recent constant factor approximation algorithms for the maximum independent set of axis-parallel rectangles problem (which is a special case of our problem with $d=2$) by Mitchell [FOCS'21] and Gálvez, Khan, Mari, Mömke, Reddy, and Wiese [SODA'22].
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
A PTAS for Triangle-Free 2-Matching
Authors:
Miguel Bosch-Calvo,
Fabrizio Grandoni,
Afrouz Jabal Ameli
Abstract:
In the Triangle-Free (Simple) 2-Matching problem we are given an undirected graph $G=(V,E)$. Our goal is to compute a maximum-cardinality $M\subseteq E$ satisfying the following properties: (1) at most two edges of $M$ are incident on each node (i.e., $M$ is a 2-matching) and (2) $M$ does not induce any triangle. In his Ph.D. thesis from 1984, Harvitgsen presents a complex polynomial-time algorith…
▽ More
In the Triangle-Free (Simple) 2-Matching problem we are given an undirected graph $G=(V,E)$. Our goal is to compute a maximum-cardinality $M\subseteq E$ satisfying the following properties: (1) at most two edges of $M$ are incident on each node (i.e., $M$ is a 2-matching) and (2) $M$ does not induce any triangle. In his Ph.D. thesis from 1984, Harvitgsen presents a complex polynomial-time algorithm for this problem, with a very complex analysis. This result was never published in a journal nor reproved in a different way, to the best of our knowledge.
In this paper we have a fresh look at this problem and present a simple PTAS for it based on local search. Our PTAS exploits the fact that, as long as the current solution is far enough from the optimum, there exists a short augmenting trail (similar to the maximum matching case).
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
A $4/3$ Approximation for $2$-Vertex-Connectivity
Authors:
Miguel Bosch-Calvo,
Fabrizio Grandoni,
Afrouz Jabal Ameli
Abstract:
The 2-Vertex-Connected Spanning Subgraph problem (2VCSS) is among the most basic NP-hard (Survivable) Network Design problems: we are given an (unweighted) undirected graph $G$. Our goal is to find a subgraph $S$ of $G$ with the minimum number of edges which is $2$-vertex-connected, namely $S$ remains connected after the deletion of an arbitrary node. 2VCSS is well-studied in terms of approximatio…
▽ More
The 2-Vertex-Connected Spanning Subgraph problem (2VCSS) is among the most basic NP-hard (Survivable) Network Design problems: we are given an (unweighted) undirected graph $G$. Our goal is to find a subgraph $S$ of $G$ with the minimum number of edges which is $2$-vertex-connected, namely $S$ remains connected after the deletion of an arbitrary node. 2VCSS is well-studied in terms of approximation algorithms, and the current best (polynomial-time) approximation factor is $10/7$ by Heeger and Vygen [SIDMA'17] (improving on earlier results by Khuller and Vishkin [STOC'92] and Garg, Vempala and Singla [SODA'93]).
△ Less
Submitted 19 December, 2023; v1 submitted 3 May, 2023;
originally announced May 2023.
-
An O(loglog n)-Approximation for Submodular Facility Location
Authors:
Fateme Abbasi,
Marek Adamczyk,
Miguel Bosch-Calvo,
Jarosław Byrka,
Fabrizio Grandoni,
Krzysztof Sornat,
Antoine Tinguely
Abstract:
In the Submodular Facility Location problem (SFL) we are given a collection of $n$ clients and $m$ facilities in a metric space. A feasible solution consists of an assignment of each client to some facility. For each client, one has to pay the distance to the associated facility. Furthermore, for each facility $f$ to which we assign the subset of clients $S^f$, one has to pay the opening cost…
▽ More
In the Submodular Facility Location problem (SFL) we are given a collection of $n$ clients and $m$ facilities in a metric space. A feasible solution consists of an assignment of each client to some facility. For each client, one has to pay the distance to the associated facility. Furthermore, for each facility $f$ to which we assign the subset of clients $S^f$, one has to pay the opening cost $g(S^f)$, where $g(\cdot)$ is a monotone submodular function with $g(\emptyset)=0$.
SFL is APX-hard since it includes the classical (metric uncapacitated) Facility Location problem (with uniform facility costs) as a special case. Svitkina and Tardos [SODA'06] gave the current-best $O(\log n)$ approximation algorithm for SFL. The same authors pose the open problem whether SFL admits a constant approximation and provide such an approximation for a very restricted special case of the problem.
We make some progress towards the solution of the above open problem by presenting an $O(\log\log n)$ approximation. Our approach is rather flexible and can be easily extended to generalizations and variants of SFL. In more detail, we achieve the same approximation factor for the practically relevant generalizations of SFL where the opening cost of each facility $f$ is of the form $p_f+g(S^f)$ or $w_f\cdot g(S^f)$, where $p_f,w_f \geq 0$ are input values.
We also obtain an improved approximation algorithm for the related Universal Stochastic Facility Location problem. In this problem one is given a classical (metric) facility location instance and has to a priori assign each client to some facility. Then a subset of active clients is sampled from some given distribution, and one has to pay (a posteriori) only the connection and opening costs induced by the active clients. The expected opening cost of each facility $f$ can be modelled with a submodular function of the set of clients assigned to $f$.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Improved Approximation for Two-Edge-Connectivity
Authors:
Mohit Garg,
Fabrizio Grandoni,
Afrouz Jabal Ameli
Abstract:
The basic goal of survivable network design is to construct low-cost networks which preserve a sufficient level of connectivity despite the failure or removal of a few nodes or edges. One of the most basic problems in this area is the $2$-Edge-Connected Spanning Subgraph problem (2-ECSS): given an undirected graph $G$, find a $2$-edge-connected spanning subgraph $H$ of $G$ with the minimum number…
▽ More
The basic goal of survivable network design is to construct low-cost networks which preserve a sufficient level of connectivity despite the failure or removal of a few nodes or edges. One of the most basic problems in this area is the $2$-Edge-Connected Spanning Subgraph problem (2-ECSS): given an undirected graph $G$, find a $2$-edge-connected spanning subgraph $H$ of $G$ with the minimum number of edges (in particular, $H$ remains connected after the removal of one arbitrary edge).
2-ECSS is NP-hard and the best-known (polynomial-time) approximation factor for this problem is $4/3$. Interestingly, this factor was achieved with drastically different techniques by [Hunkenschr{ö}der, Vempala and Vetta '00,'19] and [Seb{ö} and Vygen, '14]. In this paper we present an improved $\frac{118}{89}+ε<1.326$ approximation for 2-ECSS.
The key ingredient in our approach (which might also be helpful in future work) is a reduction to a special type of structured graphs: our reduction preserves approximation factors up to $6/5$. While reducing to 2-vertex-connected graphs is trivial (and heavily used in prior work), our structured graphs are "almost" 3-vertex-connected: more precisely, given any 2-vertex-cut $\{u,v\}$ of a structured graph $G=(V,E)$, $G[V\setminus \{u,v\}]$ has exactly 2 connected components, one of which contains exactly one node of degree $2$ in $G$.
△ Less
Submitted 12 November, 2022; v1 submitted 21 September, 2022;
originally announced September 2022.
-
Unsplittable Euclidean Capacitated Vehicle Routing: A $(2+ε)$-Approximation Algorithm
Authors:
Fabrizio Grandoni,
Claire Mathieu,
Hang Zhou
Abstract:
In the unsplittable capacitated vehicle routing problem, we are given a metric space with a vertex called depot and a set of vertices called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the depot such that the demand of each terminal is covered by a single tour (i.e., the demand cannot…
▽ More
In the unsplittable capacitated vehicle routing problem, we are given a metric space with a vertex called depot and a set of vertices called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the depot such that the demand of each terminal is covered by a single tour (i.e., the demand cannot be split), and the total demand of the terminals in each tour does not exceed the capacity of 1.
Our main result is a polynomial-time $(2+ε)$-approximation algorithm for this problem in the two-dimensional Euclidean plane, i.e., for the special case where the terminals and the depot are associated with points in the Euclidean plane and their distances are defined accordingly. This improves on recent work by Blauth, Traub, and Vygen [IPCO'21] and Friggstad, Mousavi, Rahgoshay, and Salavatipour [IPCO'22].
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Breaching the 2 LMP Approximation Barrier for Facility Location with Applications to k-Median
Authors:
Vincent Cohen-Addad,
Fabrizio Grandoni,
Euiwoong Lee,
Chris Schwiegelshohn
Abstract:
The Uncapacitated Facility Location (UFL) problem is one of the most fundamental clustering problems: Given a set of clients $C$ and a set of facilities $F$ in a metric space $(C \cup F, dist)$ with facility costs $open : F \to \mathbb{R}^+$, the goal is to find a set of facilities $S \subseteq F$ to minimize the sum of the opening cost $open(S)$ and the connection cost…
▽ More
The Uncapacitated Facility Location (UFL) problem is one of the most fundamental clustering problems: Given a set of clients $C$ and a set of facilities $F$ in a metric space $(C \cup F, dist)$ with facility costs $open : F \to \mathbb{R}^+$, the goal is to find a set of facilities $S \subseteq F$ to minimize the sum of the opening cost $open(S)$ and the connection cost $d(S) := \sum_{p \in C} \min_{c \in S} dist(p, c)$. An algorithm for UFL is called a Lagrangian Multiplier Preserving (LMP) $α$ approximation if it outputs a solution $S\subseteq F$ satisfying $open(S) + d(S) \leq open(S^*) + αd(S^*)$ for any $S^* \subseteq F$. The best-known LMP approximation ratio for UFL is at most $2$ by the JMS algorithm of Jain, Mahdian, and Saberi based on the Dual-Fitting technique.
We present a (slightly) improved LMP approximation algorithm for UFL. This is achieved by combining the Dual-Fitting technique with Local Search, another popular technique to address clustering problems. From a conceptual viewpoint, our result gives a theoretical evidence that local search can be enhanced so as to avoid bad local optima by choosing the initial feasible solution with LP-based techniques. Using the framework of bipoint solutions, our result directly implies a (slightly) improved approximation for the $k$-Median problem from 2.6742 to 2.67059.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
Breaching the 2-Approximation Barrier for the Forest Augmentation Problem
Authors:
Fabrizio Grandoni,
Afrouz Jabal Ameli,
Vera Traub
Abstract:
The basic goal of survivable network design is to build cheap networks that guarantee the connectivity of certain pairs of nodes despite the failure of a few edges or nodes. A celebrated result by Jain [Combinatorica'01] provides a 2-approximation for a wide class of these problems. However nothing better is known even for very basic special cases, raising the natural question whether any improved…
▽ More
The basic goal of survivable network design is to build cheap networks that guarantee the connectivity of certain pairs of nodes despite the failure of a few edges or nodes. A celebrated result by Jain [Combinatorica'01] provides a 2-approximation for a wide class of these problems. However nothing better is known even for very basic special cases, raising the natural question whether any improved approximation factor is possible at all.
In this paper we address one of the most basic problems in this family for which 2 is still the best-known approximation factor, the Forest Augmentation Problem (FAP): given an undirected unweighted graph (that w.l.o.g. is a forest) and a collection of extra edges (links), compute a minimum cardinality subset of links whose addition to the graph makes it 2-edge-connected. Several better-than-2 approximation algorithms are known for the special case where the input graph is a tree, a.k.a. the Tree Augmentation Problem (TAP). Recently this was achieved also for the weighted version of TAP, and for the k-edge-connectivity generalization of TAP. These results heavily exploit the fact that the input graph is connected, a condition that does not hold in FAP.
In this paper we breach the 2-approximation barrier for FAP. Our result is based on two main ingredients. First, we describe a reduction to the Path Augmentation Problem (PAP), the special case of FAP where the input graph is a collection of disjoint paths. Our reduction is not approximation preserving, however it is sufficiently accurate to improve on a factor 2 approximation. Second, we present a better-than-2 approximation algorithm for PAP, an open problem on its own. Here we exploit a novel notion of implicit credits which might turn out to be helpful in future related work.
△ Less
Submitted 20 April, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Maintaining an EDCS in General Graphs: Simpler, Density-Sensitive and with Worst-Case Time Bounds
Authors:
Fabrizio Grandoni,
Chris Schwiegelshohn,
Shay Solomon,
Amitai Uzrad
Abstract:
In their breakthrough ICALP'15 paper, Bernstein and Stein presented an algorithm for maintaining a $(3/2+ε)$-approximate maximum matching in fully dynamic {\em bipartite} graphs with a {\em worst-case} update time of $O_ε(m^{1/4})$; we use the $O_ε$ notation to suppress the $ε$-dependence. Their main technical contribution was in presenting a new type of bounded-degree subgraph, which they named a…
▽ More
In their breakthrough ICALP'15 paper, Bernstein and Stein presented an algorithm for maintaining a $(3/2+ε)$-approximate maximum matching in fully dynamic {\em bipartite} graphs with a {\em worst-case} update time of $O_ε(m^{1/4})$; we use the $O_ε$ notation to suppress the $ε$-dependence. Their main technical contribution was in presenting a new type of bounded-degree subgraph, which they named an {\em edge degree constrained subgraph (EDCS)}, which contains a large matching -- of size that is smaller than the maximum matching size of the entire graph by at most a factor of $3/2+ε$. They demonstrate that the EDCS can be maintained with a worst-case update time of $O_ε(m^{1/4})$, and their main result follows as a direct corollary. In their followup SODA'16 paper, Bernstein and Stein generalized their result for general graphs, achieving the same update time of $O_ε(m^{1/4})$, albeit with an amortized rather than worst-case bound. To date, the best {\em deterministic} worst-case update time bound for {\em any} better-than-2 approximate matching is $O(\sqrt{m})$ [Neiman and Solomon, STOC'13], [Gupta and Peng, FOCS'13]; allowing randomization (against an oblivious adversary) one can achieve a much better (still polynomial) update time for approximation slightly below 2 [Behnezhad, Lacki and Mirrokni, SODA'20].
In this work we\footnote{\em quasi nanos, gigantium humeris insidentes} simplify the approach of Bernstein and Stein for bipartite graphs, which allows us to generalize it for general graphs while maintaining the same bound of $O_ε(m^{1/4})$ on the {\em worst-case} update time. Moreover, our approach is {\em density-sensitive}: If the {\em arboricity} of the dynamic graph is bounded by $α$ at all times, then the worst-case update time of the algorithm is $O_ε(\sqrtα)$.
△ Less
Submitted 19 August, 2021;
originally announced August 2021.
-
A Refined Approximation for Euclidean k-Means
Authors:
Fabrizio Grandoni,
Rafail Ostrovsky,
Yuval Rabani,
Leonard J. Schulman,
Rakesh Venkat
Abstract:
In the Euclidean $k$-Means problem we are given a collection of $n$ points $D$ in an Euclidean space and a positive integer $k$. Our goal is to identify a collection of $k$ points in the same space (centers) so as to minimize the sum of the squared Euclidean distances between each point in $D$ and the closest center. This problem is known to be APX-hard and the current best approximation ratio is…
▽ More
In the Euclidean $k$-Means problem we are given a collection of $n$ points $D$ in an Euclidean space and a positive integer $k$. Our goal is to identify a collection of $k$ points in the same space (centers) so as to minimize the sum of the squared Euclidean distances between each point in $D$ and the closest center. This problem is known to be APX-hard and the current best approximation ratio is a primal-dual $6.357$ approximation based on a standard LP for the problem [Ahmadian et al. FOCS'17, SICOMP'20].
In this note we show how a minor modification of Ahmadian et al.'s analysis leads to a slightly improved $6.12903$ approximation. As a related result, we also show that the mentioned LP has integrality gap at least $\frac{16+\sqrt{5}}{15}>1.2157$.
△ Less
Submitted 20 September, 2021; v1 submitted 15 July, 2021;
originally announced July 2021.
-
Approximation Algorithms for Demand Strip Packing
Authors:
Waldo Gálvez,
Fabrizio Grandoni,
Afrouz Jabal Ameli,
Kamyar Khodamoradi
Abstract:
In the Demand Strip Packing problem (DSP), we are given a time interval and a collection of tasks, each characterized by a processing time and a demand for a given resource (such as electricity, computational power, etc.). A feasible solution consists of a schedule of the tasks within the mentioned time interval. Our goal is to minimize the peak resource consumption, i.e. the maximum total demand…
▽ More
In the Demand Strip Packing problem (DSP), we are given a time interval and a collection of tasks, each characterized by a processing time and a demand for a given resource (such as electricity, computational power, etc.). A feasible solution consists of a schedule of the tasks within the mentioned time interval. Our goal is to minimize the peak resource consumption, i.e. the maximum total demand of tasks executed at any point in time.
It is known that DSP is NP-hard to approximate below a factor 3/2, and standard techniques for related problems imply a (polynomial-time) 2-approximation. Our main result is a (5/3+eps)-approximation algorithm for any constant eps>0. We also achieve best-possible approximation factors for some relevant special cases.
△ Less
Submitted 19 May, 2021; v1 submitted 18 May, 2021;
originally announced May 2021.
-
Improved Approximation Algorithms for 2-Dimensional Knapsack: Packing into Multiple L-Shapes, Spirals, and More
Authors:
Waldo Gálvez,
Fabrizio Grandoni,
Arindam Khan,
Diego Ramírez-Romero,
Andreas Wiese
Abstract:
In the \textsc{2-Dimensional Knapsack} problem (2DK) we are given a square knapsack and a collection of $n$ rectangular items with integer sizes and profits. Our goal is to find the most profitable subset of items that can be packed non-overlappingly into the knapsack. The currently best known polynomial-time approximation factor for 2DK is $17/9+\varepsilon<1.89$ and there is a…
▽ More
In the \textsc{2-Dimensional Knapsack} problem (2DK) we are given a square knapsack and a collection of $n$ rectangular items with integer sizes and profits. Our goal is to find the most profitable subset of items that can be packed non-overlappingly into the knapsack. The currently best known polynomial-time approximation factor for 2DK is $17/9+\varepsilon<1.89$ and there is a $(3/2+\varepsilon)$-approximation algorithm if we are allowed to rotate items by 90 degrees~{[}Gálvez et al., FOCS 2017{]}. In this paper, we give $(4/3+\varepsilon)$-approximation algorithms in polynomial time for both cases, assuming that all input data are {integers polynomially bounded in $n$}.
Gálvez et al.'s algorithm for 2DK partitions the knapsack into a constant number of rectangular regions plus \emph{one} L-shaped region and packs items into those {in a structured way}. We generalize this approach by allowing up to a \emph{constant} number of {\emph{more general}} regions that can have the shape of an L, a U, a Z, a spiral, and more, and therefore obtain an improved approximation ratio. {In particular, we present an algorithm that computes the essentially optimal structured packing into these regions. }
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
Online Edge Coloring Algorithms via the Nibble Method
Authors:
Sayan Bhattacharya,
Fabrizio Grandoni,
David Wajc
Abstract:
Nearly thirty years ago, Bar-Noy, Motwani and Naor [IPL'92] conjectured that an online $(1+o(1))Δ$-edge-coloring algorithm exists for $n$-node graphs of maximum degree $Δ=ω(\log n)$. This conjecture remains open in general, though it was recently proven for bipartite graphs under \emph{one-sided vertex arrivals} by Cohen et al.~[FOCS'19]. In a similar vein, we study edge coloring under widely-stud…
▽ More
Nearly thirty years ago, Bar-Noy, Motwani and Naor [IPL'92] conjectured that an online $(1+o(1))Δ$-edge-coloring algorithm exists for $n$-node graphs of maximum degree $Δ=ω(\log n)$. This conjecture remains open in general, though it was recently proven for bipartite graphs under \emph{one-sided vertex arrivals} by Cohen et al.~[FOCS'19]. In a similar vein, we study edge coloring under widely-studied relaxations of the online model.
Our main result is in the \emph{random-order} online model. For this model, known results fall short of the Bar-Noy et al.~conjecture, either in the degree bound [Aggarwal et al.~FOCS'03], or number of colors used [Bahmani et al.~SODA'10]. We achieve the best of both worlds, thus resolving the Bar-Noy et al.~conjecture in the affirmative for this model.
Our second result is in the adversarial online (and dynamic) model with \emph{recourse}. A recent algorithm of Duan et al.~[SODA'19] yields a $(1+ε)Δ$-edge-coloring with poly$(\log n/ε)$ recourse. We achieve the same with poly$(1/ε)$ recourse, thus removing all dependence on $n$.
Underlying our results is one common offline algorithm, which we show how to implement in these two online models. Our algorithm, based on the Rödl Nibble Method, is an adaptation of the distributed algorithm of Dubhashi et al.~[TCS'98]. The Nibble Method has proven successful for distributed edge coloring. We display its usefulness in the context of online algorithms.
△ Less
Submitted 30 October, 2020;
originally announced October 2020.
-
Improved Approximation Algorithms for Stochastic-Matching Problems
Authors:
Marek Adamczyk,
Brian Brubach,
Fabrizio Grandoni,
Karthik A. Sankararaman,
Aravind Srinivasan,
Pan Xu
Abstract:
We consider the Stochastic Matching problem, which is motivated by applications in kidney exchange and online dating. In this problem, we are given an undirected graph. Each edge is assigned a known, independent probability of existence and a positive weight (or profit). We must probe an edge to discover whether or not it exists. Each node is assigned a positive integer called a timeout (or a pati…
▽ More
We consider the Stochastic Matching problem, which is motivated by applications in kidney exchange and online dating. In this problem, we are given an undirected graph. Each edge is assigned a known, independent probability of existence and a positive weight (or profit). We must probe an edge to discover whether or not it exists. Each node is assigned a positive integer called a timeout (or a patience). On this random graph we are executing a process, which probes the edges one-by-one and gradually constructs a matching. The process is constrained in two ways. First, if a probed edge exists, it must be added irrevocably to the matching (the query-commit model). Second, the timeout of a node $v$ upper-bounds the number of edges incident to $v$ that can be probed. The goal is to maximize the expected weight of the constructed matching.
For this problem, Bansal et al. (Algorithmica 2012) provided a $0.33$-approximation algorithm for bipartite graphs and a $0.25$-approximation for general graphs. We improve the approximation factors to $0.39$ and $0.269$, respectively.
The main technical ingredient in our result is a novel way of probing edges according to a not-uniformly-random permutation. Patching this method with an algorithm that works best for large-probability edges (plus additional ideas) leads to our improved approximation factors.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
All-Pairs LCA in DAGs: Breaking through the $O(n^{2.5})$ barrier
Authors:
Fabrizio Grandoni,
Giuseppe F. Italiano,
Aleksander Łukasiewicz,
Nikos Parotsidis,
Przemysław Uznański
Abstract:
Let $G=(V,E)$ be an $n$-vertex directed acyclic graph (DAG). A lowest common ancestor (LCA) of two vertices $u$ and $v$ is a common ancestor $w$ of $u$ and $v$ such that no descendant of $w$ has the same property. In this paper, we consider the problem of computing an LCA, if any, for all pairs of vertices in a DAG. The fastest known algorithms for this problem exploit fast matrix multiplication s…
▽ More
Let $G=(V,E)$ be an $n$-vertex directed acyclic graph (DAG). A lowest common ancestor (LCA) of two vertices $u$ and $v$ is a common ancestor $w$ of $u$ and $v$ such that no descendant of $w$ has the same property. In this paper, we consider the problem of computing an LCA, if any, for all pairs of vertices in a DAG. The fastest known algorithms for this problem exploit fast matrix multiplication subroutines and have running times ranging from $O(n^{2.687})$ [Bender et al.~SODA'01] down to $O(n^{2.615})$ [Kowaluk and Lingas~ICALP'05] and $O(n^{2.569})$ [Czumaj et al.~TCS'07]. Somewhat surprisingly, all those bounds would still be $Ω(n^{2.5})$ even if matrix multiplication could be solved optimally (i.e., $ω=2$). This appears to be an inherent barrier for all the currently known approaches, which raises the natural question on whether one could break through the $O(n^{2.5})$ barrier for this problem.
In this paper, we answer this question affirmatively: in particular, we present an $\tilde O(n^{2.447})$ ($\tilde O(n^{7/3})$ for $ω=2$) algorithm for finding an LCA for all pairs of vertices in a DAG, which represents the first improvement on the running times for this problem in the last 13 years. A key tool in our approach is a fast algorithm to partition the vertex set of the transitive closure of $G$ into a collection of $O(\ell)$ chains and $O(n/\ell)$ antichains, for a given parameter $\ell$. As usual, a chain is a path while an antichain is an independent set. We then find, for all pairs of vertices, a \emph{candidate} LCA among the chain and antichain vertices, separately. The first set is obtained via a reduction to min-max matrix multiplication. The computation of the second set can be reduced to Boolean matrix multiplication similarly to previous results on this problem. We finally combine the two solutions together in a careful (non-obvious) manner.
△ Less
Submitted 13 November, 2020; v1 submitted 17 July, 2020;
originally announced July 2020.
-
Breaching the 2-Approximation Barrier for Connectivity Augmentation: a Reduction to Steiner Tree
Authors:
Jarosław Byrka,
Fabrizio Grandoni,
Afrouz Jabal Ameli
Abstract:
The basic goal of survivable network design is to build a cheap network that maintains the connectivity between given sets of nodes despite the failure of a few edges/nodes. The Connectivity Augmentation Problem (CAP) is arguably one of the most basic problems in this area: given a $k$(-edge)-connected graph $G$ and a set of extra edges (links), select a minimum cardinality subset $A$ of links suc…
▽ More
The basic goal of survivable network design is to build a cheap network that maintains the connectivity between given sets of nodes despite the failure of a few edges/nodes. The Connectivity Augmentation Problem (CAP) is arguably one of the most basic problems in this area: given a $k$(-edge)-connected graph $G$ and a set of extra edges (links), select a minimum cardinality subset $A$ of links such that adding $A$ to $G$ increases its edge connectivity to $k+1$. Intuitively, one wants to make an existing network more reliable by augmenting it with extra edges. The best known approximation factor for this NP-hard problem is $2$, and this can be achieved with multiple approaches (the first such result is in [Frederickson and Jájá'81]).
It is known [Dinitz et al.'76] that CAP can be reduced to the case $k=1$, a.k.a. the Tree Augmentation Problem (TAP), for odd $k$, and to the case $k=2$, a.k.a. the Cactus Augmentation Problem (CacAP), for even $k$. Several better than $2$ approximation algorithms are known for TAP, culminating with a recent $1.458$ approximation [Grandoni et al.'18]. However, for CacAP the best known approximation is $2$.
In this paper we breach the $2$ approximation barrier for CacAP, hence for CAP, by presenting a polynomial-time $2\ln(4)-\frac{967}{1120}+ε<1.91$ approximation. Previous approaches exploit properties of TAP that do not seem to generalize to CacAP. We instead use a reduction to the Steiner tree problem which was previously used in parameterized algorithms [Basavaraju et al.'14]. This reduction is not approximation preserving, and using the current best approximation factor for Steiner tree [Byrka et al.'13] as a black-box would not be good enough to improve on $2$. To achieve the latter goal, we ``open the box'' and exploit the specific properties of the instances of Steiner tree arising from CacAP.
△ Less
Submitted 7 November, 2019; v1 submitted 6 November, 2019;
originally announced November 2019.
-
Fully Dynamic $(Δ+1)$-Coloring in Constant Update Time
Authors:
Sayan Bhattacharya,
Fabrizio Grandoni,
Janardhan Kulkarni,
Quanquan C. Liu,
Shay Solomon
Abstract:
The problem of (vertex) $(Δ+1)$-coloring a graph of maximum degree $Δ$ has been extremely well-studied over the years in various settings and models. Surprisingly, for the dynamic setting, almost nothing was known until recently. In SODA'18, Bhattacharya, Chakrabarty, Henzinger and Nanongkai devised a randomized data structure for maintaining a $(Δ+1)$-coloring with $O(\log Δ)$ expected amortized…
▽ More
The problem of (vertex) $(Δ+1)$-coloring a graph of maximum degree $Δ$ has been extremely well-studied over the years in various settings and models. Surprisingly, for the dynamic setting, almost nothing was known until recently. In SODA'18, Bhattacharya, Chakrabarty, Henzinger and Nanongkai devised a randomized data structure for maintaining a $(Δ+1)$-coloring with $O(\log Δ)$ expected amortized update time. In this paper, we present a $(Δ+1)$-coloring data structure that achieves a constant amortized update time and show that this time bound holds not only in expectation but also with high probability.
△ Less
Submitted 4 October, 2019;
originally announced October 2019.
-
Parameterized Approximation Schemes for Independent Set of Rectangles and Geometric Knapsack
Authors:
Fabrizio Grandoni,
Stefan Kratsch,
Andreas Wiese
Abstract:
The area of parameterized approximation seeks to combine approximation and parameterized algorithms to obtain, e.g., (1+eps)-approximations in f(k,eps)n^{O(1)} time where k is some parameter of the input. We obtain the following results on parameterized approximability: 1) In the maximum independent set of rectangles problem (MISR) we are given a collection of n axis parallel rectangles in the pla…
▽ More
The area of parameterized approximation seeks to combine approximation and parameterized algorithms to obtain, e.g., (1+eps)-approximations in f(k,eps)n^{O(1)} time where k is some parameter of the input. We obtain the following results on parameterized approximability: 1) In the maximum independent set of rectangles problem (MISR) we are given a collection of n axis parallel rectangles in the plane. Our goal is to select a maximum-cardinality subset of pairwise non-overlapping rectangles. This problem is NP-hard and also W[1]-hard [Marx, ESA'05]. The best-known polynomial-time approximation factor is O(loglog n) [Chalermsook and Chuzhoy, SODA'09] and it admits a QPTAS [Adamaszek and Wiese, FOCS'13; Chuzhoy and Ene, FOCS'16]. Here we present a parameterized approximation scheme (PAS) for MISR, i.e. an algorithm that, for any given constant eps>0 and integer k>0, in time f(k,eps)n^{g(eps)}, either outputs a solution of size at least k/(1+eps), or declares that the optimum solution has size less than k. 2) In the (2-dimensional) geometric knapsack problem (TDK) we are given an axis-aligned square knapsack and a collection of axis-aligned rectangles in the plane (items). Our goal is to translate a maximum cardinality subset of items into the knapsack so that the selected items do not overlap. In the version of TDK with rotations (TDKR), we are allowed to rotate items by 90 degrees. Both variants are NP-hard, and the best-known polynomial-time approximation factors are 558/325+eps and 4/3+eps, resp. [Galvez et al., FOCS'17]. These problems admit a QPTAS for polynomially bounded item sizes [Adamaszek and Wiese, SODA'15]. We show that both variants are W[1]-hard. Furthermore, we present a PAS for TDKR. For all considered problems, getting time f(k,eps)n^{O(1)}, rather than f(k,eps)n^{g(eps)}, would give FPT time f'(k)n^{O(1)} exact algorithms using eps=1/(k+1), contradicting W[1]-hardness.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
$O(\log^2k/\log\log{k})$-Approximation Algorithm for Directed Steiner Tree: A Tight Quasi-Polynomial-Time Algorithm
Authors:
Fabrizio Grandoni,
Bundit Laekhanukit,
Shi Li
Abstract:
In the Directed Steiner Tree (DST) problem we are given an $n$-vertex directed edge-weighted graph, a root $r$, and a collection of $k$ terminal nodes. Our goal is to find a minimum-cost arborescence that contains a directed path from $r$ to every terminal. We present an $O(\log^2 k/\log\log{k})$-approximation algorithm for DST that runs in quasi-polynomial-time. By adjusting the parameters in the…
▽ More
In the Directed Steiner Tree (DST) problem we are given an $n$-vertex directed edge-weighted graph, a root $r$, and a collection of $k$ terminal nodes. Our goal is to find a minimum-cost arborescence that contains a directed path from $r$ to every terminal. We present an $O(\log^2 k/\log\log{k})$-approximation algorithm for DST that runs in quasi-polynomial-time. By adjusting the parameters in the hardness result of Halperin and Krauthgamer, we show the matching lower bound of $Ω(\log^2{k}/\log\log{k})$ for the class of quasi-polynomial-time algorithms. This is the first improvement on the DST problem since the classical quasi-polynomial-time $O(\log^3 k)$ approximation algorithm by Charikar et al. (The paper erroneously claims an $O(\log^2k)$ approximation due to a mistake in prior work.)
Our approach is based on two main ingredients. First, we derive an approximation preserving reduction to the Label-Consistent Subtree (LCST) problem. The LCST instance has quasi-polynomial size and logarithmic height. We remark that, in contrast, Zelikovsky's heigh-reduction theorem used in all prior work on DST achieves a reduction to a tree instance of the related Group Steiner Tree (GST) problem of similar height, however losing a logarithmic factor in the approximation ratio. Our second ingredient is an LP-rounding algorithm to approximately solve LCST instances, which is inspired by the framework developed by Rothvoß. We consider a Sherali-Adams lifting of a proper LP relaxation of LCST. Our rounding algorithm proceeds level by level from the root to the leaves, rounding and conditioning each time on a proper subset of label variables. A small enough (namely, polylogarithmic) number of Sherali-Adams lifting levels is sufficient to condition up to the leaves.
△ Less
Submitted 7 November, 2018;
originally announced November 2018.
-
The Matching Augmentation Problem: A $\frac74$-Approximation Algorithm
Authors:
Joe Cheriyan,
Jack Dippel,
Fabrizio Grandoni,
Arindam Khan,
Vishnu V. Narayan
Abstract:
We present a $\frac74$ approximation algorithm for the matching augmentation problem (MAP): given a multi-graph with edges of cost either zero or one such that the edges of cost zero form a matching, find a 2-edge connected spanning subgraph (2-ECSS) of minimum cost.
We first present a reduction of any given MAP instance to a collection of well-structured MAP instances such that the approximatio…
▽ More
We present a $\frac74$ approximation algorithm for the matching augmentation problem (MAP): given a multi-graph with edges of cost either zero or one such that the edges of cost zero form a matching, find a 2-edge connected spanning subgraph (2-ECSS) of minimum cost.
We first present a reduction of any given MAP instance to a collection of well-structured MAP instances such that the approximation guarantee is preserved. Then we present a $\frac74$ approximation algorithm for a well-structured MAP instance. The algorithm starts with a min-cost 2-edge cover and then applies ear-augmentation steps. We analyze the cost of the ear-augmentations using an approach similar to the one proposed by Vempala and Vetta for the (unweighted) min-size 2-ECSS problem (`Factor 4/3 approximations for minimum 2-connected subgraphs,' APPROX 2000, LNCS 1913, pp.262-273).
△ Less
Submitted 4 December, 2018; v1 submitted 17 October, 2018;
originally announced October 2018.
-
Dynamic Set Cover: Improved Algorithms & Lower Bounds
Authors:
Amir Abboud,
Raghavendra Addanki,
Fabrizio Grandoni,
Debmalya Panigrahi,
Barna Saha
Abstract:
We give new upper and lower bounds for the {\em dynamic} set cover problem. First, we give a $(1+ε) f$-approximation for fully dynamic set cover in $O(f^2\log n /ε^5)$ (amortized) update time, for any $ε> 0$, where $f$ is the maximum number of sets that an element belongs to. In the decremental setting, the update time can be improved to $O(f^2/ε^5)$, while still obtaining an $(1+ε) f$-approximati…
▽ More
We give new upper and lower bounds for the {\em dynamic} set cover problem. First, we give a $(1+ε) f$-approximation for fully dynamic set cover in $O(f^2\log n /ε^5)$ (amortized) update time, for any $ε> 0$, where $f$ is the maximum number of sets that an element belongs to. In the decremental setting, the update time can be improved to $O(f^2/ε^5)$, while still obtaining an $(1+ε) f$-approximation. These are the first algorithms that obtain an approximation factor linear in $f$ for dynamic set cover, thereby almost matching the best bounds known in the offline setting and improving upon the previous best approximation of $O(f^2)$ in the dynamic setting.
To complement our upper bounds, we also show that a linear dependence of the update time on $f$ is necessary unless we can tolerate much worse approximation factors. Using the recent distributed PCP-framework, we show that any dynamic set cover algorithm that has an amortized update time of $O(f^{1-ε})$ must have an approximation factor that is $Ω(n^δ)$ for some constant $δ>0$ under the Strong Exponential Time Hypothesis.
△ Less
Submitted 14 May, 2019; v1 submitted 9 April, 2018;
originally announced April 2018.
-
Improved Approximation for Tree Augmentation: Saving by Rewiring
Authors:
Fabrizio Grandoni,
Christos Kalaitzis,
Rico Zenklusen
Abstract:
The Tree Augmentation Problem (TAP) is a fundamental network design problem in which we are given a tree and a set of additional edges, also called \emph{links}. The task is to find a set of links, of minimum size, whose addition to the tree leads to a $2$-edge-connected graph. A long line of results on TAP culminated in the previously best known approximation guarantee of $1.5$ achieved by a comb…
▽ More
The Tree Augmentation Problem (TAP) is a fundamental network design problem in which we are given a tree and a set of additional edges, also called \emph{links}. The task is to find a set of links, of minimum size, whose addition to the tree leads to a $2$-edge-connected graph. A long line of results on TAP culminated in the previously best known approximation guarantee of $1.5$ achieved by a combinatorial approach due to Kortsarz and Nutov [ACM Transactions on Algorithms 2016], and also by an SDP-based approach by Cheriyan and Gao [Algorithmica 2017]. Moreover, an elegant LP-based $(1.5+ε)$-approximation has also been found very recently by Fiorini, Groß, Könemann, and Sanitá [SODA 2018]. In this paper, we show that an approximation factor below $1.5$ can be achieved, by presenting a $1.458$-approximation that is based on several new techniques.
△ Less
Submitted 6 April, 2018;
originally announced April 2018.
-
Improved Pseudo-Polynomial-Time Approximation for Strip Packing
Authors:
Waldo Gálvez,
Fabrizio Grandoni,
Salvatore Ingala,
Arindam Khan
Abstract:
We study the strip packing problem, a classical packing problem which generalizes both bin packing and makespan minimization. Here we are given a set of axis-parallel rectangles in the two-dimensional plane and the goal is to pack them in a vertical strip of a fixed width such that the height of the obtained packing is minimized. The packing must be non-overlapping and the rectangles cannot be rot…
▽ More
We study the strip packing problem, a classical packing problem which generalizes both bin packing and makespan minimization. Here we are given a set of axis-parallel rectangles in the two-dimensional plane and the goal is to pack them in a vertical strip of a fixed width such that the height of the obtained packing is minimized. The packing must be non-overlapping and the rectangles cannot be rotated. A reduction from the partition problem shows that no approximation better than 3/2 is possible for strip packing in polynomial time (assuming P$\neq$NP). Nadiradze and Wiese [SODA16] overcame this barrier by presenting a $(\frac{7}{5}+ε)$-approximation algorithm in pseudo-polynomial-time (PPT). As the problem is strongly NP-hard, it does not admit an exact PPT algorithm. In this paper, we make further progress on the PPT approximability of strip packing, by presenting a $(\frac43+ε)$-approximation algorithm. Our result is based on a non-trivial repacking of some rectangles in the \emph{empty space} left by the construction by Nadiradze and Wiese, and in some sense pushes their approach to its limit. Our PPT algorithm can be adapted to the case where we are allowed to rotate the rectangles by $90^\circ$, achieving the same approximation factor and breaking the polynomial-time approximation barrier of 3/2 for the case with rotations as well.
△ Less
Submitted 23 January, 2018;
originally announced January 2018.
-
Approximating Geometric Knapsack via L-packings
Authors:
Waldo Gálvez,
Fabrizio Grandoni,
Sandy Heydrich,
Salvatore Ingala,
Arindam Khan,
Andreas Wiese
Abstract:
We study the two-dimensional geometric knapsack problem (2DK) in which we are given a set of n axis-aligned rectangular items, each one with an associated profit, and an axis-aligned square knapsack. The goal is to find a (non-overlapping) packing of a maximum profit subset of items inside the knapsack (without rotating items). The best-known polynomial-time approximation factor for this problem (…
▽ More
We study the two-dimensional geometric knapsack problem (2DK) in which we are given a set of n axis-aligned rectangular items, each one with an associated profit, and an axis-aligned square knapsack. The goal is to find a (non-overlapping) packing of a maximum profit subset of items inside the knapsack (without rotating items). The best-known polynomial-time approximation factor for this problem (even just in the cardinality case) is (2 + ε) [Jansen and Zhang, SODA 2004].
In this paper, we break the 2 approximation barrier, achieving a polynomial-time (17/9 + ε) < 1.89 approximation, which improves to (558/325 + ε) < 1.72 in the cardinality case. Essentially all prior work on 2DK approximation packs items inside a constant number of rectangular containers, where items inside each container are packed using a simple greedy strategy. We deviate for the first time from this setting: we show that there exists a large profit solution where items are packed inside a constant number of containers plus one L-shaped region at the boundary of the knapsack which contains items that are high and narrow and items that are wide and thin. As a second major and the main algorithmic contribution of this paper, we present a PTAS for this case. We believe that this will turn out to be useful in future work in geometric packing problems.
We also consider the variant of the problem with rotations (2DKR), where items can be rotated by 90 degrees. Also, in this case, the best-known polynomial-time approximation factor (even for the cardinality case) is (2 + ε) [Jansen and Zhang, SODA 2004]. Exploiting part of the machinery developed for 2DK plus a few additional ideas, we obtain a polynomial-time (3/2 + ε)-approximation for 2DKR, which improves to (4/3 + ε) in the cardinality case.
△ Less
Submitted 21 November, 2017;
originally announced November 2017.
-
Truly Sub-cubic Algorithms for Language Edit Distance and RNA Folding via Fast Bounded-Difference Min-Plus Product
Authors:
Karl Bringmann,
Fabrizio Grandoni,
Barna Saha,
Virginia Vassilevska Williams
Abstract:
It is a major open problem whether the $(\min,+)$-product of two $n\times n$ matrices has a truly sub-cubic (i.e. $O(n^{3-ε})$ for $ε>0$) time algorithm, in particular since it is equivalent to the famous All-Pairs-Shortest-Paths problem (APSP) in $n$-vertex graphs. Some restrictions of the $(\min,+)$-product to special types of matrices are known to admit truly sub-cubic algorithms, each giving r…
▽ More
It is a major open problem whether the $(\min,+)$-product of two $n\times n$ matrices has a truly sub-cubic (i.e. $O(n^{3-ε})$ for $ε>0$) time algorithm, in particular since it is equivalent to the famous All-Pairs-Shortest-Paths problem (APSP) in $n$-vertex graphs. Some restrictions of the $(\min,+)$-product to special types of matrices are known to admit truly sub-cubic algorithms, each giving rise to a special case of APSP that can be solved faster. In this paper we consider a new, different and powerful restriction in which all matrix entries are integers and one matrix can be arbitrary, as long as the other matrix has "bounded differences" in either its columns or rows, i.e. any two consecutive entries differ by only a small amount. We obtain the first truly sub-cubic algorithm for this bounded-difference $(\min,+)$-product (answering an open problem of Chan and Lewenstein).
Our new algorithm, combined with a strengthening of an approach of L.~Valiant for solving context-free grammar parsing with matrix multiplication, yields the first truly sub-cubic algorithms for the following problems: Language Edit Distance (a major problem in the parsing community), RNA-folding (a major problem in bioinformatics) and Optimum Stack Generation (answering an open problem of Tarjan).
△ Less
Submitted 17 July, 2017;
originally announced July 2017.
-
When the Optimum is also Blind: a New Perspective on Universal Optimization
Authors:
Marek Adamczyk,
Fabrizio Grandoni,
Stefano Leonardi,
MIchal Wlodarczyk
Abstract:
Consider the following variant of the set cover problem. We are given a universe $U=\{1,...,n\}$ and a collection of subsets $\mathcal{C} = \{S_1,...,S_m\}$ where $S_i \subseteq U$. For every element $u \in U$ we need to find a set $φ(u) \in \mathcal C$ such that $u\in φ(u)$. Once we construct and fix the mapping $φ:U \rightarrow \mathcal{C}$ a subset $X \subseteq U$ of the universe is revealed, a…
▽ More
Consider the following variant of the set cover problem. We are given a universe $U=\{1,...,n\}$ and a collection of subsets $\mathcal{C} = \{S_1,...,S_m\}$ where $S_i \subseteq U$. For every element $u \in U$ we need to find a set $φ(u) \in \mathcal C$ such that $u\in φ(u)$. Once we construct and fix the mapping $φ:U \rightarrow \mathcal{C}$ a subset $X \subseteq U$ of the universe is revealed, and we need to cover all elements from $X$ with exactly $φ(X):=\cup_{u\in X} φ(u)$. The goal is to find a mapping such that the cover $φ(X)$ is as cheap as possible.
This is an example of a universal problem where the solution has to be created before the actual instance to deal with is revealed. Such problems appear naturally in some settings when we need to optimize under uncertainty and it may be actually too expensive to begin finding a good solution once the input starts being revealed.
A rich body of work was devoted to investigate the approximability of such problems under the regime of worst case analysis or when the input instance is drawn randomly from some probability distribution. Here one typically compares the quality of the produced solution with the optimal offline solution.
In this paper we consider a different viewpoint: What if we would compare our approximate universal solution against an optimal universal solution that obeys the same rules as we do? We show that under this viewpoint it is possible to achieve improved approximation algorithms for the stochastic version of universal set cover. Our result is based on rounding a proper configuration IP that captures the optimal universal solution, and using tools from submodular optimization. The same basic approach leads to improved approximation algorithms also for other related problems.
△ Less
Submitted 6 July, 2017;
originally announced July 2017.
-
Preserving Distances in Very Faulty Graphs
Authors:
Greg Bodwin,
Fabrizio Grandoni,
Merav Parter,
Virginia Vassilevska Williams
Abstract:
Preservers and additive spanners are sparse (hence cheap to store) subgraphs that preserve the distances between given pairs of nodes exactly or with some small additive error, respectively. Since real-world networks are prone to failures, it makes sense to study fault-tolerant versions of the above structures. This turns out to be a surprisingly difficult task. For every small but arbitrary set o…
▽ More
Preservers and additive spanners are sparse (hence cheap to store) subgraphs that preserve the distances between given pairs of nodes exactly or with some small additive error, respectively. Since real-world networks are prone to failures, it makes sense to study fault-tolerant versions of the above structures. This turns out to be a surprisingly difficult task. For every small but arbitrary set of edge or vertex failures, the preservers and spanners need to contain {\em replacement paths} around the faulted set. In this paper we make substantial progress on fault tolerant preservers and additive spanners:
(1) We present the first truly sub-quadratic size single-pair preservers in unweighted (possibly directed) graphs for \emph{any} fixed number $f$ of faults. Our result indeed generalizes to the single-source case, and can be used to build new fault-tolerant additive spanners (for all pairs).
(2) The size of the above single-pair preservers is $O(n^{2-g(f)})$ for some positive function $g$, and grows to $O(n^2)$ for increasing $f$. We show that this is necessary even in undirected unweighted graphs, and even if you allow for a small additive error: If you aim at size $O(n^{2-ε})$ for $ε>0$, then the additive error has to be $Ω(\eps f)$. This surprisingly matches known upper bounds in the literature.
(3) For weighted graphs, we provide matching upper and lower bounds for the single pair case. Namely, the size of the preserver is $Θ(n^2)$ for $f\geq 2$ in both directed and undirected graphs, while for $f=1$ the size is $Θ(n)$ in undirected graphs. For directed graphs, we have a superlinear upper bound and a matching lower bound.
Most of our lower bounds extend to the distance oracle setting, where rather than a subgraph we ask for any compact data structure.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
Surviving in Directed Graphs: A Polylogarithmic Approximation for Two-Connected Directed Steiner Tree
Authors:
Fabrizio Grandoni,
Bundit Laekhanukit
Abstract:
In this paper, we study a survivable network design problem on directed graphs, 2-Connected Directed Steiner Tree (2-DST): given an $n$-vertex weighted directed graph, a root $r$, and a set of $h$ terminals $S$, find a min-cost subgraph $H$ that has two edge/vertex disjoint paths from $r$ to any $t\in S$. 2-DST is a natural generalization of the classical Directed Steiner Tree problem (DST), where…
▽ More
In this paper, we study a survivable network design problem on directed graphs, 2-Connected Directed Steiner Tree (2-DST): given an $n$-vertex weighted directed graph, a root $r$, and a set of $h$ terminals $S$, find a min-cost subgraph $H$ that has two edge/vertex disjoint paths from $r$ to any $t\in S$. 2-DST is a natural generalization of the classical Directed Steiner Tree problem (DST), where we have an additional requirement that the network must tolerate one failure. No non-trivial approximation is known for 2-DST. This was left as an open problem by Feldman et al., [SODA'09; JCSS] and has then been studied by Cheriyan et al. [SODA'12; TALG] and Laekhanukit SODA'14]. However, no positive result was known except for the special case of a $D$-shallow instance [Laekhanukit, ICALP'16].
We present an $O(D^3\log D\cdot h^{2/D}\cdot \log n)$ approximation algorithm for 2-DST that runs in time $O(n^{O(D)})$, for any $D\in[\log_2h]$. This implies a polynomial-time $O(h^ε\log n)$ approximation for any constant $ε>0$, and a poly-logarithmic approximation running in quasi-polynomial time. We remark that this is essentially the best-known even for the classical DST, and the latter problem is $O(\log^{2-ε}n)$-hard to approximate [Halperin and Krauthgamer, STOC'03]. As a by product, we obtain an algorithm with the same approximation guarantee for the $2$-Connected Directed Steiner Subgraph problem, where the goal is to find a min-cost subgraph such that every pair of terminals are $2$-edge/vertex connected.
△ Less
Submitted 5 November, 2016;
originally announced November 2016.
-
Improved Purely Additive Fault-Tolerant Spanners
Authors:
Davide Bilò,
Fabrizio Grandoni,
Luciano Gualà,
Stefano Leucci,
Guido Proietti
Abstract:
Let $G$ be an unweighted $n$-node undirected graph. A \emph{$β$-additive spanner} of $G$ is a spanning subgraph $H$ of $G$ such that distances in $H$ are stretched at most by an additive term $β$ w.r.t. the corresponding distances in $G$. A natural research goal related with spanners is that of designing \emph{sparse} spanners with \emph{low} stretch.
In this paper, we focus on \emph{fault-toler…
▽ More
Let $G$ be an unweighted $n$-node undirected graph. A \emph{$β$-additive spanner} of $G$ is a spanning subgraph $H$ of $G$ such that distances in $H$ are stretched at most by an additive term $β$ w.r.t. the corresponding distances in $G$. A natural research goal related with spanners is that of designing \emph{sparse} spanners with \emph{low} stretch.
In this paper, we focus on \emph{fault-tolerant} additive spanners, namely additive spanners which are able to preserve their additive stretch even when one edge fails. We are able to improve all known such spanners, in terms of either sparsity or stretch. In particular, we consider the sparsest known spanners with stretch $6$, $28$, and $38$, and reduce the stretch to $4$, $10$, and $14$, respectively (while keeping the same sparsity).
Our results are based on two different constructions. On one hand, we show how to augment (by adding a \emph{small} number of edges) a fault-tolerant additive \emph{sourcewise spanner} (that approximately preserves distances only from a given set of source nodes) into one such spanner that preserves all pairwise distances. On the other hand, we show how to augment some known fault-tolerant additive spanners, based on clustering techniques. This way we decrease the additive stretch without any asymptotic increase in their size. We also obtain improved fault-tolerant additive spanners for the case of one vertex failure, and for the case of $f$ edge failures.
△ Less
Submitted 2 July, 2015;
originally announced July 2015.
-
Improved Approximation Algorithms for Stochastic Matching
Authors:
Marek Adamczyk,
Fabrizio Grandoni,
Joydeep Mukherjee
Abstract:
In this paper we consider the Stochastic Matching problem, which is motivated by applications in kidney exchange and online dating. We are given an undirected graph in which every edge is assigned a probability of existence and a positive profit, and each node is assigned a positive integer called timeout. We know whether an edge exists or not only after probing it. On this random graph we are exe…
▽ More
In this paper we consider the Stochastic Matching problem, which is motivated by applications in kidney exchange and online dating. We are given an undirected graph in which every edge is assigned a probability of existence and a positive profit, and each node is assigned a positive integer called timeout. We know whether an edge exists or not only after probing it. On this random graph we are executing a process, which one-by-one probes the edges and gradually constructs a matching. The process is constrained in two ways: once an edge is taken it cannot be removed from the matching, and the timeout of node $v$ upper-bounds the number of edges incident to $v$ that can be probed. The goal is to maximize the expected profit of the constructed matching.
For this problem Bansal et al. (Algorithmica 2012) provided a $3$-approximation algorithm for bipartite graphs, and a $4$-approximation for general graphs. In this work we improve the approximation factors to $2.845$ and $3.709$, respectively.
We also consider an online version of the bipartite case, where one side of the partition arrives node by node, and each time a node $b$ arrives we have to decide which edges incident to $b$ we want to probe, and in which order. Here we present a $4.07$-approximation, improving on the $7.92$-approximation of Bansal et al.
The main technical ingredient in our result is a novel way of probing edges according to a random but non-uniform permutation. Patching this method with an algorithm that works best for large probability edges (plus some additional ideas) leads to our improved approximation factors.
△ Less
Submitted 6 May, 2015;
originally announced May 2015.
-
An LP-Rounding $2\sqrt{2}$ Approximation for Restricted Maximum Acyclic Subgraph
Authors:
Fabrizio Grandoni,
Tomasz Kociumaka,
Michał Włodarczyk
Abstract:
In the classical Maximum Acyclic Subgraph problem (MAS), given a directed-edge weighted graph, we are required to find an ordering of the nodes that maximizes the total weight of forward-directed edges. MAS admits a 2 approximation, and this approximation is optimal under the Unique Game Conjecture.
In this paper we consider a generalization of MAS, the Restricted Maximum Acyclic Subgraph proble…
▽ More
In the classical Maximum Acyclic Subgraph problem (MAS), given a directed-edge weighted graph, we are required to find an ordering of the nodes that maximizes the total weight of forward-directed edges. MAS admits a 2 approximation, and this approximation is optimal under the Unique Game Conjecture.
In this paper we consider a generalization of MAS, the Restricted Maximum Acyclic Subgraph problem (RMAS), where each node is associated with a list of integer labels, and we have to find a labeling of the nodes so as to maximize the weight of edges whose head label is larger than the tail label. The best known (almost trivial) approximation for RMAS is 4.
The interest of RMAS is mostly due to its connections with the Vertex Pricing problem (VP). In VP we are given an undirected graph with positive edge budgets. A feasible solution consists of an assignment of non-negative prices to the nodes. The profit for each edge $e$ is the sum of its endpoints prices if that sum is at most the budget of $e$, and zero otherwise. Our goal is to maximize the total profit. The best known approximation for VP, which works analogously to the mentioned approximation algorithm for RMAS, is 4. Improving on that is a challenging open problem. On the other hand, the best known 2 inapproximability result is due to a reduction from a special case of RMAS.
In this paper we present an improved LP-rounding $2\sqrt{2}$ approximation for RMAS. Our result shows that, in order to prove a 4 hardness of approximation result for VP (if possible), one should consider reductions from harder problems. Alternatively, our approach might suggest a different way to design approximation algorithms for VP.
△ Less
Submitted 2 May, 2014;
originally announced May 2014.
-
Tight Kernel Bounds for Problems on Graphs with Small Degeneracy
Authors:
Marek Cygan,
Fabrizio Grandoni,
Danny Hermelin
Abstract:
In this paper we consider kernelization for problems on d-degenerate graphs, i.e. graphs such that any subgraph contains a vertex of degree at most $d$. This graph class generalizes many classes of graphs for which effective kernelization is known to exist, e.g. planar graphs, H-minor free graphs, and H-topological-minor free graphs. We show that for several natural problems on d-degenerate graphs…
▽ More
In this paper we consider kernelization for problems on d-degenerate graphs, i.e. graphs such that any subgraph contains a vertex of degree at most $d$. This graph class generalizes many classes of graphs for which effective kernelization is known to exist, e.g. planar graphs, H-minor free graphs, and H-topological-minor free graphs. We show that for several natural problems on d-degenerate graphs the best known kernelization upper bounds are essentially tight.
△ Less
Submitted 23 June, 2013; v1 submitted 21 May, 2013;
originally announced May 2013.
-
On Pairwise Spanners
Authors:
Marek Cygan,
Fabrizio Grandoni,
Telikepalli Kavitha
Abstract:
Given an undirected $n$-node unweighted graph $G = (V, E)$, a spanner with stretch function $f(\cdot)$ is a subgraph $H\subseteq G$ such that, if two nodes are at distance $d$ in $G$, then they are at distance at most $f(d)$ in $H$. Spanners are very well studied in the literature. The typical goal is to construct the sparsest possible spanner for a given stretch function.
In this paper we study…
▽ More
Given an undirected $n$-node unweighted graph $G = (V, E)$, a spanner with stretch function $f(\cdot)$ is a subgraph $H\subseteq G$ such that, if two nodes are at distance $d$ in $G$, then they are at distance at most $f(d)$ in $H$. Spanners are very well studied in the literature. The typical goal is to construct the sparsest possible spanner for a given stretch function.
In this paper we study pairwise spanners, where we require to approximate the $u$-$v$ distance only for pairs $(u,v)$ in a given set $\cP \subseteq V\times V$. Such $\cP$-spanners were studied before [Coppersmith,Elkin'05] only in the special case that $f(\cdot)$ is the identity function, i.e. distances between relevant pairs must be preserved exactly (a.k.a. pairwise preservers).
Here we present pairwise spanners which are at the same time sparser than the best known preservers (on the same $\cP$) and of the best known spanners (with the same $f(\cdot)$). In more detail, for arbitrary $\cP$, we show that there exists a $\mathcal{P}$-spanner of size $O(n(|\cP|\log n)^{1/4})$ with $f(d)=d+4\log n$. Alternatively, for any $\eps>0$, there exists a $\cP$-spanner of size $O(n|\cP|^{1/4}\sqrt{\frac{\log n}{\eps}})$ with $f(d)=(1+\eps)d+4$. We also consider the relevant special case that there is a critical set of nodes $S\subseteq V$, and we wish to approximate either the distances within nodes in $S$ or from nodes in $S$ to any other node. We show that there exists an $(S\times S)$-spanner of size $O(n\sqrt{|S|})$ with $f(d)=d+2$, and an $(S\times V)$-spanner of size $O(n\sqrt{|S|\log n})$ with $f(d)=d+2\log n$. All the mentioned pairwise spanners can be constructed in polynomial time.
△ Less
Submitted 9 January, 2013;
originally announced January 2013.
-
A Mazing 2+eps Approximation for Unsplittable Flow on a Path
Authors:
Aris Anagnostopoulos,
Fabrizio Grandoni,
Stefano Leonardi,
Andreas Wiese
Abstract:
We study the unsplittable flow on a path problem (UFP) where we are given a path with non-negative edge capacities and tasks, which are characterized by a subpath, a demand, and a profit. The goal is to find the most profitable subset of tasks whose total demand does not violate the edge capacities. This problem naturally arises in many settings such as bandwidth allocation, resource constrained s…
▽ More
We study the unsplittable flow on a path problem (UFP) where we are given a path with non-negative edge capacities and tasks, which are characterized by a subpath, a demand, and a profit. The goal is to find the most profitable subset of tasks whose total demand does not violate the edge capacities. This problem naturally arises in many settings such as bandwidth allocation, resource constrained scheduling, and interval packing.
A natural task classification defines the size of a task i to be the ratio delta between the demand of i and the minimum capacity of any edge used by i. If all tasks have sufficiently small delta, the problem is already well understood and there is a 1+eps approximation. For the complementary setting---instances whose tasks all have large delta---much remains unknown, and the best known polynomial-time procedure gives only (for any constant delta>0) an approximation ratio of 6+eps.
In this paper we present a polynomial time 1+eps approximation for the latter setting. Key to this result is a complex geometrically inspired dynamic program. Here each task is represented as a segment underneath the capacity curve, and we identify a proper maze-like structure so that each passage of the maze is crossed by only O(1) tasks in the computed solution. In combination with the known PTAS for delta-small tasks, our result implies a 2+eps approximation for UFP, improving on the previous best 7+eps approximation [Bonsma et al., FOCS 2011]. We remark that our improved approximation factor matches the best known approximation ratio for the considerably easier special case of uniform edge capacities.
△ Less
Submitted 12 November, 2012;
originally announced November 2012.
-
On Min-Power Steiner Tree
Authors:
Fabrizio Grandoni
Abstract:
In the classical (min-cost) Steiner tree problem, we are given an edge-weighted undirected graph and a set of terminal nodes. The goal is to compute a min-cost tree S which spans all terminals. In this paper we consider the min-power version of the problem, which is better suited for wireless applications. Here, the goal is to minimize the total power consumption of nodes, where the power of a nod…
▽ More
In the classical (min-cost) Steiner tree problem, we are given an edge-weighted undirected graph and a set of terminal nodes. The goal is to compute a min-cost tree S which spans all terminals. In this paper we consider the min-power version of the problem, which is better suited for wireless applications. Here, the goal is to minimize the total power consumption of nodes, where the power of a node v is the maximum cost of any edge of S incident to v. Intuitively, nodes are antennas (part of which are terminals that we need to connect) and edge costs define the power to connect their endpoints via bidirectional links (so as to support protocols with ack messages). Differently from its min-cost counterpart, min-power Steiner tree is NP-hard even in the spanning tree case, i.e. when all nodes are terminals. Since the power of any tree is within once and twice its cost, computing a rho \leq ln(4)+eps [Byrka et al.'10] approximate min-cost Steiner tree provides a 2rho<2.78 approximation for the problem. For min-power spanning tree the same approach provides a 2 approximation, which was improved to 5/3+eps with a non-trivial approach in [Althaus et al.'06]. Here we present an improved approximation algorithm for min-power Steiner tree. Our result is based on two main ingredients. We prove the first decomposition theorem for min-power Steiner tree, in the spirit of analogous structural results for min-cost Steiner tree and min-power spanning tree. Based on this theorem, we define a proper LP relaxation, that we exploit within the iterative randomized rounding framework in [Byrka et al.'10]. A careful analysis provides a 3ln 4-9/4+eps<1.91 approximation factor. The same approach gives an improved 1.5+eps approximation for min-power spanning tree as well, matching the approximation factor in [Nutov and Yaroshevitch'09] for the special case of min-power spanning tree with edge weights in {0,1}.
△ Less
Submitted 16 May, 2012;
originally announced May 2012.
-
Approximation Algorithms for Union and Intersection Covering Problems
Authors:
Marek Cygan,
Fabrizio Grandoni,
Stefano Leonardi,
Marcin Mucha,
Marcin Pilipczuk,
Piotr Sankowski
Abstract:
In a classical covering problem, we are given a set of requests that we need to satisfy (fully or partially), by buying a subset of items at minimum cost. For example, in the k-MST problem we want to find the cheapest tree spanning at least k nodes of an edge-weighted graph. Here nodes and edges represent requests and items, respectively.
In this paper, we initiate the study of a new family of m…
▽ More
In a classical covering problem, we are given a set of requests that we need to satisfy (fully or partially), by buying a subset of items at minimum cost. For example, in the k-MST problem we want to find the cheapest tree spanning at least k nodes of an edge-weighted graph. Here nodes and edges represent requests and items, respectively.
In this paper, we initiate the study of a new family of multi-layer covering problems. Each such problem consists of a collection of h distinct instances of a standard covering problem (layers), with the constraint that all layers share the same set of requests. We identify two main subfamilies of these problems: - in a union multi-layer problem, a request is satisfied if it is satisfied in at least one layer; - in an intersection multi-layer problem, a request is satisfied if it is satisfied in all layers. To see some natural applications, consider both generalizations of k-MST. Union k-MST can model a problem where we are asked to connect a set of users to at least one of two communication networks, e.g., a wireless and a wired network. On the other hand, intersection k-MST can formalize the problem of connecting a subset of users to both electricity and water.
We present a number of hardness and approximation results for union and intersection versions of several standard optimization problems: MST, Steiner tree, set cover, facility location, TSP, and their partial covering variants.
△ Less
Submitted 24 February, 2011;
originally announced February 2011.
-
Prizing on Paths: A PTAS for the Highway Problem
Authors:
Fabrizio Grandoni,
Thomas Rothvoss
Abstract:
In the highway problem, we are given an n-edge line graph (the highway), and a set of paths (the drivers), each one with its own budget. For a given assignment of edge weights (the tolls), the highway owner collects from each driver the weight of the associated path, when it does not exceed the budget of the driver, and zero otherwise. The goal is choosing weights so as to maximize the profit.
A…
▽ More
In the highway problem, we are given an n-edge line graph (the highway), and a set of paths (the drivers), each one with its own budget. For a given assignment of edge weights (the tolls), the highway owner collects from each driver the weight of the associated path, when it does not exceed the budget of the driver, and zero otherwise. The goal is choosing weights so as to maximize the profit.
A lot of research has been devoted to this apparently simple problem. The highway problem was shown to be strongly NP-hard only recently [Elbassioni,Raman,Ray-'09]. The best-known approximation is O(\log n/\log\log n) [Gamzu,Segev-'10], which improves on the previous-best O(\log n) approximation [Balcan,Blum-'06].
In this paper we present a PTAS for the highway problem, hence closing the complexity status of the problem. Our result is based on a novel randomized dissection approach, which has some points in common with Arora's quadtree dissection for Euclidean network design [Arora-'98]. The basic idea is enclosing the highway in a bounding path, such that both the size of the bounding path and the position of the highway in it are random variables. Then we consider a recursive O(1)-ary dissection of the bounding path, in subpaths of uniform optimal weight. Since the optimal weights are unknown, we construct the dissection in a bottom-up fashion via dynamic programming, while computing the approximate solution at the same time. Our algorithm can be easily derandomized. We demonstrate the versatility of our technique by presenting PTASs for two variants of the highway problem: the tollbooth problem with a constant number of leaves and the maximum-feasibility subsystem problem on interval matrices. In both cases the previous best approximation factors are polylogarithmic [Gamzu,Segev-'10,Elbassioni,Raman,Ray,Sitters-'09].
△ Less
Submitted 18 April, 2010;
originally announced April 2010.
-
Optimization with More than One Budget
Authors:
Fabrizio Grandoni,
Rico Zenklusen
Abstract:
A natural way to deal with multiple, partially conflicting objectives is turning all the objectives but one into budget constraints. Some classical polynomial-time optimization problems, such as spanning tree and forest, shortest path, (perfect) matching, independent set (basis) in a matroid or in the intersection of two matroids, become NP-hard even with one budget constraint. Still, for most o…
▽ More
A natural way to deal with multiple, partially conflicting objectives is turning all the objectives but one into budget constraints. Some classical polynomial-time optimization problems, such as spanning tree and forest, shortest path, (perfect) matching, independent set (basis) in a matroid or in the intersection of two matroids, become NP-hard even with one budget constraint. Still, for most of these problems deterministic and randomized polynomial-time approximation schemes are known. In the case of two or more budgets, typically only multi-criteria approximation schemes are available, which return slightly infeasible solutions. Not much is known however for the case of strict budget constraints: filling this gap is the main goal of this paper.
We show that shortest path, perfect matching, and spanning tree (and hence matroid basis and matroid intersection basis) are inapproximable already with two budget constraints. For the remaining problems, whose set of solutions forms an independence system, we present deterministic and randomized polynomial-time approximation schemes for a constant number k of budget constraints. Our results are based on a variety of techniques:
1. We present a simple and powerful mechanism to transform multi-criteria approximation schemes into pure approximation schemes.
2. We show that points in low dimensional faces of any matroid polytope are almost integral, an interesting result on its own. This gives a deterministic approximation scheme for k-budgeted matroid independent set.
3. We present a deterministic approximation scheme for 2-budgeted matching. The backbone of this result is a purely topological property of curves in R^2.
△ Less
Submitted 10 February, 2010;
originally announced February 2010.
-
A Short Proof of the VPN Tree Routing Conjecture on Ring Networks
Authors:
Fabrizio Grandoni,
Volker Kaibel,
Gianpaolo Oriolo,
Martin Skutella
Abstract:
The VPN Tree Routing Conjecture states that there always exists an optimal solution to the symmetric Virtual Private Network Design (sVPND) problem where the paths between all terminals form a tree. Only recently, Hurkens, Keijsper, and Stougie gave a proof of this conjecture for the special case of ring networks. Their proof is based on a dual pair of linear programs and is somewhat in- volved.…
▽ More
The VPN Tree Routing Conjecture states that there always exists an optimal solution to the symmetric Virtual Private Network Design (sVPND) problem where the paths between all terminals form a tree. Only recently, Hurkens, Keijsper, and Stougie gave a proof of this conjecture for the special case of ring networks. Their proof is based on a dual pair of linear programs and is somewhat in- volved. We present a short proof of a slightly stronger conjecture which might also turn out to be useful for proving the VPN Tree Routing Conjecture for general networks.
△ Less
Submitted 26 October, 2007; v1 submitted 16 October, 2007;
originally announced October 2007.