Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.

Slides:



Advertisements
Similar presentations
Iterative Rounding and Iterative Relaxation
Advertisements

The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
Network Design with Degree Constraints Guy Kortsarz Joint work with Rohit Khandekar and Zeev Nutov.
C&O 355 Lecture 8 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
C&O 355 Lecture 9 N. Harvey TexPoint fonts used in EMF.
Incremental Linear Programming Linear programming involves finding a solution to the constraints, one that maximizes the given linear function of variables.
C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
1 LP Duality Lecture 13: Feb Min-Max Theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Improved Approximation Algorithms for the Spanning Star Forest Problem Prasad Raghavendra Ning ChenC. Thach Nguyen Atri Rudra Gyanit Singh University of.
Introduction to Algorithms
1 of 56 Linear Programming-Based Approximation Algorithms Shoshana Neuburger Graduate Center, CUNY May 13, 2009.
The number of edge-disjoint transitive triples in a tournament.
Instructor Neelima Gupta Table of Contents Lp –rounding Dual Fitting LP-Duality.
Approximation Algorithms
Linear Programming and Approximation
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
Randomized Algorithms and Randomized Rounding Lecture 21: April 13 G n 2 leaves
Primal Dual Method Lecture 20: March 28 primaldual restricted primal restricted dual y z found x, succeed! Construct a better dual.
Approximation Algorithm: Iterative Rounding Lecture 15: March 9.
Approximation Algorithms
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Integer Programming Difference from linear programming –Variables x i must take on integral values, not real values Lots of interesting problems can be.
Distributed Combinatorial Optimization
1 Introduction to Approximation Algorithms Lecture 15: Mar 5.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
Approximation Algorithms for NP-hard Combinatorial Problems Magnús M. Halldórsson Reykjavik University
C&O 355 Mathematical Programming Fall 2010 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
Design Techniques for Approximation Algorithms and Approximation Classes.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
Approximation Algorithms
C&O 355 Mathematical Programming Fall 2010 Lecture 18 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A Image:
CSCI 3160 Design and Analysis of Algorithms Chengyu Lin.
Approximation Algorithms for NP-hard Combinatorial Problems Magnús M. Halldórsson Reykjavik University Local Search, Greedy and Partitioning
Hon Wai Leong, NUS (CS6234, Spring 2009) Page 1 Copyright © 2009 by Leong Hon Wai CS6234: Lecture 4  Linear Programming  LP and Simplex Algorithm [PS82]-Ch2.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
Steiner tree LP x e = 1 if edge e is included in the Steiner tree. Min.  e c e x e (primal) s.t.  e   (S) x e ≥ 1  S  V: S  T≠ , T\S≠  x e 
C&O 355 Mathematical Programming Fall 2010 Lecture 5 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
Implicit Hitting Set Problems Richard M. Karp Erick Moreno Centeno DIMACS 20 th Anniversary.
C&O 355 Lecture 7 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Lecture.6. Table of Contents Lp –rounding Dual Fitting LP-Duality.
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
1 Approximation algorithms Algorithms and Networks 2015/2016 Hans L. Bodlaender Johan M. M. van Rooij TexPoint fonts used in EMF. Read the TexPoint manual.
C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Approximation Algorithms Duality My T. UF.
Approximation Algorithms based on linear programming.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Chapter 8 PD-Method and Local Ratio (5) Equivalence This ppt is editored from a ppt of Reuven Bar-Yehuda. Reuven Bar-Yehuda.
TU/e Algorithms (2IL15) – Lecture 11 1 Approximation Algorithms.
Lap Chi Lau we will only use slides 4 to 19
Topics in Algorithms Lap Chi Lau.
Approximation algorithms
Analysis of Algorithms
Dynamic and Online Algorithms for Set Cover
Coverage Approximation Algorithms
Linear Programming and Approximation
Linear Programming Duality, Reductions, and Bipartite Matching
Presentation transcript:

Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A

Outline 1.Basics 2.Network design – the primal-dual method 3.Network design – iterative rounding and iterative relaxation 4.Competitive analysis via the primal-dial method

Outline 1.Basics 2.Network design – the primal-dual method 3.Network design – iterative rounding and iterative relaxation 4.Competitive analysis via the primal-dial method.

What is an Approximation Algorithm? Returns a sub-optimal solution for an optimization problem For a minimization problem: for every input I, Running time: polynomial Then, ALG is an ® -approximation

Why are Approximation Algorithms needed? Many interesting/useful optimization problems are NP-hard Optimal solution cannot be computed How well can they be approximated? Leads to beautiful algorithmic theory. And, the problems still need to be solved in practice …

Simple Example: Vertex Cover Input: undirected graph G=(V,E) Output: a minimum cardinality V’ µ V such that V’ Å e  ; for each e 2 E Classic NP-hard problem Approximation Algorithm: Find a maximal (inclusion-wise) matching M Vertex Cover V’ = V(M), vertices adjacent to edges in M

Analysis Feasibility of cover: V(M) covers all edges, Every edge must have an end point in V(M) Otherwise, M is not a maximal matching! Approximation factor: Optimal solution must pick a representative from each edge e 2 M Therefore, OPT ¸ V(M)/2 Approximation factor = V(M)/OPT · 2 Question: Can this factor be improved? Probably not …

Linear Programming Optimize a linear function over a set of linear constraints: minimize c ¢ x subject to: Ax ¸ 0 X ¸ 0 Linear programming is solvable in polynomial time [Khachiyan ’79]

Back to Vertex Cover Vertex cover can be formulated as integer/linear program: w v – weight of vertex v x v - indicator variable for choosing vertex v Relaxation: 0 · x i · 1 LP can be solved in poly time LP provides a lower bound on optimal integral solution!!! Rounding Algorithm: if x v ¸ ½, then x v à 1, else x v à 0 for each edge (u,v), at least one of x v, x u ¸ ½ Approximation factor = 2

Duality in Linear Programming Primal Dual primal constraint $ dual variable dual constraint $ primal variable Weak Duality Theorem: for u feasible dual solution and w feasible primal solution, b·u · c·w

Set Cover Elements: U ={ 1,2, …,n} Sets: S 1,…, S m (each S i µ { 1,2, …,n}) Each set S i has cost c i Goal: find a min cost collection of sets that cover U set cover can be formulated as integer/linear program: x i - indicator variable for choosing set S i Relaxation: 0 · x i · 1 LP can be solved in poly time LP provides a lower bound on optimal integral solution!!!

Rounding a Fractional Solution (1) For each S i : 0 · x i · 1 For each element j:  i x i ¸ 1 (summed over x i, j 2 S i ) Randomized Rounding: For each set S i : pick it to the cover with probability x i Analysis: Exp[cost of cover] =  i c i x i = LP cost Pr[element j is not covered] = Conclusion: probability of covering element j is at least a constant!

Rounding a Fractional Solution (2) Amplify probability of success: Repeat experiment clogn times so that Pr[element j is not covered] Analysis: Pr[some element is not covered] Exp[cost of cover] = O(logn)  i c i x i = O(logn)(LP cost) Conclusion: approximation factor is O(logn)

Set Cover: Greedy Algorithm Initially: C is empty While there is an uncovered element: Add to C the set S i minimizing c i /(# new elements covered) Analysis: via dual fitting Primal: covering ¸ dual: packing

Dual Fitting (1) Primal solution is feasible Define a dual solution: if element j is covered by set S i then y j = c i /(# new elements covered by S i ) In the iteration in which S i is picked: ¢ primal = ¢ dual = c i since cost of S i is “shared” between new elements covered by it Thus, cost of primal solution = cost of dual solution But is the dual solution feasible? Almost, but not quite …

Dual Fitting (2) Consider set S Suppose the elements in S are covered in the order e 1, …, e k When element e i is covered, Thus, Dividing dual variables by H(n) ¼ logn yields a feasible solution Greedy algorithm is O(logn)-approximation: primal · dual £ H(n)

Summary Linear programming: useful method for relaxing combinatorial problems Randomized rounding: going from a fractional solution to an integral solution without incurring too much damage Dual programs: useful for generating lower bounds useful for analyzing “primal” algorithms