153 results on '"Strongly polynomial"'
Search Results
2. A strongly polynomial algorithm for linear programs with at most two nonzero entries per row or column
- Author
-
Dadush, D.N. (Daniel), Koh, Z.K. (Zhuan Khye), Natura, B. (Bento), Olver, N.K. (Neil), Végh, L.A. (László), Dadush, D.N. (Daniel), Koh, Z.K. (Zhuan Khye), Natura, B. (Bento), Olver, N.K. (Neil), and Végh, L.A. (László)
- Abstract
We give a strongly polynomial algorithm for minimum cost generalized flow, and hence for optimizing any linear program with at most two non-zero entries per row, or at most two non-zero entries per column. Primal and dual feasibility were shown by Végh (MOR '17) and Megiddo (SICOMP '83), respectively. Our result can be viewed as progress towards understanding whether all linear programs can be solved in strongly polynomial time, also referred to as Smale's 9th problem. Our approach is based on the recent primal-dual interior point method (IPM) by Allamigeon, Dadush, Loho, Natura, and Végh (FOCS '22). The number of iterations needed by the IPM is bounded, up to a polynomial factor in the number of inequalities, by the straight line complexity of the central path. Roughly speaking, this is the minimum number of pieces of any piecewise linear curve that multiplicatively approximates the central path. As our main contribution, we show that the straight line complexity of any minimum cost generalized flow instance is polynomial in the number of arcs and vertices. By applying a reduction of Hochbaum (ORL '04), the same bound applies to any linear program with at most two non-zeros per column or per row. To be able to run the IPM, one requires a suitable initial point. For this purpose, we develop a novel multistage approach, where each stage can be solved in strongly polynomial time given the result of the previous stage. Beyond this, substantial work is needed to ensure that the bit complexity of each iterate remains bounded during the execution of the algorithm. For this purpose, we show that one can maintain a representation of the iterates as a low complexity convex combination of vertices and extreme rays. Our approach is black-box and can be applied to any log-barrier path-following method.
- Published
- 2024
- Full Text
- View/download PDF
3. A fast maximum flow algorithm.
- Author
-
Orlin, James B. and Gong, Xiao‐yue
- Subjects
ALGORITHMS - Abstract
In 2013, Orlin proved that the max flow problem could be solved in O(nm) time. His algorithm ran in O(nm + m1.94) time, which was the fastest for graphs with fewer than n1.06 arcs. If the graph was not sufficiently sparse, the fastest running time was an algorithm due to King, Rao, and Tarjan. We describe a new variant of the excess scaling algorithm for the max flow problem whose running time strictly dominates the running time of the algorithm by King et al. For graphs in which m = O(nlog n), the running time of our algorithm dominates that of King et al. by a factor of O(loglog n). Moreover, our algorithm achieves this improved performance without reliance on dynamic trees. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. Generalized Littlewood–Richardson coefficients for branching rules of GL(n)and extremal weight crystals
- Author
-
Brett Collins
- Subjects
Pure mathematics ,Mathematics::Combinatorics ,Strongly polynomial ,Diagonal ,Quiver ,Discrete Mathematics and Combinatorics ,Embedding ,Weight space ,Mathematics::Representation Theory ,Branching (polymer chemistry) ,Mathematics - Abstract
Following the methods used by Derksen-Weyman in \cite{DW11} and Chindris in \cite{Chi08}, we use quiver theory to represent the generalized Littlewood-Richardson coefficients for the branching rule for the diagonal embedding of $\gl(n)$ as the dimension of a weight space of semi-invariants. Using this, we prove their saturation and investigate when they are nonzero. We also show that for certain partitions the associated stretched polynomials satisfy the same conjectures as single Littlewood-Richardson coefficients. We then provide a polytopal description of this multiplicity and show that its positivity may be computed in strongly polynomial time. Finally, we remark that similar results hold for certain other generalized Littlewood-Richardson coefficients.
- Published
- 2020
- Full Text
- View/download PDF
5. Scheduling two projects with controllable processing times in a single-machine environment
- Author
-
Myoung-Ju Park and Byung-Cheon Choi
- Subjects
Mathematical optimization ,021103 operations research ,Supply chain management ,Computational complexity theory ,Computer science ,Tardiness ,0211 other engineering and technologies ,General Engineering ,0102 computer and information sciences ,02 engineering and technology ,Management Science and Operations Research ,01 natural sciences ,Scheduling (computing) ,010201 computation theory & mathematics ,Artificial Intelligence ,Strongly polynomial ,Interim ,Software - Abstract
We consider two single-machine scheduling problems in which two competing projects share one common resource. Each project has multiple interim assessments, and its own jobs are ordered completely. A tardy job incurs a tardiness penalty cost which can be avoided by compressing some jobs, which requires an additional cost. The performance measure of each project is the total tardiness penalty cost plus the total compression cost. The first problem minimizes the weighted sum of the performance measures of two projects, and the second problem minimizes the performance measure of one project with a constraint on that of the other. We show that the first problem is solvable in strongly polynomial time and the second is weakly NP-hard. Furthermore, we analyze how the computational complexity of each problem changes if the number of projects is more than two.
- Published
- 2020
- Full Text
- View/download PDF
6. Inverse optimal value problem on minimum spanning tree under unit $$l_{\infty }$$ norm
- Author
-
Xiucui Guan, Binwu Zhang, and Qiao Zhang
- Subjects
021103 operations research ,Control and Optimization ,Spanning tree ,0211 other engineering and technologies ,Inverse ,010103 numerical & computational mathematics ,02 engineering and technology ,Minimum spanning tree ,01 natural sciences ,Running time ,Combinatorics ,Strongly polynomial ,Norm (mathematics) ,Weight ,0101 mathematics ,Mathematics - Abstract
We consider the inverse optimal value problem on minimum spanning tree under unit $$l_{\infty }$$ norm. Given an edge weighted connected undirected network $$G=(V, E, {\varvec{w}})$$ and a spanning trees $$T^0$$ , we aim to modify the weights of the edges such that $$T^0$$ is the minimum spanning tree under the new weight vector whose weight is equal to a given value K and the modification cost under unit $$l_{\infty }$$ norm is minimized. We present a mathematical model of the problem. After analyzing the properties, we propose a sufficient and necessary condition for optimal solutions of the problem. Then we develop a strongly polynomial time algorithm with running time O(|V||E|). Finally, we give an example to demonstrate the algorithm.
- Published
- 2020
- Full Text
- View/download PDF
7. Polymatroid-based capacitated packing of branchings
- Author
-
Tatsuya Matsuoka, Zoltán Szigeti, Optimisation Combinatoire (G-SCOP_OC ), Laboratoire des sciences pour la conception, l'optimisation et la production (G-SCOP), and Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])
- Subjects
021103 operations research ,Arborescence ,Generalization ,Applied Mathematics ,Graph algorithm ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Directed graph ,Arborescence packing ,01 natural sciences ,Matroid ,Combinatorics ,Packing problems ,010201 computation theory & mathematics ,Strongly polynomial ,[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,Discrete Mathematics and Combinatorics ,Polymatroid ,Graph algorithms ,Arc capacity ,Mathematics - Abstract
International audience; Edmonds (1973) characterized the condition for the existence of a packing of spanning arborescences and also that of spanning branchings in a directed graph. Durand de Gevigney, Nguyen and Szigeti (2013) generalized the spanning arborescence packing problem to a matroid-based arborescence packing problem and gave a necessary and sufficient condition for the existence of a packing and a polynomial-time algorithm.In this paper, a generalization of this latter problem – the polymatroid-based arborescence packing problem – is considered. Two problem settings are formulated: an unsplittable version and a splittable version. The unsplittable version is shown to be strongly NP-complete. Whereas, the splittable version, which generalizes the capacitated version of the spanning arborescence packing problem, can be solved in strongly polynomial time. For convenience, we provide a strongly polynomial-time algorithm for the problem of the polymatroid-based capacitated packing of branchings for the splittable version.
- Published
- 2019
- Full Text
- View/download PDF
8. Vanishing of Littlewood–Richardson polynomials is in P
- Author
-
Alexander Yong, Colleen Robichaux, and Anshul Adve
- Subjects
Mathematics::Combinatorics ,Computational complexity theory ,Linear programming ,Generalization ,General Mathematics ,Schubert calculus ,020206 networking & telecommunications ,Polytope ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Computational Mathematics ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Strongly polynomial ,0202 electrical engineering, electronic engineering, information engineering ,Equivariant cohomology ,Order (group theory) ,Mathematics - Abstract
J. De Loera & T. McAllister and K. D. Mulmuley & H. Narayanan & M. Sohoni independently proved that determining the vanishing of Littlewood–Richardson coefficients has strongly polynomial time computational complexity. Viewing these as Schubert calculus numbers, we prove the generalization to the Littlewood–Richardson polynomials that control equivariant cohomology of Grassmannians. We construct a polytope using the edge-labeled tableau rule of H. Thomas, A. Yong. Our proof then combines a saturation theorem of D. Anderson, E. Richmond, A. Yong, a reading order independence property, and E. Tardos’ algorithm for combinatorial linear programming.
- Published
- 2019
- Full Text
- View/download PDF
9. The Simplex Method is Strongly Polynomial for Deterministic Markov Decision Processes.
- Author
-
Post, Ian and Yinyu Ye
- Subjects
SIMPLEX algorithm ,MARKOV processes ,MATHEMATICAL analysis ,SIMPLEXES (Mathematics) ,POLYNOMIALS - Abstract
We prove that the simplex method with the highest gain/most-negative-reduced cost pivoting rule converges in strongly polynomial time for deterministic Markov decision processes (MDPs) regardless of the discount factor. For a deterministic MDP with n states and m actions, we prove the simplex method runs in O4n³m² log² n
5 iterations if the discount factor is uniform and O4n5 m³ log² n5 iterations if each action has a distinct discount factor. Previously the simplex method was known to run in polynomial time only for discounted MDPs where the discount was bounded away from 1. [ABSTRACT FROM AUTHOR]- Published
- 2015
- Full Text
- View/download PDF
10. Network Reconfiguration with Orientation-Dependent Transit Times
- Author
-
Urmila Pyakurel, Hari Nandan Nath, and Tanka Nath Dhamala
- Subjects
Mathematical optimization ,021103 operations research ,Network construction ,Article Subject ,0211 other engineering and technologies ,Transit time ,02 engineering and technology ,Network reconfiguration ,Orientation (graph theory) ,Arc (geometry) ,Mathematics (miscellaneous) ,Flow (mathematics) ,Strongly polynomial ,0202 electrical engineering, electronic engineering, information engineering ,QA1-939 ,020201 artificial intelligence & image processing ,Mathematics - Abstract
Motivated by applications in evacuation planning, we consider a problem of optimizing flow with arc reversals in which the transit time depends on the orientation of the arc. In the considered problems, the transit time on an arc may change when it is reversed, contrary to the problems considered in the existing literature. Extending the existing idea of auxiliary network construction to allow asymmetric transit time on arcs, we present strongly polynomial time algorithms for solving single-source-single-sink maximum dynamic contraflow problem and quickest contraflow problem. The results are substantiated by a computational experiment in a Kathmandu road network. An algorithm to solve the corresponding earliest arrival contraflow problem with a pseudo-polynomial-time complexity is also presented. The partial contraflow approach for the corresponding problems has also been discussed.
- Published
- 2021
- Full Text
- View/download PDF
11. A fast maximum flow algorithm
- Author
-
James B. Orlin and Xiao-Yue Gong
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Strongly polynomial ,Maximum flow problem ,Mathematical analysis ,Flow network ,Contraction (operator theory) ,Software ,Information Systems ,Mathematics ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
© 2020 Wiley Periodicals LLC. In 2013, Orlin proved that the max flow problem could be solved in O(nm) time. His algorithm ran in O(nm + m1.94) time, which was the fastest for graphs with fewer than n1.06 arcs. If the graph was not sufficiently sparse, the fastest running time was an algorithm due to King, Rao, and Tarjan. We describe a new variant of the excess scaling algorithm for the max flow problem whose running time strictly dominates the running time of the algorithm by King et al. For graphs in which m = O(nlog n), the running time of our algorithm dominates that of King et al. by a factor of O(loglog n). Moreover, our algorithm achieves this improved performance without reliance on dynamic trees.
- Published
- 2021
12. Extended Formulations for Stable Set Polytopes of Graphs Without Two Disjoint Odd Cycles
- Author
-
Samuel Fiorini, Stefan Weltge, Tony Huynh, and Michele Conforti
- Subjects
050101 languages & linguistics ,05 social sciences ,Polytope ,02 engineering and technology ,Disjoint sets ,Construct (python library) ,Graph ,Combinatorics ,Integer ,Strongly polynomial ,Independent set ,Extended formulation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Mathematics - Abstract
Let G be an n-node graph without two disjoint odd cycles. The algorithm of Artmann, Weismantel and Zenklusen (STOC’17) for bimodular integer programs can be used to find a maximum weight stable set in G in strongly polynomial time. Building on structural results characterizing sufficiently connected graphs without two disjoint odd cycles, we construct a size-\(O(n^2)\) extended formulation for the stable set polytope of G.
- Published
- 2020
- Full Text
- View/download PDF
13. Hitting a path: a generalization of weighted connectivity via game theory
- Author
-
Dávid Szeszlér
- Subjects
Computer Science::Computer Science and Game Theory ,021103 operations research ,Control and Optimization ,Theoretical computer science ,Computer science ,Applied Mathematics ,Reliability (computer networking) ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Computer Science Applications ,Network element ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Strongly polynomial ,Theory of computation ,Security metric ,Discrete Mathematics and Combinatorics ,Game theory ,Computer Science::Cryptography and Security - Abstract
Applying game-theoretical tools for measuring the reliability of a network has become very common. The basic idea is very natural: analyzing an appropriately defined attacker–defender game might give rise to a relevant security metric. In this paper we consider a very natural set of games: the Defender chooses a path P between two given nodes and the Attacker chooses a network element a (that is, an edge or a node). In all cases, the Attacker has to pay a given cost of attack c(a); if, however, a is on P then he also gains a given profit of d(a). We determine the value of various versions of this game and show that the thus arising reliability metrics provide a generalization of weighted connectivity of graphs. We also prove that the values of the games and optimum mixed strategies for both players can be computed in strongly polynomial time.
- Published
- 2018
- Full Text
- View/download PDF
14. An $$O(n(m+n\log n)\log n)$$O(n(m+nlogn)logn) time algorithm to solve the minimum cost tension problem
- Author
-
Mehdi Ghiyasvand
- Subjects
021103 operations research ,Control and Optimization ,Tension (physics) ,Applied Mathematics ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Binary logarithm ,Flow network ,01 natural sciences ,Computer Science Applications ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Strongly polynomial ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Theory of computation ,Discrete Mathematics and Combinatorics ,Algorithm ,Time complexity ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
This paper presents an $$O(n(m+n\log n)\log n)$$ time algorithm to solve the minimum cost tension problem, where n and m denote the number of nodes and number of arcs, respectively. The algorithm is inspired by Orlin (Oper Res 41:338–350, 1993) and improves upon the previous best strongly polynomial time of $$O(\max \{m^3n, m^2\log n(m+n\log n)\})$$ due to Ghiyasvand (J Comb Optim 34:203–217, 2017).
- Published
- 2018
- Full Text
- View/download PDF
15. Covering Triangles in Edge-Weighted Graphs
- Author
-
Xujin Chen, Zhongzheng Tang, Xiaodong Hu, and Zhuo Diao
- Subjects
Physics ,Hypergraph ,021103 operations research ,Conjecture ,Simple graph ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Combinatorial algorithms ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Computational Theory and Mathematics ,Cover (topology) ,Integer ,010201 computation theory & mathematics ,Strongly polynomial ,Unit (ring theory) - Abstract
Let G = (V, E) be a simple graph and $\mathbf {w}\in \mathbb {Z}^{E}_{>0}$ assign each edge e ∈ E a positive integer weight w(e). A subset of E that intersects every triangle of G is called a triangle cover of (G, w), and its weight is the total weight of its edges. A collection of triangles in G (repetition allowed) is called a triangle packing of (G, w) if each edge e ∈ E appears in at most w(e) members of the collection. Let τ t (G, w) and ν t (G, w) denote the minimum weight of a triangle cover and the maximum cardinality of a triangle packing of (G, w), respectively. Generalizing Tuza’s conjecture for unit weight, Chapuy et al. conjectured that τ t (G, w)/ν t (G, w) ≤ 2 holds for every simple graph G and every $\mathbf {w}\in \mathbb {Z}^{E}_{>0}$ . In this paper, using a hypergraph approach, we design polynomial-time combinatorial algorithms for finding triangle covers of small weights. These algorithms imply new sufficient conditions for the conjecture of Chapuy et al. More precisely, given (G, w), suppose that all edges of G are covered by the set ${\mathscr {T}}_{G}$ consisting of edge sets of triangles in G. Let $|E|_{w}={\sum }_{e\in E}w(e)$ and $|{\mathscr {T}}_{G}|_{w}={\sum }_{\{e,f,g\}\in {\mathscr {T}}_{G}}w(e)w(f)w(g)$ denote the weighted numbers of edges and triangles in (G, w), respectively. We show that a triangle cover of (G, w) of weight at most 2ν t (G, w) can be found in strongly polynomial time if one of the following conditions is satisfied: (i) $\nu _{t}(G,\mathbf {w})/|{\mathscr {T}}_{G}|_{w}\ge \frac {1}{3}$ , (ii) $\nu _{t}(G,\mathbf {w})/|E|_{w}\ge \frac {1}{4}$ , (iii) $|E|_{w}/|{\mathscr {T}}_{G}|_{w}\ge 2$ .
- Published
- 2018
- Full Text
- View/download PDF
16. Log-Barrier Interior Point Methods Are Not Strongly Polynomial
- Author
-
Xavier Allamigeon, Pascal Benchimol, Stéphane Gaubert, Michael Joswig, TROPICAL (TROPICAL), Centre de Mathématiques Appliquées - Ecole Polytechnique (CMAP), École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Matériaux et Mécanique des Composants (EDF R&D MMC), EDF R&D (EDF R&D), EDF (EDF)-EDF (EDF), Technical University of Berlin / Technische Universität Berlin (TU), DGA fellowship, PGMO program of FondationMath\'ematique Jacques Hadamard (EDF, Orange, Thales), Einstein Foundation Berlin, DFG (SPP 1489,SFB/TRR 109, SFB/TRR 195), CNRS INSMI visiting professorship at CMAP, Ecole Polytechnique, UMR 7641 and at IMJ, Université Pierre et Marie Curie, UMR 7586, National Science Foundation under grant1440140 while at the Mathematical Sciences Research Institute in Berkeley, California., and Technische Universität Berlin (TU)
- Subjects
Pure mathematics ,021103 operations research ,Algebra and Number Theory ,Linear programming ,Applied Mathematics ,010102 general mathematics ,0211 other engineering and technologies ,02 engineering and technology ,01 natural sciences ,Dimension (vector space) ,Optimization and Control (math.OC) ,90C51, 14T05 ,Strongly polynomial ,[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,FOS: Mathematics ,Tropical geometry ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC] ,Geometry and Topology ,0101 mathematics ,Mathematics - Optimization and Control ,Interior point method ,Mathematics - Abstract
We prove that primal-dual log-barrier interior point methods are not strongly polynomial, by constructing a family of linear programs with $3r+1$ inequalities in dimension $2r$ for which the number of iterations performed is in $\Omega(2^r)$. The total curvature of the central path of these linear programs is also exponential in $r$, disproving a continuous analogue of the Hirsch conjecture proposed by Deza, Terlaky and Zinchenko. Our method is to tropicalize the central path in linear programming. The tropical central path is the piecewise-linear limit of the central paths of parameterized families of classical linear programs viewed through logarithmic glasses. This allows us to provide combinatorial lower bounds for the number of iterations and the total curvature, in a general setting., Comment: This paper supersedes arXiv:1405.4161. 31 pages, 5 figures, 1 table
- Published
- 2018
- Full Text
- View/download PDF
17. A POLYNOMIAL PREDICTOR-CORRECTOR TRUST-REGION ALGORITHM FOR LINEAR PROGRAMMING.
- Author
-
GUANGHUI LAN, MONTEIRO, RENATO D. C., and TSUCHIYA, TAKASHI
- Subjects
- *
ALGORITHMS , *POLYNOMIALS , *LINEAR programming , *INTERIOR-point methods , *AFFINE geometry , *MATHEMATICAL programming - Abstract
In this paper we present a scaling-invariant, interior-point, predictor-corrector type algorithm for linear programming (LP) whose iteration-complexity is polynomially bounded by the dimension and the logarithm of a certain condition number of the LP constraint matrix. At the predictor stage, the algorithm either takes the step along the standard affine scaling (AS) direction or a new trust-region type direction, whose construction depends on a scaling-invariant bipartition of the variables determined by the AS direction. This contrasts with the layered least squares direction introduced in S. Vavasis and Y. Ye [Math. Program., 74 (1996), pp. 79-120], whose construction depends on multiple-layered partitions of the variables that are not scaling-invariant. Moreover, it is shown that the overall arithmetic complexity of the algorithm (weakly) depends on the right-hand side and the cost of the LP in view of the work involved in the computation of the trust region steps. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
18. A strong bound on the integral of the central path curvature and its relationship with the iteration-complexity of primal-dual path-following LP algorithms.
- Author
-
Monteiro, Renato and Tsuchiya, Takashi
- Subjects
- *
LINEAR programming , *ALGORITHMS , *MATRICES (Mathematics) , *CURVATURE , *INTERIOR-point methods , *VECTOR analysis - Abstract
The main goals of this paper are to: i) relate two iteration-complexity bounds derived for the Mizuno-Todd-Ye predictor-corrector (MTY P-C) algorithm for linear programming (LP), and; ii) study the geometrical structure of the LP central path. The first iteration-complexity bound for the MTY P-C algorithm considered in this paper is expressed in terms of the integral of a certain curvature function over the traversed portion of the central path. The second iteration-complexity bound, derived recently by the authors using the notion of crossover events introduced by Vavasis and Ye, is expressed in terms of a scale-invariant condition number associated with m × n constraint matrix of the LP. In this paper, we establish a relationship between these bounds by showing that the first one can be majorized by the second one. We also establish a geometric result about the central path which gives a rigorous justification based on the curvature of the central path of a claim made by Vavasis and Ye, in view of the behavior of their layered least squares path following LP method, that the central path consists of $${\mathcal{O}}(n^2)$$ long but straight continuous parts while the remaining curved part is relatively “short”. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
19. Solving the MCQP, MLT, and MMLT problems and computing weakly and strongly stable quickest paths
- Author
-
Mehdi Ghiyasvand and Azam Ramezanipour
- Subjects
021103 operations research ,0211 other engineering and technologies ,Sigma ,020206 networking & telecommunications ,02 engineering and technology ,Binary logarithm ,Combinatorics ,Tree traversal ,Strongly polynomial ,Shortest path problem ,0202 electrical engineering, electronic engineering, information engineering ,Special property ,Electrical and Electronic Engineering ,Transmission time ,Computer communication networks ,Mathematics - Abstract
The quickest path problem consists of finding a path in a directed network to transmit a given amount $$\sigma $$ of items from a source node to a sink node with minimal transmission time, where the transmission time depends on the traversal times $$\tau $$ and the capacities u of the arcs. We suppose that there exist more than one quickest path and finds a quickest path with a special property. In this paper, first, some algorithms to find a quickest path with minimum capacity, minimum lead time, and min-max arc lead time are presented, which runs in $$O(r(m+n \log n))$$ and $$ O((r(m+n \log n))\log r') $$ time, where r and $$ r' $$ are the number of distinct capacity and lead time values and m and n are the number of arcs and nodes in the given network. Then, we suppose that values $$\sigma , \tau $$ and u change to $$\sigma ', \tau '$$ , and $$u'$$ . The purpose is to find a quickest path such that it has the minimum transmission time value among all quickest paths, by changing $$\sigma $$ to $$\sigma '$$ , $$\tau $$ to $$\tau '$$ , or u to $$u'$$ . We show that some of these problems are solved in strongly polynomial time and the others remain as open problems.
- Published
- 2017
- Full Text
- View/download PDF
20. A strongly polynomial Contraction-Expansion algorithm for network flow problems
- Author
-
Jacques Desrosiers, Marco E. Lbbecke, and Jean Bertrand Gauthier
- Subjects
Scheme (programming language) ,Mathematical optimization ,021103 operations research ,Simplex ,General Computer Science ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Management Science and Operations Research ,Residual ,Flow network ,01 natural sciences ,010201 computation theory & mathematics ,Contraction expansion ,Strongly polynomial ,Modeling and Simulation ,Minimum-cost flow problem ,Algorithm ,Contraction (operator theory) ,computer ,computer.programming_language ,Mathematics - Abstract
This paper addresses the solution of the capacitated minimum cost flow problem on a network containingn nodes and m arcs. Satisfying necessary and sufficient optimality conditions can be done on the residual network although it can be quite time consuming as testified by the minimum mean cycle-canceling algorithm (MMCC). We introduce a contracted network which exploits these conditions on a much smaller network. Since the construction of this contracted network is very flexible, we study its properties depending on the construction choice. A generic contraction algorithm is then produced around the contracted network. Interestingly enough, it turns out it encapsulates both the MMCC and primal network simplex algorithms as extreme cases. By guiding the solution using a particular expansion scheme, we are able to recuperate theoretical results from MMCC. As such, we obtain a strongly polynomial Contraction-Expansion algorithm which runs in O(m3n2) time. There is thus no improvement of the runtime complexity, yet the expansion scheme sticks to very practical observations of MMCCs behavior, namely that of phases and jumps on the optimality parameter. The solution time is ultimately significantly reduced, even more so as the size of the instance increases.
- Published
- 2017
- Full Text
- View/download PDF
21. A NEW ITERATION-COMPLEXITY BOUND FOR THE MTY PREDICTOR-CORRECTOR ALGORITHM.
- Author
-
Monteiro, Renato D. C. and Tsuchiya, Takashi
- Subjects
- *
ALGORITHMS , *LINEAR programming , *MATRICES (Mathematics) , *MATHEMATICAL programming , *MATHEMATICS - Abstract
In this paper we present a new iteration-complexity bound for the Mizuno--Todd--Ye predictor-corrector (MTY P-C) primal-dual interior-point algorithm for linear programming. The analysis of the paper is based on the important notion of crossover events introduced by Vavasis and Ye. For a standard form linear program min {cTχ: Aχ = b, &chi ≥ 0 } with decision variable ..., we show that the MTY P-C algorithm, started from a well-centered interior-feasible solution with duality gap nμ0 finds an interior-feasible solution with duality gap less than nn in O (T(μ0/η)+n3.5 log (Χ*A)) iterations, where T(t ) =min {n² log (log t), log t} for all t>0 and Χ*A is a scaling invariant condition number associated with the matrix A. More specifically,Χ*A is the infimum of all the conditions numbers XAD, where D varies over the set of positive diagonal matrices. Under the setting of the Turing machine model, our analysis yields an O (n3.5 LA + min {n² log L, L}) iteration-complexity bound for the MTY P-C algorithm to find a primal-dual optimal solution, where LA and L are the input sizes of the matrix A and the data (A,b,c ), respectively. This contrasts well with the classical iteration-complexity bound for the MTY P-C algorithm, which depends linearly on L instead of log L. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
22. Extended Formulations for Stable Set Polytopes of Graphs Without Two Disjoint Odd Cycles
- Author
-
Samuel Fiorini, Stefan Weltge, Michele Conforti, and Tony Huynh
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,General Mathematics ,0211 other engineering and technologies ,Polytope ,0102 computer and information sciences ,02 engineering and technology ,Disjoint sets ,01 natural sciences ,Combinatorics ,FOS: Mathematics ,Mathematics - Combinatorics ,90C27, 90C10, 05C85 ,Mathematics - Optimization and Control ,Mathematics ,021103 operations research ,Numerical analysis ,Graph ,010201 computation theory & mathematics ,Strongly polynomial ,Optimization and Control (math.OC) ,Independent set ,Extended formulation ,Combinatorics (math.CO) ,Software ,Computer Science - Discrete Mathematics - Abstract
Let $G$ be an $n$-node graph without two disjoint odd cycles. The algorithm of Artmann, Weismantel and Zenklusen (STOC'17) for bimodular integer programs can be used to find a maximum weight stable set in $G$ in strongly polynomial time. Building on structural results characterizing sufficiently connected graphs without two disjoint odd cycles, we construct a size-$O(n^2)$ extended formulation for the stable set polytope of $G$., 19 pages, 3 figures
- Published
- 2019
23. A double-pivot simplex algorithm and its upper bounds of the iteration numbers
- Author
-
Yaguang Yang
- Subjects
Linear programming ,Applied Mathematics ,010102 general mathematics ,Mathematics::Optimization and Control ,Markov decision problem ,Approx ,01 natural sciences ,Theoretical Computer Science ,010101 applied mathematics ,Combinatorics ,Computational Mathematics ,90C05 90C49 ,Mathematics (miscellaneous) ,Unimodular matrix ,Simplex methods ,Simplex algorithm ,Optimization and Control (math.OC) ,Strongly polynomial ,FOS: Mathematics ,0101 mathematics ,Cube ,Mathematics - Optimization and Control ,Mathematics - Abstract
In this paper, a double-pivot simplex method is proposed. Two upper bounds of iteration numbers are derived. Applying one of the bounds to some special linear programming (LP) problems, such as LP with a totally unimodular matrix and Markov Decision Problem (MDP) with a fixed discount rate, indicates that the double-pivot simplex method solves these problems in a strongly polynomial time. A variant of Klee-Minty cube is used to show that the estimated bounds of the iteration numbers are very tight. Numerical test on three variants of Klee-Minty cubes is performed for the problems with sizes as big as $200$ constraints and $400$ variables. Dantzig's simplex method cannot handle Klee-Minty cube problem with $200$ constraints because it needs about $2^{200} \approx 10^{60}$ iterations. But the proposed algorithm performs extremely good for all three variants., 22 pages, 4 figures
- Published
- 2019
24. An Improved Approximation Algorithm for Maximin Shares
- Author
-
Jugal Garg and Setareh Taki
- Subjects
FOS: Computer and information sciences ,Linguistics and Language ,Mathematical optimization ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Measure (mathematics) ,Language and Linguistics ,Set (abstract data type) ,Artificial Intelligence ,Computer Science - Computer Science and Game Theory ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,SIMPLE algorithm ,Discrete mathematics ,Series (mathematics) ,Approximation algorithm ,Minimax ,Strongly polynomial algorithm ,Strongly polynomial ,010201 computation theory & mathematics ,Bundle ,020201 artificial intelligence & image processing ,Fair division ,Computer Science and Game Theory (cs.GT) - Abstract
Fair division is a fundamental problem in various multi-agent settings, where the goal is to divide a set of resources among agents in a fair manner. We study the case where m indivisible items need to be divided among n agents with additive valuations using the popular fairness notion of maximin share (MMS). An MMS allocation provides each agent a bundle worth at least her maximin share. While it is known that such an allocation need not exist, a series of work provided approximation algorithms for a 2/3-MMS allocation in which each agent receives a bundle worth at least 2/3 times her maximin share. More recently, Ghodsi et al. [EC'2018] showed the existence of a 3/4-MMS allocation and a PTAS to find a (3/4-\epsilon)-MMS allocation for an \epsilon > 0. Most of the previous works utilize intricate algorithms and require agents' approximate MMS values, which are computationally expensive to obtain. In this paper, we develop a new approach that gives a simple algorithm for showing the existence of a 3/4-MMS allocation. Furthermore, our approach is powerful enough to be easily extended in two directions: First, we get a strongly polynomial-time algorithm to find a 3/4-MMS allocation, where we do not need to approximate the MMS values at all. Second, we show that there always exists a (3/4 + 1/(12n))-MMS allocation, improving the best previous factor. This improves the approximation guarantee, most notably for small n. We note that 3/4 was the best factor known for n> 4., Comment: Fixed typos and added more details. A two-page abstract appeared in ACM EC 2020
- Published
- 2019
25. An auction-based approach for the re-optimization shortest path tree problem
- Author
-
Antonio Napoletano, Paola Festa, Francesca Guerriero, Festa, P., Guerriero, F., and Napoletano, A.
- Subjects
Mathematical optimization ,021103 operations research ,Control and Optimization ,Shortest path ,Applied Mathematics ,Computation ,Shortest-path tree ,0211 other engineering and technologies ,Re-optimization ,Network ,010103 numerical & computational mathematics ,02 engineering and technology ,Auction algorithm ,01 natural sciences ,Computational Mathematics ,Exact algorithm ,Strongly polynomial ,Shortest path problem ,Graph (abstract data type) ,0101 mathematics ,Auction approach ,Mathematics ,Re optimization - Abstract
The shortest path tree problem is one of the most studied problems in network optimization. Given a directed weighted graph, the aim is to find a shortest path from a given origin node to any other node of the graph. When any change occurs (i.e., the origin node is changed, some nodes/arcs are added/removed to/from the graph, the cost of a subset of arcs is increased/decreased), in order to determine a (still) optimal solution, two different strategies can be followed: a re-optimization algorithm is applied starting from the current optimal solution or a new optimal solution is built from scratch. Generally speaking, the Re-optimization Shortest Path Tree Problem (R-SPTP) consists in solving a sequence of shortest path problems, where the kth problem differs only slightly from the $$(k-1){th}$$ one, by exploiting the useful information available after each shortest path tree computation. In this paper, we propose an exact algorithm for the R-SPTP, in the case of origin node change. The proposed strategy is based on a dual approach, which adopts a strongly polynomial auction algorithm to extend the solution under construction. The approach is evaluated on a large set of test problems. The computational results underline that it is very promising and outperforms or at least is not worse than the solution approaches reported in the literature.
- Published
- 2019
26. Some LCPs solvable in strongly polynomial time with Lemke’s algorithm
- Author
-
Richard W. Cottle, Ilan Adler, and Jong-Shi Pang
- Subjects
Discrete mathematics ,0209 industrial biotechnology ,021103 operations research ,General Mathematics ,Numerical analysis ,0211 other engineering and technologies ,Monotonic function ,02 engineering and technology ,Lemke's algorithm ,Direction vector ,020901 industrial engineering & automation ,Strongly polynomial ,Software ,Parametric statistics ,Mathematics - Abstract
We identify a class of Linear Complementarity Problems (LCPs) that are solvable in strongly polynomial time by Lemke's Algorithm (Scheme 1) or by the Parametric Principal Pivoting Method (PPPM). This algorithmic feature for the class of problems under consideration here is attributable to the proper selection of the covering vector in Scheme 1 or the parametric direction vector in the PPPM which leads to solutions of limited and monotonically increasing support size; such solutions are sparse. These and other LCPs may very well have multiple solutions, many of which are unattainable by either algorithm and thus are said to be elusive. The initial conditions imposed on the new matrix class identified in Sect. 2 are subsequently relaxed in later sections.
- Published
- 2016
- Full Text
- View/download PDF
27. Weakly and strongly polynomial algorithms for computing the maximum decrease in uniform arc capacities
- Author
-
Mehdi Ghiyasvand
- Subjects
feasible flow ,Computation ,Maximum flow problem ,optimal witness ,Management Science and Operations Research ,Arc (geometry) ,Combinatorics ,Strongly polynomial ,lcsh:T58.6-58.62 ,lcsh:Management information systems ,Time complexity ,Algorithm ,maximum flow ,Mathematics - Abstract
In this paper, a new problem on a directed network is presented. Let D be a feasible network such that all arc capacities are equal to U. Given a t > 0, the network D with arc capacities U - t is called the t-network. The goal of the problem is to compute the largest t such that the t-network is feasible. First, we present a weakly polynomial time algorithm to solve this problem, which runs in O(log(nU)) maximum flow computations, where n is the number of nodes. Then, an O(m2n) time approach is presented, where m is the number of arcs. Both the weakly and strongly polynomial algorithms are inspired by McCormick and Ervolina (1994).
- Published
- 2016
- Full Text
- View/download PDF
28. Approximation for the minimum cost doubly resolving set problem
- Author
-
Xujin Chen, Changjun Wang, and Xiaodong Hu
- Subjects
Discrete mathematics ,021103 operations research ,General Computer Science ,Total cost ,0211 other engineering and technologies ,Probabilistic logic ,Approximation algorithm ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Metric dimension ,Vertex (geometry) ,Combinatorics ,010201 computation theory & mathematics ,Strongly polynomial ,Resolving set ,Undirected graph ,Mathematics - Abstract
Locating source of diffusion in networks is crucial for controlling and preventing epidemic risks. It has been studied under various probabilistic models. In this paper, we study source location from a deterministic point of view by modeling it as the minimum cost doubly resolving set (DRS) problem, which is a strengthening of the well-known metric dimension problem.Let G be an undirected graph on n vertices, where each vertex has a nonnegative cost. A vertex subset S of G is a doubly resolving set (DRS) of G if for every pair of vertices u,v in G, there exist x,yS such that the difference of distances (in terms of number of edges) between u and x,y is not equal to the difference of distances between v and x,y. The minimum cost DRS problem consists of finding a DRS in G with minimum total cost. We establish (lnn) approximability of the minimum DRS problem on general graphs for both weighted and unweighted versions. This provides the first explicit lower and upper bounds on approximation for the minimum (cost) DRS, which are nearly tight. Moreover, we design the first known strongly polynomial time exact algorithms for the minimum cost DRS problem on general wheels and trees with additional constant k0 edges.
- Published
- 2016
- Full Text
- View/download PDF
29. Strongly Polynomial Algorithms for Transient and Average-Cost MDPs
- Author
-
Jefferson Huang and Eugene A. Feinberg
- Subjects
Mathematical optimization ,021103 operations research ,Linear programming ,Computer Networks and Communications ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,State (functional analysis) ,01 natural sciences ,010201 computation theory & mathematics ,Hardware and Architecture ,Strongly polynomial ,Transient (computer programming) ,Markov decision process ,Constant (mathematics) ,Software ,Average cost ,Mathematics - Abstract
This paper considers transient total-cost MDPs with transition rates whose values may be greater than one, and average-cost MDPs satisfying the condition that the expected time to hit a certain state from any initial state and under any stationary policy is bounded above by a constant. Linear programming formulations for such MDPs are provided that are solvable in strongly polynomial time.
- Published
- 2017
- Full Text
- View/download PDF
30. On strongly polynomial dual simplex algorithms for the maximum flow problem.
- Author
-
Goldfarb, Donald and Chen, Wei
- Abstract
Several pivot rules for the dual network simplex algorithm that enable it to solve a maximum flow problem on an n-node, m-arc network in at most 2 nm pivots and O( n
2 m) time are presented. These rules are based on the concept of a preflow and depend upon the use of node labels which are either the lengths of a shortest pseudoaugmenting path from those nodes to the sink node or valid underestimates of those lengths. Extended versions of our algorithms are shown to solve an important class of parametric maximum flow problems with no increase in the worst-case pivot and time bounds of these algorithms. [ABSTRACT FROM AUTHOR]- Published
- 1997
- Full Text
- View/download PDF
31. Strongly polynomial dual simplex methods for the maximum flow problem.
- Author
-
Armstrong, Ronald, Chen, Wei, Goldfarb, Donald, and Jin, Zhiying
- Abstract
This paper presents dual network simplex algorithms that require at most 2 nm pivots and O( n
2 m) time for solving a maximum flow problem on a network of n nodes and m arcs. Refined implementations of these algorithms and a related simplex variant that is not strictly speaking a dual simplex algorithm are shown to have a complexity of O( n3 ). The algorithms are based on the concept of a preflow and depend upon the use of node labels that are underestimates of the distances from the nodes to the sink node in the extended residual graph associated with the current flow. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V. [ABSTRACT FROM AUTHOR]- Published
- 1998
- Full Text
- View/download PDF
32. Polynomial dual network simplex algorithms.
- Author
-
Orlin, James, Plotkin, Serge, and Tardos, Éva
- Abstract
We show how to use polynomial and strongly polynomial capacity scaling algorithms for the transshipment problem to design a polynomial dual network simplex pivot rule. Our best pivoting strategy leads to an O( m log n) bound on the number of pivots, where n and m denotes the number of nodes and arcs in the input network. If the demands are integral and at most B, we also give an O( m( m+ n log n) min(log nB, m log n))-time implementation of a strategy that requires somewhat more pivots. [ABSTRACT FROM AUTHOR]
- Published
- 1993
- Full Text
- View/download PDF
33. A primal simplex algorithm that solves the maximum flow problem in at most nm pivots and O( n m) time.
- Author
-
Goldfarb, Donald and Hao, Jianxiu
- Abstract
We propose a primal network simplex algorithm for solving the maximum flow problem which chooses as the arc to enter the basis one that is closest to the source node from amongst all possible candidates. We prove that this algorithm requires at most nm pivots to solve a problem with n nodes and m arcs, and give implementations of it which run in O( n m) time. Our algorithm is, as far as we know, the first strongly polynomial primal simplex algorithm for solving the maximum flow problem. [ABSTRACT FROM AUTHOR]
- Published
- 1990
- Full Text
- View/download PDF
34. Polynomial-time primal simplex algorithms for the minimum cost network flow problem.
- Author
-
Goldfarb, Donald and Hao, Jianxiu
- Abstract
We present two variants of the primal network simplex algorithm which solve the minimum cost network flow problem in at most O( n log n) pivots. Here we define the network simplex method as a method which proceeds from basis tree to adjacent basis tree regardless of the change in objective function value; i.e., the objective function is allowed to increase on some iterations. The first method is an extension of the minimum mean augmenting cycle-canceling method of Goldberg and Tarjan. The second method is a combination of a cost-scaling technique and a primal network simplex method for the maximum flow problem. We also show that the diameter of the primal network flow polytope is at most n m. [ABSTRACT FROM AUTHOR]
- Published
- 1992
- Full Text
- View/download PDF
35. Exact Algorithms for Delay-Bounded Steiner Arborescences
- Author
-
Stephan Held and Benjamin Rockel
- Subjects
Topology (electrical circuits) ,0102 computer and information sciences ,02 engineering and technology ,Computer Science::Computational Geometry ,01 natural sciences ,Steiner tree problem ,020202 computer hardware & architecture ,symbols.namesake ,010201 computation theory & mathematics ,Strongly polynomial ,Bounded function ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Embedding ,Minimum-cost flow problem ,Computer Science::Data Structures and Algorithms ,Algorithm ,Bifurcation ,Mathematics - Abstract
Rectilinear Steiner arborescences under linear delay constraints play an important role for buffering. We present exact algorithms for either minimizing the total length subject to delay constraints, or minimizing the total length plus the (weighted) absolute total negative slack. Our main theoretical contribution is the first minimum cost flow formulation for embedding Steiner arborescences at minimum length subject to delay constraints, resulting in the first strongly polynomial time algorithm for this subproblem. We use the minimum cost flow formulation to quickly compute lower bounds in a branch-&-bound algorithm for optimum Steiner arborescences. We demonstrate the benefit of our new algorithm experimentally.
- Published
- 2018
- Full Text
- View/download PDF
36. Strongly polynomial efficient approximation scheme for segmentation
- Author
-
Nikolaj Tatti
- Subjects
FOS: Computer and information sciences ,Optimization problem ,Computational complexity theory ,Computer Science - Artificial Intelligence ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Strongly polynomial ,Quadratic equation ,Segmentation ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,Mathematics ,Discrete mathematics ,ta113 ,Sequence ,Approximation algorithm ,Histogram construction ,Approximation algorithms ,Computer Science Applications ,Term (time) ,Computational complexity ,Artificial Intelligence (cs.AI) ,010201 computation theory & mathematics ,Signal Processing ,020201 artificial intelligence & image processing ,Development (differential geometry) ,Information Systems - Abstract
Partitioning a sequence of length n into k coherent segments ( Seg ) is one of the classic optimization problems. As long as the optimization criterion is additive, Seg can be solved exactly in O ( n 2 k ) time using a classic dynamic program. Due to the quadratic term, computing the exact segmentation may be too expensive for long sequences, which has led to development of approximate solutions. We consider an existing estimation scheme that computes ( 1 + ϵ ) approximation in polylogarithmic time. We augment this algorithm, making it strongly polynomial. We do this by first solving a slightly different segmentation problem ( MaxSeg ), where the quality of the segmentation is the maximum penalty of an individual segment. By using this solution to initialize the estimation scheme, we are able to obtain a strongly polynomial algorithm. In addition, we consider a cumulative version of Seg , where we are asked to discover the optimal segmentation for each prefix of the input sequence. We propose a strongly polynomial algorithm that yields ( 1 + ϵ ) approximation in O ( n k 2 / ϵ ) time. Finally, we consider a cumulative version of MaxSeg , and show that we can solve the problem in O ( n k log k ) time.
- Published
- 2018
37. Geometric Rescaling Algorithms for Submodular Function Minimization
- Author
-
Giacomo Zambelli, László A. Végh, Daniel Dadush, Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands, and Czumaj, Artur
- Subjects
FOS: Computer and information sciences ,Polynomial ,Submodular function minimization ,Linear programming ,Iterative method ,General Mathematics ,0211 other engineering and technologies ,02 engineering and technology ,0102 computer and information sciences ,Management Science and Operations Research ,010501 environmental sciences ,01 natural sciences ,Oracle ,Submodular set function ,Gradient methods ,Simple (abstract algebra) ,Black box ,Computer Science - Data Structures and Algorithms ,FOS: Mathematics ,Data Structures and Algorithms (cs.DS) ,QA Mathematics ,Mathematics - Optimization and Control ,0105 earth and related environmental sciences ,Mathematics ,021103 operations research ,Computer Science Applications ,Rescaling ,Range (mathematics) ,Strongly polynomial ,010201 computation theory & mathematics ,Optimization and Control (math.OC) ,Algorithm - Abstract
We present a new class of polynomial-time algorithms for submodular function minimization (SFM), as well as a unified framework to obtain strongly polynomial SFM algorithms. Our algorithms are based on simple iterative methods for the minimum-norm problem, such as the conditional gradient and Fujishige-Wolfe algorithms. We exhibit two techniques to turn simple iterative methods into polynomial-time algorithms. Firstly, we adapt the geometric rescaling technique, which has recently gained attention in linear programming, to SFM and obtain a weakly polynomial bound $O(({n}^4\cdot \textrm{EO} + {n}^5)\log ({n} L))$. Secondly, we exhibit a general combinatorial black-box approach to turn $\varepsilon L$-approximate SFM oracles into strongly polynomial exact SFM algorithms. This framework can be applied to a wide range of combinatorial and continuous algorithms, including pseudo-polynomial ones. In particular, we can obtain strongly polynomial algorithms by a repeated application of the conditional gradient or of the Fujishige-Wolfe algorithm. Combined with the geometric rescaling technique, the black-box approach provides an $O(({n}^5\cdot \textrm{EO} +{n}^6)\log^2{n})$ algorithm. Finally, we show that one of the techniques we develop in the paper can also be combined with the cutting-plane method of Lee, Sidford, and Wong \cite{LSW}, yielding a simplified variant of their $O(n^3 \log^2 n \cdot \textrm{EO} + n^4\log^{O(1)} n)$ algorithm.
- Published
- 2018
- Full Text
- View/download PDF
38. Improved Fully Polynomial Approximation Schemes for the Maximum Lateness Minimization on a Single Machine with a Fixed Operator or Machine Non-Availability Interval
- Author
-
Hans Kellerer and Imed Kacem
- Subjects
Mathematical optimization ,021103 operations research ,Single-machine scheduling ,Computer science ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,Machine maintenance ,01 natural sciences ,Scheduling (computing) ,Dynamic programming ,010201 computation theory & mathematics ,Strongly polynomial ,Minification - Abstract
In this paper we consider the single machine scheduling problem with one non-availability interval to minimize the maximum lateness where jobs have positive tails. Two cases are considered. In the first one, the non-availability interval is due to the machine maintenance. In the second case, the non-availibility interval is related to the operator who is organizing the execution of jobs on the machine. The contribution of this paper consists in an improved FPTAS for the maintenance non-availability interval case and its extension to the operator non-availability interval case. The two FPTASs are strongly polynomial and outperform the recent ones by Kacem, Kellerer and Seifaddini presented in [12].
- Published
- 2018
- Full Text
- View/download PDF
39. Joint Data Compression and Caching: Approaching Optimality with Guarantees
- Author
-
Ananthram Swami, Kin K. Leung, Jian Li, Don Towsley, and Faheem Zafari
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Mathematical optimization ,Computer Science - Performance ,Computer science ,Approximation algorithm ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Energy consumption ,Network topology ,01 natural sciences ,Telecommunications network ,Computer Science - Networking and Internet Architecture ,Performance (cs.PF) ,010201 computation theory & mathematics ,Strongly polynomial ,0202 electrical engineering, electronic engineering, information engineering ,Latency (engineering) ,Data compression ,Energy constraint - Abstract
We consider the problem of optimally compressing and caching data across a communication network. Given the data generated at edge nodes and a routing path, our goal is to determine the optimal data compression ratios and caching decisions across the network in order to minimize average latency, which can be shown to be equivalent to maximizing the compression and caching gain under an energy consumption constraint. We show that this problem is NP-hard in general and the hardness is caused by the caching decision subproblem, while the compression sub-problem is polynomial-time solvable. We then propose an approximation algorithm that achieves a $(1-1/e)$-approximation solution to the optimum in strongly polynomial time. We show that our proposed algorithm achieve the near-optimal performance in synthetic-based evaluations. In this paper, we consider a tree-structured network as an illustrative example, but our results easily extend to general network topology at the expense of more complicated notations.
- Published
- 2018
- Full Text
- View/download PDF
40. A Strongly Polynomial Time Algorithm for the Maximum Supply Rate Problem on Trees
- Author
-
Koki Takayama and Yusuke Kobayashi
- Subjects
Vertex (graph theory) ,Connected component ,Strongly polynomial ,Partition problem ,Partition (number theory) ,Time complexity ,Algorithm ,Graph ,Mathematics - Abstract
Suppose that we are given a graph whose each vertex is either a supply vertex or a demand vertex and is assigned a nonnegative integer supply or demand value. We consider partitioning G into connected components by removing edges from G so that each connected component has exactly one supply vertex and there exists a flow in each connected component satisfying the supply/demand constraints. The problem that determines the existence of such a partition is called the partition problem. Ito et al. (2005) showed that the partition problem is \(\mathcal {NP}\)-complete in general and it can be solved in linear time if the given graph is a tree. When the graph does not have such a partition, we scale the demand values uniformly by scale factor r so that the obtained graph has a desired partition. The maximum supply rate problem is the problem that finds the maximum value of such r. Whereas the maximum supply rate problem is \(\mathcal {NP}\)-hard in general in the same way as the partition problem, Morishita and Nishizeki (2015) gave a weakly polynomial-time algorithm for the problem on trees.
- Published
- 2018
- Full Text
- View/download PDF
41. Penalty cost constrained identical parallel machine scheduling problem
- Author
-
Jianping Li, Xuejie Zhang, Weidong Li, and Zhibin Chen
- Subjects
Combinatorics ,Machine scheduling ,General Computer Science ,Job shop scheduling ,Strongly polynomial ,Approximation algorithm ,Partition (database) ,Polynomial-time approximation scheme ,Theoretical Computer Science ,Scheduling (computing) ,Running time ,Mathematics - Abstract
We consider a version of parallel machine scheduling with rejection. An instance of the problem is given by m identical parallel machines and a set of n independent jobs, with each job having a processing time and a penalty. A job may be accepted to be processed or be rejected at its penalty. The objective of the problem is to partition the set of jobs into two subsets, the subset of accepted and the subset of rejected jobs, and to schedule the set of accepted jobs such that the makespan is minimized under the constraint that the total penalty of the rejected jobs is no more than a given bound. In this paper, we present a 2-approximation algorithm within strongly polynomial time for the problem. We also present a polynomial time approximation scheme whose running time is O ( n m O ( 1 � 2 ) + mn 2 ) for the problem. Moreover, for the case where the number of machines is a fixed constant m, our results lead to a fully polynomial time approximation scheme for the problem. Our result is fairly good in the sense that in a reasonable size of jobs, our FPTAS improves previous best running time from O ( n m + 2 / � m ) to O ( 1 / � 2 m + 3 + mn 2 ) .
- Published
- 2015
- Full Text
- View/download PDF
42. The Simplex Method is Strongly Polynomial for Deterministic Markov Decision Processes
- Author
-
Yinyu Ye and Ian Post
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Discounting ,Linear programming ,General Mathematics ,MathematicsofComputing_NUMERICALANALYSIS ,Management Science and Operations Research ,Action (physics) ,Computer Science Applications ,Simplex algorithm ,Strongly polynomial ,Bounded function ,Computer Science - Data Structures and Algorithms ,ComputerApplications_GENERAL ,Data Structures and Algorithms (cs.DS) ,Markov decision process ,Time complexity ,Mathematics - Abstract
We prove that the simplex method with the highest gain/most-negative-reduced cost pivoting rule converges in strongly polynomial time for deterministic Markov decision processes (MDPs) regardless of the discount factor. For a deterministic MDP with n states and m actions, we prove the simplex method runs in O(n^3m^2log^2 n) iterations if the discount factor is uniform and O(n^5m^3log^2 n) iterations if each action has a distinct discount factor. Previously the simplex method was known to run in polynomial time only for discounted MDPs where the discount was bounded away from 1 [Ye11]. Unlike in the discounted case, the algorithm does not greedily converge to the optimum, and we require a more complex measure of progress. We identify a set of layers in which the values of primal variables must lie and show that the simplex method always makes progress optimizing one layer, and when the upper layer is updated the algorithm makes a substantial amount of progress. In the case of nonuniform discounts, we define a polynomial number of "milestone" policies and we prove that, while the objective function may not improve substantially overall, the value of at least one dual variable is always making progress towards some milestone, and the algorithm will reach the next milestone in a polynomial number of steps., Comment: Minor typo fixes and improvements over version 1. Appeared in SODA 2013
- Published
- 2015
- Full Text
- View/download PDF
43. A simpler and faster strongly polynomial algorithm for generalized flow maximization
- Author
-
Olver, N.K. (Neil), Végh, L.A. (László), Olver, N.K. (Neil), and Végh, L.A. (László)
- Published
- 2017
- Full Text
- View/download PDF
44. An improved version of Chubanov's method for solving a homogeneous feasibility problem
- Author
-
Kees Roos
- Subjects
Mathematical optimization ,Polynomial ,021103 operations research ,Control and Optimization ,algorithm ,Applied Mathematics ,Subroutine ,010102 general mathematics ,0211 other engineering and technologies ,linear homogeneous systems ,02 engineering and technology ,01 natural sciences ,Simple (abstract algebra) ,Homogeneous ,Strongly polynomial ,polynomial-time ,Applied mathematics ,Order (group theory) ,0101 mathematics ,Time complexity ,Software ,Dykstra's projection algorithm ,Mathematics - Abstract
We deal with a recently proposed method of Chubanov [A polynomial projection algorithm for linear feasibility problems. Math. Program. 153 (2015), pp. 687–713] for solving linear homogeneous systems with positive variables. Some improvements of Chubanov's method and its analysis are presented. We propose a new and simple cut criterion and show that the cuts defined by the new criterion are at least as sharp as in [1]. The new cut criterion reduces the iteration bound for his Basic Procedure by a factor 5, without changing the order of its strongly polynomial complexity. Our Modified Main Algorithm is in essence the same as Chubanov's Main Algorithm, except that it uses our Modified Basic Procedure as a subroutine. It is shown that it has (Formula presented.) time complexity, just as in [1]. Some promising computational results are presented, in comparison with the optimization package Gurobi.
- Published
- 2017
45. Improved Compact Models for the Resource-Constrained Project Scheduling Problem
- Author
-
Alexander Tesch
- Subjects
Linear map ,Project scheduling problem ,Class (set theory) ,Mathematical optimization ,Hierarchy (mathematics) ,Strongly polynomial ,Resource constrained ,Scheduling (production processes) ,State (functional analysis) ,Mathematics - Abstract
In this article, we study compact Mixed-Integer Programming (MIP) models for the Resource-Constrained Project Scheduling Problem (RCPSP). Compared to the classical time-indexed formulation, the size of compact models is strongly polynomial in the number of jobs. In addition to two compact models from the literature, we propose a new compact model. We can show that all three compact models are equivalent by successive linear transformations. For their LP-relaxations, however, we state a full inclusion hierarchy where our new model dominates the previous models in terms of polyhedral strength. Moreover, we reveal a polyhedral relationship to the common time-indexed model. Furthermore, a general class of valid cutting planes for the compact models is introduced and finally all models are evaluated by computational experiments.
- Published
- 2017
- Full Text
- View/download PDF
46. Resolving Braess's Paradox in Random Networks
- Author
-
Alexis C. Kaporis, Paul G. Spirakis, Dimitris Fotakis, and Thanasis Lianeas
- Subjects
Random graph ,Discrete mathematics ,Reduction (recursion theory) ,General Computer Science ,Degree (graph theory) ,Applied Mathematics ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Computer Science Applications ,Combinatorics ,Maximum latency ,Flow (mathematics) ,010201 computation theory & mathematics ,Strongly polynomial ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Constant (mathematics) ,Time complexity ,Mathematics - Abstract
Braess's paradox states that removing a part of a network may improve the players' latency at equilibrium. In this work, we study the approximability of the best subnetwork problem for the class of random $${\mathcal {G}}_{n,p}$$Gn,p instances proven prone to Braess's paradox by Valiant and Roughgarden RSA '10 (Random Struct Algorithms 37(4):495---515, 2010), Chung and Young WINE '10 (LNCS 6484:194---208, 2010) and Chung et al. RSA '12 (Random Struct Algorithms 41(4):451---468, 2012). Our main contribution is a polynomial-time approximation-preserving reduction of the best subnetwork problem for such instances to the corresponding problem in a simplified network where all neighbors of source s and destination t are directly connected by 0 latency edges. Building on this, we consider two cases, either when the total rate r is sufficiently low, or, when r is sufficiently high. In the first case of low$$r= O(n_{+})$$r=O(n+), here $$n_{+}$$n+ is the maximum degree of $$\{s, t\}$${s,t}, we obtain an approximation scheme that for any constant $$\varepsilon > 0$$ź>0 and with high probability, computes a subnetwork and an $$\varepsilon $$ź-Nash flow with maximum latency at most $$(1+\varepsilon )L^*+ \varepsilon $$(1+ź)Lź+ź, where $$L^*$$Lź is the equilibrium latency of the best subnetwork. Our approximation scheme runs in polynomial time if the random network has average degree $$O(\mathrm {poly}(\ln n))$$O(poly(lnn)) and the traffic rate is $$O(\mathrm {poly}(\ln \ln n))$$O(poly(lnlnn)), and in quasipolynomial time for average degrees up to o(n) and traffic rates of $$O(\mathrm {poly}(\ln n))$$O(poly(lnn)). Finally, in the second case of high$$r= {\varOmega }(n_{+})$$r=Ω(n+), we compute in strongly polynomial time a subnetwork and an $$\varepsilon $$ź-Nash flow with maximum latency at most $$(1+2\varepsilon + o(1))L^*$$(1+2ź+o(1))Lź.
- Published
- 2017
47. A simpler and faster strongly polynomial algorithm for generalized flow maximization
- Author
-
László A. Végh, Neil Olver, Econometrics and Operations Research, Amsterdam Business Research Institute, Tinbergen Institute, and Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands
- Subjects
Work (thermodynamics) ,Dinic's algorithm ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Square-free polynomial ,Matrix polynomial ,Strongly polynomial ,010104 statistics & probability ,Artificial Intelligence ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Computer Science - Data Structures and Algorithms ,Applied mathematics ,Generalized flow ,SDG 7 - Affordable and Clean Energy ,QA Mathematics ,0101 mathematics ,Mathematics - Optimization and Control ,Time complexity ,Mathematics ,Discrete mathematics ,021103 operations research ,Alternating polynomial ,Contrast (statistics) ,Maximization ,Flow network ,Strongly polynomial algorithm ,Flow (mathematics) ,Hardware and Architecture ,Control and Systems Engineering ,010201 computation theory & mathematics ,Key (cryptography) ,Software ,Computer Science - Discrete Mathematics ,Information Systems ,Network flow - Abstract
We present a new strongly polynomial algorithm for generalized flow maximization that is significantly simpler and faster than the previous strongly polynomial algorithm [34]. For the uncapacitated problem formulation, the complexity bound O ( mn ( m + n log n )log ( n 2 / m )) improves on the previous estimate by almost a factor O ( n 2 ). Even for small numerical parameter values, our running time bound is comparable to the best weakly polynomial algorithms. The key new technical idea is relaxing the primal feasibility conditions. This allows us to work almost exclusively with integral flows, in contrast to all previous algorithms for the problem.
- Published
- 2017
- Full Text
- View/download PDF
48. An Incentive Compatible, Efficient Market for Air Traffic Flow Management
- Author
-
Vijay V. Vazirani and Ruta Mehta
- Subjects
TheoryofComputation_MISCELLANEOUS ,050210 logistics & transportation ,Air traffic flow management ,Mathematical optimization ,Matching (statistics) ,Strategic dominance ,Aviation ,business.industry ,Computer science ,05 social sciences ,TheoryofComputation_GENERAL ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Set (abstract data type) ,Reduction (complexity) ,Strongly polynomial ,Incentive compatibility ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business - Abstract
We present a market-based approach to the Air Traffic Flow Management (ATFM) problem. The goods in our market are delays and buyers are airline companies; the latter pay money to the Federal Aviation Administration (FAA) to buy away the desired amount of delay on a per flight basis. We give a notion of equilibrium for this market and an LP whose every optimal solution gives an equilibrium allocation of flights to landing slots as well as equilibrium prices for the landing slots. Via a reduction to matching, we show that this equilibrium can be computed combinatorially in strongly polynomial time. Moreover, there is a special set of equilibrium prices, which can be computed easily, that is identical to the VCG solution, and therefore the market is incentive compatible in dominant strategy.
- Published
- 2017
- Full Text
- View/download PDF
49. A strongly polynomial-time algorithm for the strict homogeneous linear-inequality feasibility problem
- Author
-
Paulo Roberto Oliveira
- Subjects
Discrete mathematics ,Linear programming ,General Mathematics ,Management Science and Operations Research ,Inversion (discrete mathematics) ,Orthant ,Combinatorics ,Matrix (mathematics) ,Linear inequality ,Strongly polynomial ,Homogeneous ,Arithmetic function ,Algorithm ,Software ,Mathematics - Abstract
A strongly polynomial-time algorithm is proposed for the strict homogeneous linear-inequality feasibility problem in the positive orthant, that is, to obtain \(x\in \mathbb {R}^n\), such that \(Ax > 0\), \(x> 0\), for an \(m\times n\) matrix \(A\), \(m\ge n\). This algorithm requires \(O(p)\) iterations and \(O(m^2(n+p))\) arithmetical operations to ensure that the distance between the solution and the iteration is \(10^{-p}\). No matrix inversion is needed. An extension to the non-homogeneous linear feasibility problem is presented.
- Published
- 2014
- Full Text
- View/download PDF
50. Computing minimum multiway cuts in hypergraphs
- Author
-
Takuro Fukunaga
- Subjects
Connected component ,Discrete mathematics ,Hypergraph ,Mathematics::Combinatorics ,Spanning tree ,Applied Mathematics ,Matroid ,Theoretical Computer Science ,Combinatorics ,Set (abstract data type) ,Computational Theory and Mathematics ,Computer Science::Discrete Mathematics ,Strongly polynomial ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Maximum size ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
The hypergraph k -cut problem is the problem of finding a minimum capacity set of hyperedges whose removal divides a given hypergraph into at least k connected components. We present an algorithm for this problem, that runs in strongly polynomial time if both k and the maximum size of the hyperedges are constants. Our algorithm extends the algorithm proposed by Thorup (2008) for computing minimum k -cuts of graphs from greedy packings of spanning trees.
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.