-
Online Matching on $3$-Uniform Hypergraphs
Authors:
Sander Borst,
Danish Kashaev,
Zhuan Khye Koh
Abstract:
The online matching problem was introduced by Karp, Vazirani and Vazirani (STOC 1990) on bipartite graphs with vertex arrivals. It is well-known that the optimal competitive ratio is $1-1/e$ for both integral and fractional versions of the problem. Since then, there has been considerable effort to find optimal competitive ratios for other related settings. In this work, we go beyond the graph case…
▽ More
The online matching problem was introduced by Karp, Vazirani and Vazirani (STOC 1990) on bipartite graphs with vertex arrivals. It is well-known that the optimal competitive ratio is $1-1/e$ for both integral and fractional versions of the problem. Since then, there has been considerable effort to find optimal competitive ratios for other related settings. In this work, we go beyond the graph case and study the online matching problem on $k$-uniform hypergraphs. For $k=3$, we provide an optimal primal-dual fractional algorithm, which achieves a competitive ratio of $(e-1)/(e+1)\approx 0.4621$. As our main technical contribution, we present a carefully constructed adversarial instance, which shows that this ratio is in fact optimal. It combines ideas from known hard instances for bipartite graphs under the edge-arrival and vertex-arrival models. For $k\geq 3$, we give a simple integral algorithm which performs better than greedy when the online nodes have bounded degree. As a corollary, it achieves the optimal competitive ratio of 1/2 on 3-uniform hypergraphs when every online node has degree at most 2. This is because the special case where every online node has degree 1 is equivalent to the edge-arrival model on graphs, for which an upper bound of 1/2 is known.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Initialisation of Autonomous Aircraft Visual Inspection Systems via CNN-Based Camera Pose Estimation
Authors:
Xueyan Oh,
Leonard Loh,
Shaohui Foong,
Zhong Bao Andy Koh,
Kow Leong Ng,
Poh Kang Tan,
Pei Lin Pearlin Toh,
U-Xuan Tan
Abstract:
General Visual Inspection is a manual inspection process regularly used to detect and localise obvious damage on the exterior of commercial aircraft. There has been increasing demand to perform this process at the boarding gate to minimize the downtime of the aircraft and automating this process is desired to reduce the reliance on human labour. This automation typically requires the first step of…
▽ More
General Visual Inspection is a manual inspection process regularly used to detect and localise obvious damage on the exterior of commercial aircraft. There has been increasing demand to perform this process at the boarding gate to minimize the downtime of the aircraft and automating this process is desired to reduce the reliance on human labour. This automation typically requires the first step of estimating a camera's pose with respect to the aircraft for initialisation. However, localisation methods often require infrastructure, which can be very challenging when performed in uncontrolled outdoor environments and within the limited turnover time (approximately 2 hours) on an airport tarmac. In addition, access to commercial aircraft can be very restricted, causing development and testing of solutions to be a challenge. Hence, this paper proposes an on-site infrastructure-less initialisation method, by using the same pan-tilt-zoom camera used for the inspection task to estimate its own pose. This is achieved using a Deep Convolutional Neural Network trained with only synthetic images to regress the camera's pose. We apply domain randomisation when generating our dataset for training our network and improve prediction accuracy by introducing a new component to an existing loss function that leverages on known aircraft geometry to relate position and orientation. Experiments are conducted and we have successfully regressed camera poses with a median error of 0.22 m and 0.73 degrees.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
A Slow-Shifting Concerned Machine Learning Method for Short-term Traffic Flow Forecasting
Authors:
Zann Koh,
Yan Qin,
Yong Liang Guan,
Chau Yuen
Abstract:
The ability to predict traffic flow over time for crowded areas during rush hours is increasingly important as it can help authorities make informed decisions for congestion mitigation or scheduling of infrastructure development in an area. However, a crucial challenge in traffic flow forecasting is the slow shifting in temporal peaks between daily and weekly cycles, resulting in the nonstationari…
▽ More
The ability to predict traffic flow over time for crowded areas during rush hours is increasingly important as it can help authorities make informed decisions for congestion mitigation or scheduling of infrastructure development in an area. However, a crucial challenge in traffic flow forecasting is the slow shifting in temporal peaks between daily and weekly cycles, resulting in the nonstationarity of the traffic flow signal and leading to difficulty in accurate forecasting. To address this challenge, we propose a slow shifting concerned machine learning method for traffic flow forecasting, which includes two parts. First, we take advantage of Empirical Mode Decomposition as the feature engineering to alleviate the nonstationarity of traffic flow data, yielding a series of stationary components. Second, due to the superiority of Long-Short-Term-Memory networks in capturing temporal features, an advanced traffic flow forecasting model is developed by taking the stationary components as inputs. Finally, we apply this method on a benchmark of real-world data and provide a comparison with other existing methods. Our proposed method outperforms the state-of-art results by 14.55% and 62.56% using the metrics of root mean squared error and mean absolute percentage error, respectively.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
On the Liveliness of Artificial Life
Authors:
Yong Zher Koh,
Maurice HT Ling
Abstract:
There has been on-going philosophical debate on whether artificial life models, also known as digital organisms, are truly alive. The main difficulty appears to be finding an encompassing and definite definition of life. By examining similarities and differences in recent definitions of life, we define life as "any system with a boundary to confine the system within a definite volume and protect t…
▽ More
There has been on-going philosophical debate on whether artificial life models, also known as digital organisms, are truly alive. The main difficulty appears to be finding an encompassing and definite definition of life. By examining similarities and differences in recent definitions of life, we define life as "any system with a boundary to confine the system within a definite volume and protect the system from external effects, consisting of a program that is capable of improvisation, able to react and adapt to the environment, able to regenerate parts of it-self or its entirety, with energy system comprises of non-interference sets of secluded reactions for self-sustenance, is considered alive or a living system. Any incomplete system containing a program and can be re-assembled into a living system; thereby, converting the reassembled system for the purpose of the incomplete system, are also considered alive." Using this definition, we argue that digital organisms may not be the boundary case of life even though some digital organisms are not considered alive; thereby, taking the view that some form of digital organisms can be considered alive. In addition, we present an experimental framework based on continuity of the overall system and potential discontinuity of elements within the system for testing future definitions of life.
△ Less
Submitted 19 February, 2023;
originally announced February 2023.
-
Location-based Activity Behavior Deviation Detection for Nursing Home using IoT Devices
Authors:
Billy Pik Lik Lau,
Zann Koh,
Yuren Zhou,
Benny Kai Kiat Ng,
Chau Yuen,
Mui Lang Low
Abstract:
With the advancement of the Internet of Things(IoT) and pervasive computing applications, it provides a better opportunity to understand the behavior of the aging population. However, in a nursing home scenario, common sensors and techniques used to track an elderly living alone are not suitable.
In this paper, we design a location-based tracking system for a four-story nursing home - The Salvatio…
▽ More
With the advancement of the Internet of Things(IoT) and pervasive computing applications, it provides a better opportunity to understand the behavior of the aging population. However, in a nursing home scenario, common sensors and techniques used to track an elderly living alone are not suitable.
In this paper, we design a location-based tracking system for a four-story nursing home - The Salvation Army, Peacehaven Nursing Home in Singapore. The main challenge here is to identify the group activity among the nursing home's residents and to detect if they have any deviated activity behavior. We propose a location-based deviated activity behavior detection system to detect deviated activity behavior by leveraging data fusion technique. In order to compute the features for data fusion, an adaptive method is applied for extracting the group and individual activity time and generate daily hybrid norm for each of the residents. Next, deviated activity behavior detection is executed by considering the difference between daily norm patterns and daily input data for each resident. Lastly, the deviated activity behavior among the residents are classified using a rule-based classification approach.
Through the implementation, there are 44.4% of the residents do not have deviated activity behavior , while 37% residents involved in one deviated activity behavior and 18.6% residents have two or more deviated activity behaviors.
△ Less
Submitted 25 January, 2023;
originally announced January 2023.
-
Clustering and Analysis of GPS Trajectory Data using Distance-based Features
Authors:
Zann Koh,
Yuren Zhou,
Billy Pik Lik Lau,
Ran Liu,
Keng Hua Chong,
Chau Yuen
Abstract:
The proliferation of smartphones has accelerated mobility studies by largely increasing the type and volume of mobility data available. One such source of mobility data is from GPS technology, which is becoming increasingly common and helps the research community understand mobility patterns of people. However, there lacks a standardized framework for studying the different mobility patterns creat…
▽ More
The proliferation of smartphones has accelerated mobility studies by largely increasing the type and volume of mobility data available. One such source of mobility data is from GPS technology, which is becoming increasingly common and helps the research community understand mobility patterns of people. However, there lacks a standardized framework for studying the different mobility patterns created by the non-Work, non-Home locations of Working and Nonworking users on Workdays and Offdays using machine learning methods. We propose a new mobility metric, Daily Characteristic Distance, and use it to generate features for each user together with Origin-Destination matrix features. We then use those features with an unsupervised machine learning method, $k$-means clustering, and obtain three clusters of users for each type of day (Workday and Offday). Finally, we propose two new metrics for the analysis of the clustering results, namely User Commonality and Average Frequency. By using the proposed metrics, interesting user behaviors can be discerned and it helps us to better understand the mobility patterns of the users.
△ Less
Submitted 30 November, 2022;
originally announced December 2022.
-
On the Correlation Gap of Matroids
Authors:
Edin Husić,
Zhuan Khye Koh,
Georg Loho,
László A. Végh
Abstract:
A set function can be extended to the unit cube in various ways; the correlation gap measures the ratio between two natural extensions. This quantity has been identified as the performance guarantee in a range of approximation algorithms and mechanism design settings. It is known that the correlation gap of a monotone submodular function is at least $1-1/e$, and this is tight for simple matroid ra…
▽ More
A set function can be extended to the unit cube in various ways; the correlation gap measures the ratio between two natural extensions. This quantity has been identified as the performance guarantee in a range of approximation algorithms and mechanism design settings. It is known that the correlation gap of a monotone submodular function is at least $1-1/e$, and this is tight for simple matroid rank functions.
We initiate a fine-grained study of the correlation gap of matroid rank functions. In particular, we present an improved lower bound on the correlation gap as parametrized by the rank and girth of the matroid. We also show that for any matroid, the correlation gap of its weighted matroid rank function is minimized under uniform weights. Such improved lower bounds have direct applications for submodular maximization under matroid constraints, mechanism design, and contention resolution schemes.
△ Less
Submitted 21 June, 2024; v1 submitted 20 September, 2022;
originally announced September 2022.
-
HRnV-Calc: A software package for heart rate n-variability and heart rate variability analysis
Authors:
Chenglin Niu,
Dagang Guo,
Marcus Eng Hock Ong,
Zhi Xiong Koh,
Andrew Fu Wah Ho,
Zhi** Lin,
Chengyu Liu,
Gari D. Clifford,
Nan Liu
Abstract:
Objective: Heart rate variability (HRV) has been proven to be an important indicator of physiological status for numerous applications. Despite the progress and active developments made in HRV metric research over the last few decades, the representation of the heartbeat sequence upon which HRV is based has received relatively little attention. The recently introduced heart rate n-variability (HRn…
▽ More
Objective: Heart rate variability (HRV) has been proven to be an important indicator of physiological status for numerous applications. Despite the progress and active developments made in HRV metric research over the last few decades, the representation of the heartbeat sequence upon which HRV is based has received relatively little attention. The recently introduced heart rate n-variability (HRnV) offers an alternative to R-to-R peak interval representations which complements conventional HRV analysis by considering HRV behavior on varying scales. Although HRnV has been shown to improve triage in pilot studies, there is currently no open and standard software to support future research of HRnV and its broader clinical applications. We aimed to develop an open, reliable, and easy to use software package implementing HRnV for further research and improvements of HRnV. This package has been designed to facilitate collaborative investigations between clinicians and researchers to study HRnV in various contexts and applications. Approach: We developed an open-source software, HRnV-Calc, based on the PhysioNet Cardiovascular Signal Toolbox (PCST), which features comprehensive graphical user interfaces (GUIs) for HRnV and HRV analysis. Main results: While preserving the core functionalities and performance of PCST, HRnV-Calc enables step-by-step manual inspection and configuration of HRV and HRnV analysis, so that results can be debugged, easily interpreted, and integrated to downstream applications. Significance: The open-source HRnV-Calc software, an accessible and standardized HRV and HRnV analysis platform, enhances the scope of HRV assessment and is designed to assist in future improvements and applications of HRnV and related research.
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
On Circuit Diameter Bounds via Circuit Imbalances
Authors:
Daniel Dadush,
Zhuan Khye Koh,
Bento Natura,
László A. Végh
Abstract:
We study the circuit diameter of polyhedra, introduced by Borgwardt, Finhold, and Hemmecke (SIDMA 2015) as a relaxation of the combinatorial diameter. We show that the circuit diameter of a system $\{x \in \mathbb{R}^n: Ax=b, 0\leq x\leq u\}$ for $A \in \mathbb{R}^{m \times n}$ is bounded by $O(m \min\{m, n-m\} \log(m+ κ_A)+n \log n)$, where $κ_A$ is the circuit imbalance measure of the constraint…
▽ More
We study the circuit diameter of polyhedra, introduced by Borgwardt, Finhold, and Hemmecke (SIDMA 2015) as a relaxation of the combinatorial diameter. We show that the circuit diameter of a system $\{x \in \mathbb{R}^n: Ax=b, 0\leq x\leq u\}$ for $A \in \mathbb{R}^{m \times n}$ is bounded by $O(m \min\{m, n-m\} \log(m+ κ_A)+n \log n)$, where $κ_A$ is the circuit imbalance measure of the constraint matrix. This yields a strongly polynomial circuit diameter bound if e.g., all entries of $A$ have polynomially bounded encoding length in $n$. Further, we present circuit augmentation algorithms for LPs using the minimum-ratio circuit cancelling rule. Even though the standard minimum-ratio circuit cancelling algorithm is not finite in general, our variant can solve an LP in $O(mn^2\log(n+κ_A))$ augmentation steps.
△ Less
Submitted 12 June, 2024; v1 submitted 15 November, 2021;
originally announced November 2021.
-
Beyond Value Iteration for Parity Games: Strategy Iteration with Universal Trees
Authors:
Zhuan Khye Koh,
Georg Loho
Abstract:
Parity games have witnessed several new quasi-polynomial algorithms since the breakthrough result of Calude et al. (STOC 2017). The combinatorial object underlying these approaches is a universal tree, as identified by Czerwiński et al. (SODA 2019). By providing a quasi-polynomial lower bound on the size of universal trees, they have highlighted a barrier that must be overcome by all existing appr…
▽ More
Parity games have witnessed several new quasi-polynomial algorithms since the breakthrough result of Calude et al. (STOC 2017). The combinatorial object underlying these approaches is a universal tree, as identified by Czerwiński et al. (SODA 2019). By providing a quasi-polynomial lower bound on the size of universal trees, they have highlighted a barrier that must be overcome by all existing approaches to attain polynomial running time. This is due to the existence of worst case instances which force these algorithms to explore a large portion of the tree.
As an attempt to overcome this barrier, we propose a strategy iteration framework which can be applied on any universal tree. It is at least as fast as its value iteration counterparts, while allowing one to take bigger leaps in the universal tree. Our main technical contribution is an efficient method for computing the least fixed point of 1-player games. This is achieved via a careful adaptation of shortest path algorithms to the setting of ordered trees. By plugging in the universal tree of Jurdziński and Lazić (LICS 2017), or the Strahler universal tree of Daviaud et al. (ICALP 2020), we obtain instantiations of the general framework that take time $O(mn^2\log n\log d)$ and $O(mn^2\log^3 n \log d)$ respectively per iteration.
△ Less
Submitted 12 July, 2023; v1 submitted 30 August, 2021;
originally announced August 2021.
-
Ghost factors in Gauss-sum factorization with transmon qubits
Authors:
Lin Htoo Zaw,
Yuanzheng Paul Tan,
Long Hoang Nguyen,
Rangga P. Budoyo,
Kun Hee Park,
Zhi Yang Koh,
Alessandro Landra,
Christoph Hufnagel,
Yung Szen Yap,
Teck Seng Koh,
Rainer Dumke
Abstract:
A challenge in the Gauss sums factorization scheme is the presence of ghost factors - non-factors that behave similarly to actual factors of an integer - which might lead to the misidentification of non-factors as factors or vice versa, especially in the presence of noise. We investigate Type II ghost factors, which are the class of ghost factors that cannot be suppressed with techniques previousl…
▽ More
A challenge in the Gauss sums factorization scheme is the presence of ghost factors - non-factors that behave similarly to actual factors of an integer - which might lead to the misidentification of non-factors as factors or vice versa, especially in the presence of noise. We investigate Type II ghost factors, which are the class of ghost factors that cannot be suppressed with techniques previously laid out in the literature. The presence of Type II ghost factors and the coherence time of the qubit set an upper limit for the total experiment time, and hence the largest factorizable number with this scheme. Discernability is a figure of merit introduced to characterize this behavior. We introduce preprocessing as a strategy to increase the discernability of a system, and demonstrate the technique with a transmon qubit. This can bring the total experiment time of the system closer to its decoherence limit, and increase the largest factorizable number.
△ Less
Submitted 8 December, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
Multiple-Perspective Clustering of Passive Wi-Fi Sensing Trajectory Data
Authors:
Zann Koh,
Yuren Zhou,
Billy Pik Lik Lau,
Chau Yuen,
Bige Tuncer,
Keng Hua Chong
Abstract:
Information about the spatiotemporal flow of humans within an urban context has a wide plethora of applications. Currently, although there are many different approaches to collect such data, there lacks a standardized framework to analyze it. The focus of this paper is on the analysis of the data collected through passive Wi-Fi sensing, as such passively collected data can have a wide coverage at…
▽ More
Information about the spatiotemporal flow of humans within an urban context has a wide plethora of applications. Currently, although there are many different approaches to collect such data, there lacks a standardized framework to analyze it. The focus of this paper is on the analysis of the data collected through passive Wi-Fi sensing, as such passively collected data can have a wide coverage at low cost. We propose a systematic approach by using unsupervised machine learning methods, namely k-means clustering and hierarchical agglomerative clustering (HAC) to analyze data collected through such a passive Wi-Fi sniffing method. We examine three aspects of clustering of the data, namely by time, by person, and by location, and we present the results obtained by applying our proposed approach on a real-world dataset collected over five months.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
An Accelerated Newton-Dinkelbach Method and its Application to Two Variables Per Inequality Systems
Authors:
Daniel Dadush,
Zhuan Khye Koh,
Bento Natura,
László A. Végh
Abstract:
We present an accelerated, or 'look-ahead' version of the Newton-Dinkelbach method, a well-known technique for solving fractional and parametric optimization problems. This acceleration halves the Bregman divergence between the current iterate and the optimal solution within every two iterations. Using the Bregman divergence as a potential in conjunction with combinatorial arguments, we obtain str…
▽ More
We present an accelerated, or 'look-ahead' version of the Newton-Dinkelbach method, a well-known technique for solving fractional and parametric optimization problems. This acceleration halves the Bregman divergence between the current iterate and the optimal solution within every two iterations. Using the Bregman divergence as a potential in conjunction with combinatorial arguments, we obtain strongly polynomial algorithms in three applications domains: (i) For linear fractional combinatorial optimization, we show a convergence bound of $O(m \log m)$ iterations; the previous best bound was $O(m^2 \log m)$ by Wang et al. (2006). (ii) We obtain a strongly polynomial label-correcting algorithm for solving linear feasibility systems with two variables per inequality (2VPI). For a 2VPI system with $n$ variables and $m$ constraints, our algorithm runs in $O(mn)$ iterations. Every iteration takes $O(mn)$ time for general 2VPI systems, and $O(m + n \log n)$ time for the special case of deterministic Markov Decision Processes (DMDPs). This extends and strengthens a previous result by Madani (2002) that showed a weakly polynomial bound for a variant of the Newton-Dinkelbach method for solving DMDPs. (iii) We give a simplified variant of the parametric submodular function minimization result by Goemans et al. (2017).
△ Less
Submitted 21 May, 2021; v1 submitted 18 April, 2020;
originally announced April 2020.
-
Understanding Crowd Behaviors in a Social Event by Passive WiFi Sensing and Data Mining
Authors:
Yuren Zhou,
Billy Pik Lik Lau,
Zann Koh,
Chau Yuen,
Benny Kai Kiat Ng
Abstract:
Understanding crowd behaviors in a large social event is crucial for event management. Passive WiFi sensing, by collecting WiFi probe requests sent from mobile devices, provides a better way to monitor crowds compared with people counters and cameras in terms of free interference, larger coverage, lower cost, and more information on people's movement. In existing studies, however, not enough atten…
▽ More
Understanding crowd behaviors in a large social event is crucial for event management. Passive WiFi sensing, by collecting WiFi probe requests sent from mobile devices, provides a better way to monitor crowds compared with people counters and cameras in terms of free interference, larger coverage, lower cost, and more information on people's movement. In existing studies, however, not enough attention has been paid to the thorough analysis and mining of collected data. Especially, the power of machine learning has not been fully exploited. In this paper, therefore, we propose a comprehensive data analysis framework to fully analyze the collected probe requests to extract three types of patterns related to crowd behaviors in a large social event, with the help of statistics, visualization, and unsupervised machine learning. First, trajectories of the mobile devices are extracted from probe requests and analyzed to reveal the spatial patterns of the crowds' movement. Hierarchical agglomerative clustering is adopted to find the interconnections between different locations. Next, k-means and k-shape clustering algorithms are applied to extract temporal visiting patterns of the crowds by days and locations, respectively. Finally, by combining with time, trajectories are transformed into spatiotemporal patterns, which reveal how trajectory duration changes over the length and how the overall trends of crowd movement change over time. The proposed data analysis framework is fully demonstrated using real-world data collected in a large social event. Results show that one can extract comprehensive patterns from data collected by a network of passive WiFi sensors.
△ Less
Submitted 4 February, 2020;
originally announced February 2020.
-
An Efficient Characterization of Submodular Spanning Tree Games
Authors:
Zhuan Khye Koh,
Laura Sanità
Abstract:
Cooperative games are an important class of problems in game theory, where the goal is to distribute a value among a set of players who are allowed to cooperate by forming coalitions. An outcome of the game is given by an allocation vector that assigns a value share to each player. A crucial aspect of such games is submodularity (or convexity). Indeed, convex instances of cooperative games exhibit…
▽ More
Cooperative games are an important class of problems in game theory, where the goal is to distribute a value among a set of players who are allowed to cooperate by forming coalitions. An outcome of the game is given by an allocation vector that assigns a value share to each player. A crucial aspect of such games is submodularity (or convexity). Indeed, convex instances of cooperative games exhibit several nice properties, e.g. regarding the existence and computation of allocations realizing some of the most important solution concepts proposed in the literature. For this reason, a relevant question is whether one can give a polynomial time characterization of submodular instances, for prominent cooperative games that are in general non-convex.
In this paper, we focus on a fundamental and widely studied cooperative game, namely the spanning tree game. An efficient recognition of submodular instances of this game was not known so far, and explicitly mentioned as an open question in the literature. We here settle this open problem by giving a polynomial time characterization of submodular spanning tree games.
△ Less
Submitted 6 June, 2019;
originally announced June 2019.
-
Stabilizing Weighted Graphs
Authors:
Zhuan Khye Koh,
Laura Sanità
Abstract:
An edge-weighted graph $G=(V,E)$ is called stable if the value of a maximum-weight matching equals the value of a maximum-weight fractional matching. Stable graphs play an important role in some interesting game theory problems, such as network bargaining games and cooperative matching games, because they characterize instances which admit stable outcomes. Motivated by this, in the last few years…
▽ More
An edge-weighted graph $G=(V,E)$ is called stable if the value of a maximum-weight matching equals the value of a maximum-weight fractional matching. Stable graphs play an important role in some interesting game theory problems, such as network bargaining games and cooperative matching games, because they characterize instances which admit stable outcomes. Motivated by this, in the last few years many researchers have investigated the algorithmic problem of turning a given graph into a stable one, via edge- and vertex-removal operations. However, all the algorithmic results developed in the literature so far only hold for unweighted instances, i.e., assuming unit weights on the edges of $G$.
We give the first polynomial-time algorithm to find a minimum cardinality subset of vertices whose removal from $G$ yields a stable graph, for any weighted graph $G$. The algorithm is combinatorial and exploits new structural properties of basic fractional matchings, which are of independent interest. In particular, one of the main ingredients of our result is the development of a polynomial-time algorithm to compute a basic maximum-weight fractional matching with minimum number of odd cycles in its support. This generalizes a fundamental and classical result on unweighted matchings given by Balas more than 30 years ago, which we expect to prove useful beyond this particular application.
In contrast, we show that the problem of finding a minimum cardinality subset of edges whose removal from a weighted graph $G$ yields a stable graph, does not admit any constant-factor approximation algorithm, unless $P=NP$. In this setting, we develop an $O(Δ)$-approximation algorithm for the problem, where $Δ$ is the maximum degree of a node in $G$.
△ Less
Submitted 24 November, 2017; v1 submitted 6 September, 2017;
originally announced September 2017.