-
Online Edge Coloring is (Nearly) as Easy as Offline
Authors:
Joakim Blikstad,
Ola Svensson,
Radu Vintan,
David Wajc
Abstract:
The classic theorem of Vizing (Diskret. Analiz.'64) asserts that any graph of maximum degree $Δ$ can be edge colored (offline) using no more than $Δ+1$ colors (with $Δ$ being a trivial lower bound). In the online setting, Bar-Noy, Motwani and Naor (IPL'92) conjectured that a $(1+o(1))Δ$-edge-coloring can be computed online in $n$-vertex graphs of maximum degree $Δ=ω(\log n)$. Numerous algorithms m…
▽ More
The classic theorem of Vizing (Diskret. Analiz.'64) asserts that any graph of maximum degree $Δ$ can be edge colored (offline) using no more than $Δ+1$ colors (with $Δ$ being a trivial lower bound). In the online setting, Bar-Noy, Motwani and Naor (IPL'92) conjectured that a $(1+o(1))Δ$-edge-coloring can be computed online in $n$-vertex graphs of maximum degree $Δ=ω(\log n)$. Numerous algorithms made progress on this question, using a higher number of colors or assuming restricted arrival models, such as random-order edge arrivals or vertex arrivals (e.g., AGKM FOCS'03, BMM SODA'10, CPW FOCS'19, BGW SODA'21, KLSST STOC'22). In this work, we resolve this longstanding conjecture in the affirmative in the most general setting of adversarial edge arrivals. We further generalize this result to obtain online counterparts of the list edge coloring result of Kahn (J. Comb. Theory. A'96) and of the recent "local" edge coloring result of Christiansen (STOC'23).
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Multi-Blade detector with VMM3a-ASIC-based readout: installation and commissioning at the reflectometer Amor at PSI
Authors:
F. Piscitelli,
F. Ghazi Moradi,
F. S. Alves,
M. J. Christensen,
J. Hrivnak,
A. Johansson,
K. Fissum,
C. C. Lai,
A. Monera Martinez,
D. Pfeiffer,
E. Shahu,
J. Stahn,
P. O. Svensson
Abstract:
The Multi-Blade (MB) Boron-10-based neutron detector is the chosen technology for three instruments at the European Spallation Source (ESS): the two ESS reflectometers, ESTIA and FREIA, and the Test Beam Line. A fourth MB detector has been built, installed and commissioned for the user operation of the reflectometer Amor at PSI (Switzerland). Amor can be considered a downscaled version of the ESS…
▽ More
The Multi-Blade (MB) Boron-10-based neutron detector is the chosen technology for three instruments at the European Spallation Source (ESS): the two ESS reflectometers, ESTIA and FREIA, and the Test Beam Line. A fourth MB detector has been built, installed and commissioned for the user operation of the reflectometer Amor at PSI (Switzerland). Amor can be considered a downscaled version of the ESS reflectometer ESTIA. They are based on the same Selene guide concept, optimized for performing focusing reflectometry on small samples. The experience gained at Amor is invaluable for the future deployment of the MB detector at the ESS. This manuscript describes the MB detector construction and installation at Amor along with the readout electronics chain based on the VMM3a ASIC. The readout chain deployed at Amor is equivalent of that of the ESS, including the readout master module (RMM), event-formation-units (EFUs), Kafka, FileWriter and live visualisation tools.
△ Less
Submitted 18 March, 2024; v1 submitted 13 February, 2024;
originally announced February 2024.
-
Simple and Asymptotically Optimal Online Bipartite Edge Coloring
Authors:
Joakim Blikstad,
Ola Svensson,
Radu Vintan,
David Wajc
Abstract:
We provide a simple online $Δ(1+o(1))$-edge-coloring algorithm for bipartite graphs of maximum degree $Δ=ω(\log n)$ under adversarial vertex arrivals on one side of the graph. Our algorithm slightly improves the result of (Cohen, Peng and Wajc, FOCS19), which was the first, and currently only, to obtain an asymptotically optimal $Δ(1+o(1))$ guarantee for an adversarial arrival model. More importan…
▽ More
We provide a simple online $Δ(1+o(1))$-edge-coloring algorithm for bipartite graphs of maximum degree $Δ=ω(\log n)$ under adversarial vertex arrivals on one side of the graph. Our algorithm slightly improves the result of (Cohen, Peng and Wajc, FOCS19), which was the first, and currently only, to obtain an asymptotically optimal $Δ(1+o(1))$ guarantee for an adversarial arrival model. More importantly, our algorithm provides a new, simpler approach for tackling online edge coloring.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
An Analysis of $D^α$ seeding for $k$-means
Authors:
Etienne Bamas,
Sai Ganesh Nagarajan,
Ola Svensson
Abstract:
One of the most popular clustering algorithms is the celebrated $D^α$ seeding algorithm (also know as $k$-means++ when $α=2$) by Arthur and Vassilvitskii (2007), who showed that it guarantees in expectation an $O(2^{2α}\cdot \log k)$-approximate solution to the ($k$,$α$)-means cost (where euclidean distances are raised to the power $α$) for any $α\ge 1$. More recently, Balcan, Dick, and White (201…
▽ More
One of the most popular clustering algorithms is the celebrated $D^α$ seeding algorithm (also know as $k$-means++ when $α=2$) by Arthur and Vassilvitskii (2007), who showed that it guarantees in expectation an $O(2^{2α}\cdot \log k)$-approximate solution to the ($k$,$α$)-means cost (where euclidean distances are raised to the power $α$) for any $α\ge 1$. More recently, Balcan, Dick, and White (2018) observed experimentally that using $D^α$ seeding with $α>2$ can lead to a better solution with respect to the standard $k$-means objective (i.e. the $(k,2)$-means cost).
In this paper, we provide a rigorous understanding of this phenomenon. For any $α>2$, we show that $D^α$ seeding guarantees in expectation an approximation factor of $$ O_α\left((g_α)^{2/α}\cdot \left(\frac{σ_{\mathrm{max}}}{σ_{\mathrm{min}}}\right)^{2-4/α}\cdot (\min\{\ell,\log k\})^{2/α}\right)$$ with respect to the standard $k$-means cost of any underlying clustering; where $g_α$ is a parameter capturing the concentration of the points in each cluster, $σ_{\mathrm{max}}$ and $σ_{\mathrm{min}}$ are the maximum and minimum standard deviation of the clusters around their means, and $\ell$ is the number of distinct mixing weights in the underlying clustering (after rounding them to the nearest power of $2$). We complement these results by some lower bounds showing that the dependency on $g_α$ and $σ_{\mathrm{max}}/σ_{\mathrm{min}}$ is tight.
Finally, we provide an experimental confirmation of the effects of the aforementioned parameters when using $D^α$ seeding. Further, we corroborate the observation that $α>2$ can indeed improve the $k$-means cost compared to $D^2$ seeding, and that this advantage remains even if we run Lloyd's algorithm after the seeding.
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
The Price of Explainability for Clustering
Authors:
Anupam Gupta,
Madhusudhan Reddy Pittu,
Ola Svensson,
Rachel Yuan
Abstract:
Given a set of points in $d$-dimensional space, an explainable clustering is one where the clusters are specified by a tree of axis-aligned threshold cuts. Dasgupta et al. (ICML 2020) posed the question of the price of explainability: the worst-case ratio between the cost of the best explainable clusterings to that of the best clusterings.
We show that the price of explainability for $k$-medians…
▽ More
Given a set of points in $d$-dimensional space, an explainable clustering is one where the clusters are specified by a tree of axis-aligned threshold cuts. Dasgupta et al. (ICML 2020) posed the question of the price of explainability: the worst-case ratio between the cost of the best explainable clusterings to that of the best clusterings.
We show that the price of explainability for $k$-medians is at most $1+H_{k-1}$; in fact, we show that the popular Random Thresholds algorithm has exactly this price of explanability, matching the known lower bound constructions. We complement our tight analysis of this particular algorithm by constructing instances where the price of explanability (using any algorithm) is at least $(1-o(1)) \ln k$, showing that our result is best possible, up to lower-order terms. We also improve the price of explanability for the $k$-means problem to $O(k \ln \ln k)$ from the previous $O(k \ln k)$, considerably closing the gap to the lower bounds of $Ω(k)$.
Finally, we study the algorithmic question of finding the best explainable clustering: We show that explainable $k$-medians and $k$-means cannot be approximated better than $O(\ln k)$, under standard complexity-theoretic conjectures. This essentially settles the approximability of explainable $k$-medians and leaves open the intriguing possibility to get significantly better approximation algorithms for $k$-means than its price of explainability.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Terahertz Frequency-Domain Sensing Combined with Quantitative Multivariate Analysis for Pharmaceutical Tablet Inspection
Authors:
Anis Moradikouchi,
Anders Sparén,
Olof Svensson,
Staffan Folestad,
Jan Stake,
Helena Rodilla
Abstract:
Near infrared (NIR) and Raman spectroscopy combined with multivariate analysis are established techniques for the identification and quantification of chemical properties of pharmaceutical tablets like the concentration of active pharmaceutical ingredients (API). However, these techniques suffer from a high sensitivity to particle size variations and are not ideal for the characterization of physi…
▽ More
Near infrared (NIR) and Raman spectroscopy combined with multivariate analysis are established techniques for the identification and quantification of chemical properties of pharmaceutical tablets like the concentration of active pharmaceutical ingredients (API). However, these techniques suffer from a high sensitivity to particle size variations and are not ideal for the characterization of physical properties of tablets such as tablet density. In this work, we have explored the feasibility of terahertz frequency-domain spectroscopy, with the advantage of low scattering effects, combined with multivariate analysis to quantify API concentration and tablet density. We studied 33 tablets, consisting of Ibuprofen, Mannitol, and a lubricant with API concentration and filler particle size as the design factors. The terahertz signal was measured in transmission mode across the frequency range 750 GHz to 1.5 THz using a vector network analyzer, frequency extenders, horn antennas, and four off-axis parabolic mirrors. The attenuation spectral data were pre-processed and orthogonal partial least square (OPLS) regression was applied to the spectral data to obtain quantitative prediction models for API concentration and tablet density. The performance of the models was assessed using test sets. While a fair model was obtained for API concentration, a high-quality model was demonstrated for tablet density. The coefficient of determination for the calibration set was 0.97 for tablet density and 0.98 for API concentration, while the relative prediction errors for the test set were 0.7% and 6%for tablet density and API concentration models, respectively.
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
The Exact Bipartite Matching Polytope Has Exponential Extension Complexity
Authors:
Xinrui Jia,
Ola Svensson,
Weiqiang Yuan
Abstract:
Given a graph with edges colored red or blue and an integer $k$, the exact perfect matching problem asks if there exists a perfect matching with exactly $k$ red edges. There exists a randomized polylogarithmic-time parallel algorithm to solve this problem, dating back to the eighties, but no deterministic polynomial-time algorithm is known, even for bipartite graphs. In this paper we show that the…
▽ More
Given a graph with edges colored red or blue and an integer $k$, the exact perfect matching problem asks if there exists a perfect matching with exactly $k$ red edges. There exists a randomized polylogarithmic-time parallel algorithm to solve this problem, dating back to the eighties, but no deterministic polynomial-time algorithm is known, even for bipartite graphs. In this paper we show that there is no sub-exponential sized linear program that can describe the convex hull of exact matchings in bipartite graphs. In fact, we prove something stronger, that there is no sub-exponential sized linear program to describe the convex hull of perfect matchings with an odd number of red edges.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Submodular Maximization Subject to Matroid Intersection on the Fly
Authors:
Moran Feldman,
Ashkan Norouzi-Fard,
Ola Svensson,
Rico Zenklusen
Abstract:
Despite a surge of interest in submodular maximization in the data stream model, there remain significant gaps in our knowledge about what can be achieved in this setting, especially when dealing with multiple constraints. In this work, we nearly close several basic gaps in submodular maximization subject to $k$ matroid constraints in the data stream model. We present a new hardness result showing…
▽ More
Despite a surge of interest in submodular maximization in the data stream model, there remain significant gaps in our knowledge about what can be achieved in this setting, especially when dealing with multiple constraints. In this work, we nearly close several basic gaps in submodular maximization subject to $k$ matroid constraints in the data stream model. We present a new hardness result showing that super polynomial memory in $k$ is needed to obtain an $o(k / \log k)$-approximation. This implies near optimality of prior algorithms. For the same setting, we show that one can nevertheless obtain a constant-factor approximation by maintaining a set of elements whose size is independent of the stream size. Finally, for bipartite matching constraints, a well-known special case of matroid intersection, we present a new technique to obtain hardness bounds that are significantly stronger than those obtained with prior approaches. Prior results left it open whether a $2$-approximation may exist in this setting, and only a complexity-theoretic hardness of $1.91$ was known. We prove an unconditional hardness of $2.69$.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
A Simple LP-Based Approximation Algorithm for the Matching Augmentation Problem
Authors:
Etienne Bamas,
Marina Drygala,
Ola Svensson
Abstract:
The Matching Augmentation Problem (MAP) has recently received significant attention as an important step towards better approximation algorithms for finding cheap $2$-edge connected subgraphs. This has culminated in a $\frac{5}{3}$-approximation algorithm. However, the algorithm and its analysis are fairly involved and do not compare against the problem's well-known LP relaxation called the cut LP…
▽ More
The Matching Augmentation Problem (MAP) has recently received significant attention as an important step towards better approximation algorithms for finding cheap $2$-edge connected subgraphs. This has culminated in a $\frac{5}{3}$-approximation algorithm. However, the algorithm and its analysis are fairly involved and do not compare against the problem's well-known LP relaxation called the cut LP. In this paper, we propose a simple algorithm that, guided by an optimal solution to the cut LP, first selects a DFS tree and then finds a solution to MAP by computing an optimum augmentation of this tree. Using properties of extreme point solutions, we show that our algorithm always returns (in polynomial time) a better than $2$-approximation when compared to the cut LP. We thereby also obtain an improved upper bound on the integrality gap of this natural relaxation.
△ Less
Submitted 24 August, 2022; v1 submitted 15 February, 2022;
originally announced February 2022.
-
Flow Time Scheduling and Prefix Beck-Fiala
Authors:
Nikhil Bansal,
Lars Rohwedder,
Ola Svensson
Abstract:
We relate discrepancy theory with the classic scheduling problems of minimizing max flow time and total flow time on unrelated machines. Specifically, we give a general reduction that allows us to transfer discrepancy bounds in the prefix Beck-Fiala (bounded $\ell_1$-norm) setting to bounds on the flow time of an optimal schedule.
Combining our reduction with a deep result proved by Banaszczyk v…
▽ More
We relate discrepancy theory with the classic scheduling problems of minimizing max flow time and total flow time on unrelated machines. Specifically, we give a general reduction that allows us to transfer discrepancy bounds in the prefix Beck-Fiala (bounded $\ell_1$-norm) setting to bounds on the flow time of an optimal schedule.
Combining our reduction with a deep result proved by Banaszczyk via convex geometry, give guarantees of $O(\sqrt{\log n})$ and $O(\sqrt{\log n} \log P)$ for max flow time and total flow time, respectively, improving upon the previous best guarantees of $O(\log n)$ and $O(\log n \log P)$. Apart from the improved guarantees, the reduction motivates seemingly easy versions of prefix discrepancy questions: any constant bound on prefix Beck-Fiala where vectors have sparsity two (sparsity one being trivial) would already yield tight guarantees for both max flow time and total flow time. While known techniques solve this case when the entries take values in $\{-1,0,1\}$, we show that they are unlikely to transfer to the more general $2$-sparse case of bounded $\ell_1$-norm.
△ Less
Submitted 4 February, 2022;
originally announced February 2022.
-
Multitube monitors: a new-generation of neutron beam monitors
Authors:
F. Lafont,
D. Barkats,
J-C. Buffet,
S. Cuccaro,
B. Guerard,
C-C Lai,
J. Marchal,
J. Pentenero,
N. Sartor,
R. Hall-Wilton,
K. Kanaki,
L. Robinson,
P O. Svensson
Abstract:
With the renewal of many neutron science instruments and the commissioning of new neutron facilities, there is a rising demand for improved neutron beam monitoring systems with reduced beam perturbations and higher counting rate capability. Fission chambers are the most popular beam monitors; however, their use on some instruments may be prevented by the background generated by fast neutrons emitt…
▽ More
With the renewal of many neutron science instruments and the commissioning of new neutron facilities, there is a rising demand for improved neutron beam monitoring systems with reduced beam perturbations and higher counting rate capability. Fission chambers are the most popular beam monitors; however, their use on some instruments may be prevented by the background generated by fast neutrons emitted during neutron captures in 235U and by neutrons scattered in the material of the fission chamber. Multitube detectors, on the other hand, offer a good alternative with minimum beam perturbations. The purpose of this paper is to report and analyse the results of the measurements performed with several Multitubes used for beam monitoring. We show that the transparency of Multitube beam monitors is 97.6 +/-0.4 %, and that their detection efficiency is uniform, with a deviation from the mean value < 0.7%. A counting rate reduction of 10% due to pile-up effects is measured at a rate of 550 kHz. In addition to neutron beam intensity monitoring, the Multitube can be configured for 1-dimensional or 2-dimensional localisation. We present the preliminary results of these additional functionalities.
△ Less
Submitted 19 May, 2022; v1 submitted 3 February, 2022;
originally announced February 2022.
-
Towards Non-Uniform k-Center with Constant Types of Radii
Authors:
Xinrui Jia,
Lars Rohwedder,
Kshiteej Sheth,
Ola Svensson
Abstract:
In the Non-Uniform k-Center problem we need to cover a finite metric space using k balls of different radii that can be scaled uniformly. The goal is to minimize the scaling factor. If the number of different radii is unbounded, the problem does not admit a constant-factor approximation algorithm but it has been conjectured that such an algorithm exists if the number of radii is constant. Yet, thi…
▽ More
In the Non-Uniform k-Center problem we need to cover a finite metric space using k balls of different radii that can be scaled uniformly. The goal is to minimize the scaling factor. If the number of different radii is unbounded, the problem does not admit a constant-factor approximation algorithm but it has been conjectured that such an algorithm exists if the number of radii is constant. Yet, this is known only for the case of two radii. Our first contribution is a simple black box reduction which shows that if one can handle the variant of t-1 radii with outliers, then one can also handle t radii. Together with an algorithm by Chakrabarty and Negahbani for two radii with outliers, this immediately implies a constant-factor approximation algorithm for three radii, thus making further progress on the conjecture. Furthermore, using algorithms for the k-center with outliers problem, that is the one radii with outliers case, we also get a simple algorithm for two radii.
The algorithm by Chakrabarty and Negahbani uses a top-down approach, starting with the larger radius and then proceeding to the smaller one. Our reduction, on the other hand, looks only at the smallest radius and eliminates it, which suggests that a bottom-up approach is promising. In this spirit, we devise a modification of the Chakrabarty and Negahbani algorithm which runs in a bottom-up fashion, and in this way we recover their result with the advantage of having a simpler analysis.
△ Less
Submitted 6 October, 2021;
originally announced October 2021.
-
uRANIA-V: an innovative solution for neutron detection in homeland security
Authors:
R. Farinelli,
I. Balossino,
G. Bencivenni,
G. Cibinetto,
G. Felici,
S. Fiore,
I. Garzia,
M. Gatta,
M. Giovannetti,
R. Hall-Wilton,
C. C. Lai,
L. Lavezzi,
G. Mezzadri,
G. Morello,
E. Paoletti,
G. Papalino,
A. Pietropaolo,
M. Pillon,
M. Poli Lener,
L. Robinson,
M. Scodeggio,
P. O. Svensson
Abstract:
Detection of neutrons is becoming of the utmost importance, especially in the studies of radioactive waste and in homeland security applications. The crisis of 3He availability has required the development of innovative techniques. One solution is to develop light gas detectors for neutron counting to be used as portals for ports and airports. The neutron is converted on the Boron-coated cathode,…
▽ More
Detection of neutrons is becoming of the utmost importance, especially in the studies of radioactive waste and in homeland security applications. The crisis of 3He availability has required the development of innovative techniques. One solution is to develop light gas detectors for neutron counting to be used as portals for ports and airports. The neutron is converted on the Boron-coated cathode, releasing a charged particle, whose passage can be identified by the gas detector. While several technologies have been deployed in the past, the project μRANIA-V ( μRwell Advanced Neutron Identification Apparatus) aims to detect thermal neutrons by means of the μRwell technology, an innovative gas detector. The goal is to produce tiles to operate as portals in homeland security or for radioactive waste management. The technological transfer towards the industry has started, thus the production can be cost-effective also owing to a construction process relatively easier compared to similar apparatus. By reading directly the signals from the amplification stage, the neutrons can be counted with simplified electronics further reducing the total cost. In this paper, the project will be described, with details on the μRwell technology and on the neutron counting, on the test beam performed, and on the future plans.
△ Less
Submitted 2 September, 2021;
originally announced September 2021.
-
Streaming Submodular Maximization under Matroid Constraints
Authors:
Moran Feldman,
Paul Liu,
Ashkan Norouzi-Fard,
Ola Svensson,
Rico Zenklusen
Abstract:
Recent progress in (semi-)streaming algorithms for monotone submodular function maximization has led to tight results for a simple cardinality constraint. However, current techniques fail to give a similar understanding for natural generalizations, including matroid constraints. This paper aims at closing this gap. For a single matroid of rank $k$ (i.e., any solution has cardinality at most $k$),…
▽ More
Recent progress in (semi-)streaming algorithms for monotone submodular function maximization has led to tight results for a simple cardinality constraint. However, current techniques fail to give a similar understanding for natural generalizations, including matroid constraints. This paper aims at closing this gap. For a single matroid of rank $k$ (i.e., any solution has cardinality at most $k$), our main results are: 1) a single-pass streaming algorithm that uses $\widetilde{O}(k)$ memory and achieves an approximation guarantee of $0.3178$, and 2) a multi-pass streaming algorithm that uses $\widetilde{O}(k)$ memory and achieves an approximation guarantee of $(1-1/e - \varepsilon)$ by taking a constant (depending on $\varepsilon$) number of passes over the stream. This improves on the previously best approximation guarantees of $1/4$ and $1/2$ for single-pass and multi-pass streaming algorithms, respectively. In fact, our multi-pass streaming algorithm is tight in that any algorithm with a better guarantee than $1/2$ must make several passes through the stream and any algorithm that beats our guarantee of $1-1/e$ must make linearly many passes (as well as an exponential number of value oracle queries).
Moreover, we show how the approach we use for multi-pass streaming can be further strengthened if the elements of the stream arrive in uniformly random order, implying an improved result for $p$-matchoid constraints.
△ Less
Submitted 16 February, 2022; v1 submitted 15 July, 2021;
originally announced July 2021.
-
A QPTAS for stabbing rectangles
Authors:
Friedrich Eisenbrand,
Martina Gallato,
Ola Svensson,
Moritz Venzin
Abstract:
We consider the following geometric optimization problem: Given $ n $ axis-aligned rectangles in the plane, the goal is to find a set of horizontal segments of minimum total length such that each rectangle is stabbed. A segment stabs a rectangle if it intersects both its left and right edge. As such, this stabbing problem falls into the category of weighted geometric set cover problems for which t…
▽ More
We consider the following geometric optimization problem: Given $ n $ axis-aligned rectangles in the plane, the goal is to find a set of horizontal segments of minimum total length such that each rectangle is stabbed. A segment stabs a rectangle if it intersects both its left and right edge. As such, this stabbing problem falls into the category of weighted geometric set cover problems for which techniques that improve upon the general $Θ(\log n)$-approximation guarantee have received a lot of attention in the literature. Chan at al. (2018) have shown that rectangle stabbing is NP-hard and that it admits a constant-factor approximation algorithm based on Varadarajan's quasi-uniform sampling method. In this work we make progress on rectangle stabbing on two fronts. First, we present a quasi-polynomial time approximation scheme (QPTAS) for rectangle stabbing. Furthermore, we provide a simple $8$-approximation algorithm that avoids the framework of Varadarajan. This settles two open problems raised by Chan et al. (2018).
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Nearly-Tight and Oblivious Algorithms for Explainable Clustering
Authors:
Buddhima Gamlath,
Xinrui Jia,
Adam Polak,
Ola Svensson
Abstract:
We study the problem of explainable clustering in the setting first formalized by Dasgupta, Frost, Moshkovitz, and Rashtchian (ICML 2020). A $k$-clustering is said to be explainable if it is given by a decision tree where each internal node splits data points with a threshold cut in a single dimension (feature), and each of the $k$ leaves corresponds to a cluster. We give an algorithm that outputs…
▽ More
We study the problem of explainable clustering in the setting first formalized by Dasgupta, Frost, Moshkovitz, and Rashtchian (ICML 2020). A $k$-clustering is said to be explainable if it is given by a decision tree where each internal node splits data points with a threshold cut in a single dimension (feature), and each of the $k$ leaves corresponds to a cluster. We give an algorithm that outputs an explainable clustering that loses at most a factor of $O(\log^2 k)$ compared to an optimal (not necessarily explainable) clustering for the $k$-medians objective, and a factor of $O(k \log^2 k)$ for the $k$-means objective. This improves over the previous best upper bounds of $O(k)$ and $O(k^2)$, respectively, and nearly matches the previous $Ω(\log k)$ lower bound for $k$-medians and our new $Ω(k)$ lower bound for $k$-means. The algorithm is remarkably simple. In particular, given an initial not necessarily explainable clustering in $\mathbb{R}^d$, it is oblivious to the data points and runs in time $O(dk \log^2 k)$, independent of the number of data points $n$. Our upper and lower bounds also generalize to objectives given by higher $\ell_p$-norms.
△ Less
Submitted 24 October, 2021; v1 submitted 30 June, 2021;
originally announced June 2021.
-
Semi-Streaming Algorithms for Submodular Matroid Intersection
Authors:
Paritosh Garg,
Linus Jordan,
Ola Svensson
Abstract:
While the basic greedy algorithm gives a semi-streaming algorithm with an approximation guarantee of $2$ for the \emph{unweighted} matching problem, it was only recently that Paz and Schwartzman obtained an analogous result for weighted instances. Their approach is based on the versatile local ratio technique and also applies to generalizations such as weighted hypergraph matchings. However, the f…
▽ More
While the basic greedy algorithm gives a semi-streaming algorithm with an approximation guarantee of $2$ for the \emph{unweighted} matching problem, it was only recently that Paz and Schwartzman obtained an analogous result for weighted instances. Their approach is based on the versatile local ratio technique and also applies to generalizations such as weighted hypergraph matchings. However, the framework for the analysis fails for the related problem of weighted matroid intersection and as a result the approximation guarantee for weighted instances did not match the factor $2$ achieved by the greedy algorithm for unweighted instances. Our main result closes this gap by develo** a semi-streaming algorithm with an approximation guarantee of $2+ε$ for \emph{weighted} matroid intersection, improving upon the previous best guarantee of $4+ε$. Our techniques also allow us to generalize recent results by Levin and Wajc on submodular maximization subject to matching constraints to that of matroid-intersection constraints.
While our algorithm is an adaptation of the local ratio technique used in previous works, the analysis deviates significantly and relies on structural properties of matroid intersection, called kernels. Finally, we also conjecture that our algorithm gives a $(k+ε)$ approximation for the intersection of $k$ matroids but prove that new tools are needed in the analysis as the used structural properties fail for $k\geq 3$.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
Fast and Accurate $k$-means++ via Rejection Sampling
Authors:
Vincent Cohen-Addad,
Silvio Lattanzi,
Ashkan Norouzi-Fard,
Christian Sohler,
Ola Svensson
Abstract:
$k$-means++ \cite{arthur2007k} is a widely used clustering algorithm that is easy to implement, has nice theoretical guarantees and strong empirical performance. Despite its wide adoption, $k…
▽ More
$k$-means++ \cite{arthur2007k} is a widely used clustering algorithm that is easy to implement, has nice theoretical guarantees and strong empirical performance. Despite its wide adoption, $k$-means++ sometimes suffers from being slow on large data-sets so a natural question has been to obtain more efficient algorithms with similar guarantees. In this paper, we present a near linear time algorithm for $k$-means++ seeding. Interestingly our algorithm obtains the same theoretical guarantees as $k$-means++ and significantly improves earlier results on fast $k$-means++ seeding. Moreover, we show empirically that our algorithm is significantly faster than $k$-means++ and obtains solutions of equivalent quality.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Consistent k-Clustering for General Metrics
Authors:
Hendrik Fichtenberger,
Silvio Lattanzi,
Ashkan Norouzi-Fard,
Ola Svensson
Abstract:
Given a stream of points in a metric space, is it possible to maintain a constant approximate clustering by changing the cluster centers only a small number of times during the entire execution of the algorithm? This question received attention in recent years in the machine learning literature and, before our work, the best known algorithm performs $\widetilde{O}(k^2)$ center swaps (the…
▽ More
Given a stream of points in a metric space, is it possible to maintain a constant approximate clustering by changing the cluster centers only a small number of times during the entire execution of the algorithm? This question received attention in recent years in the machine learning literature and, before our work, the best known algorithm performs $\widetilde{O}(k^2)$ center swaps (the $\widetilde{O}(\cdot)$ notation hides polylogarithmic factors in the number of points $n$ and the aspect ratio $Δ$ of the input instance). This is a quadratic increase compared to the offline case -- the whole stream is known in advance and one is interested in kee** a constant approximation at any point in time -- for which $\widetilde{O}(k)$ swaps are known to be sufficient and simple examples show that $Ω(k \log(n Δ))$ swaps are necessary. We close this gap by develo** an algorithm that, perhaps surprisingly, matches the guarantees in the offline setting. Specifically, we show how to maintain a constant-factor approximation for the $k$-median problem by performing an optimal (up to polylogarithimic factors) number $\widetilde{O}(k)$ of center swaps. To obtain our result we leverage new structural properties of $k$-median clustering that may be of independent interest.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.
-
The Primal-Dual method for Learning Augmented Algorithms
Authors:
Étienne Bamas,
Andreas Maggiori,
Ola Svensson
Abstract:
The extension of classical online algorithms when provided with predictions is a new and active research area. In this paper, we extend the primal-dual method for online algorithms in order to incorporate predictions that advise the online algorithm about the next action to take. We use this framework to obtain novel algorithms for a variety of online covering problems. We compare our algorithms t…
▽ More
The extension of classical online algorithms when provided with predictions is a new and active research area. In this paper, we extend the primal-dual method for online algorithms in order to incorporate predictions that advise the online algorithm about the next action to take. We use this framework to obtain novel algorithms for a variety of online covering problems. We compare our algorithms to the cost of the true and predicted offline optimal solutions and show that these algorithms outperform any online algorithm when the prediction is accurate while maintaining good guarantees when the prediction is misleading.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Learning Augmented Energy Minimization via Speed Scaling
Authors:
Étienne Bamas,
Andreas Maggiori,
Lars Rohwedder,
Ola Svensson
Abstract:
As power management has become a primary concern in modern data centers, computing resources are being scaled dynamically to minimize energy consumption. We initiate the study of a variant of the classic online speed scaling problem, in which machine learning predictions about the future can be integrated naturally. Inspired by recent work on learning-augmented online algorithms, we propose an alg…
▽ More
As power management has become a primary concern in modern data centers, computing resources are being scaled dynamically to minimize energy consumption. We initiate the study of a variant of the classic online speed scaling problem, in which machine learning predictions about the future can be integrated naturally. Inspired by recent work on learning-augmented online algorithms, we propose an algorithm which incorporates predictions in a black-box manner and outperforms any online algorithm if the accuracy is high, yet maintains provable guarantees if the prediction is very inaccurate. We provide both theoretical and experimental evidence to support our claims.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Fair Colorful k-Center Clustering
Authors:
Xinrui Jia,
Kshiteej Sheth,
Ola Svensson
Abstract:
An instance of colorful k-center consists of points in a metric space that are colored red or blue, along with an integer k and a coverage requirement for each color. The goal is to find the smallest radius \r{ho} such that there exist balls of radius \r{ho} around k of the points that meet the coverage requirements. The motivation behind this problem is twofold. First, from fairness consideration…
▽ More
An instance of colorful k-center consists of points in a metric space that are colored red or blue, along with an integer k and a coverage requirement for each color. The goal is to find the smallest radius \r{ho} such that there exist balls of radius \r{ho} around k of the points that meet the coverage requirements. The motivation behind this problem is twofold. First, from fairness considerations: each color/group should receive a similar service guarantee, and second, from the algorithmic challenges it poses: this problem combines the difficulties of clustering along with the subset-sum problem. In particular, we show that this combination results in strong integrality gap lower bounds for several natural linear programming relaxations. Our main result is an efficient approximation algorithm that overcomes these difficulties to achieve an approximation guarantee of 3, nearly matching the tight approximation guarantee of 2 for the classical k-center problem which this problem generalizes.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Robust Algorithms under Adversarial Injections
Authors:
Paritosh Garg,
Sagar Kale,
Lars Rohwedder,
Ola Svensson
Abstract:
In this paper, we study streaming and online algorithms in the context of randomness in the input. For several problems, a random order of the input sequence---as opposed to the worst-case order---appears to be a necessary evil in order to prove satisfying guarantees. However, algorithmic techniques that work under this assumption tend to be vulnerable to even small changes in the distribution. Fo…
▽ More
In this paper, we study streaming and online algorithms in the context of randomness in the input. For several problems, a random order of the input sequence---as opposed to the worst-case order---appears to be a necessary evil in order to prove satisfying guarantees. However, algorithmic techniques that work under this assumption tend to be vulnerable to even small changes in the distribution. For this reason, we propose a new \emph{adversarial injections} model, in which the input is ordered randomly, but an adversary may inject misleading elements at arbitrary positions. We believe that studying algorithms under this much weaker assumption can lead to new insights and, in particular, more robust algorithms. We investigate two classical combinatorial-optimization problems in this model: Maximum matching and cardinality constrained monotone submodular function maximization. Our main technical contribution is a novel streaming algorithm for the latter that computes a $0.55$-approximation. While the algorithm itself is clean and simple, an involved analysis shows that it emulates a subdivision of the input stream which can be used to greatly limit the power of the adversary.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
The One-way Communication Complexity of Submodular Maximization with Applications to Streaming and Robustness
Authors:
Moran Feldman,
Ashkan Norouzi-Fard,
Ola Svensson,
Rico Zenklusen
Abstract:
We consider the classical problem of maximizing a monotone submodular function subject to a cardinality constraint, which, due to its numerous applications, has recently been studied in various computational models. We consider a clean multi-player model that lies between the offline and streaming model, and study it under the aspect of one-way communication complexity. Our model captures the stre…
▽ More
We consider the classical problem of maximizing a monotone submodular function subject to a cardinality constraint, which, due to its numerous applications, has recently been studied in various computational models. We consider a clean multi-player model that lies between the offline and streaming model, and study it under the aspect of one-way communication complexity. Our model captures the streaming setting (by considering a large number of players), and, in addition, two player approximation results for it translate into the robust setting. We present tight one-way communication complexity results for our model, which, due to the above-mentioned connections, have multiple implications in the data stream and robust setting.
Even for just two players, a prior information-theoretic hardness result implies that no approximation factor above $1/2$ can be achieved in our model, if only queries to feasible sets are allowed. We show that the possibility of querying infeasible sets can actually be exploited to beat this bound, by presenting a tight $2/3$-approximation taking exponential time, and an efficient $0.514$-approximation. To the best of our knowledge, this is the first example where querying a submodular function on infeasible sets leads to provably better results. Through the above-mentioned link to the robust setting, both of these algorithms improve on the current state-of-the-art for robust submodular maximization, showing that approximation factors beyond $1/2$ are possible. Moreover, exploiting the link of our model to streaming, we settle the approximability for streaming algorithms by presenting a tight $1/2+\varepsilon$ hardness result, based on the construction of a new family of coverage functions. This improves on a prior $1-1/e+\varepsilon$ hardness and matches, up to an arbitrarily small margin, the best known approximation algorithm.
△ Less
Submitted 30 March, 2020;
originally announced March 2020.
-
The Multi-Blade Boron-10-based neutron detector performance using a focusing reflectometer
Authors:
G. Mauri,
I. Apostolidis,
M. J. Christensen,
A. Glavic,
C. C. Lai,
A. Laloni,
F. Messi,
A. Lindh Olsson,
L. Robinson,
J. Stahn,
P. O. Svensson,
R. Hall-Wilton,
F. Piscitelli
Abstract:
The Multi-Blade is a Boron-10-based neutron detector designed for neutron reflectometers and developed for the two instruments (Estia and FREIA) planned for the European Spallation Source in Sweden. A reflectometry demonstrator has been installed at the AMOR reflectometer at the Paul Scherrer Institut (PSI - Switzerland). The setup exploits the Selene guide concept and it can be considered a scale…
▽ More
The Multi-Blade is a Boron-10-based neutron detector designed for neutron reflectometers and developed for the two instruments (Estia and FREIA) planned for the European Spallation Source in Sweden. A reflectometry demonstrator has been installed at the AMOR reflectometer at the Paul Scherrer Institut (PSI - Switzerland). The setup exploits the Selene guide concept and it can be considered a scaled-down demonstrator of Estia. The results of these tests are discussed. It will be shown how the characteristics of the Multi-Blade detector are features that allow the focusing reflectometry operation mode. Additionally the performance of the Multi-Blade, in terms of rate capability, exceeds current state-of-the-art technology. The improvements with respect to the previous prototypes are also highlighted; from background considerations to the linear and angular uniformity response of the detector.
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
Beating Greedy for Stochastic Bipartite Matching
Authors:
Buddhima Gamlath,
Sagar Kale,
Ola Svensson
Abstract:
We consider the maximum bipartite matching problem in stochastic settings, namely the query-commit and price-of-information models. In the query-commit model, an edge e independently exists with probability $p_e$. We can query whether an edge exists or not, but if it does exist, then we have to take it into our solution. In the unweighted case, one can query edges in the order given by the classic…
▽ More
We consider the maximum bipartite matching problem in stochastic settings, namely the query-commit and price-of-information models. In the query-commit model, an edge e independently exists with probability $p_e$. We can query whether an edge exists or not, but if it does exist, then we have to take it into our solution. In the unweighted case, one can query edges in the order given by the classical online algorithm of Karp, Vazirani, and Vazirani to get a $(1-1/e)$-approximation. In contrast, the previously best known algorithm in the weighted case is the $(1/2)$-approximation achieved by the greedy algorithm that sorts the edges according to their weights and queries in that order.
Improving upon the basic greedy, we give a $(1-1/e)$-approximation algorithm in the weighted query-commit model. We use a linear program (LP) to upper bound the optimum achieved by any strategy. The proposed LP admits several structural properties that play a crucial role in the design and analysis of our algorithm. We also extend these techniques to get a $(1-1/e)$-approximation algorithm for maximum bipartite matching in the price-of-information model introduced by Singla, who also used the basic greedy algorithm to give a $(1/2)$-approximation.
△ Less
Submitted 14 October, 2019; v1 submitted 27 September, 2019;
originally announced September 2019.
-
New Notions and Constructions of Sparsification for Graphs and Hypergraphs
Authors:
Nikhil Bansal,
Ola Svensson,
Luca Trevisan
Abstract:
A sparsifier of a graph $G$ (Benczúr and Karger; Spielman and Teng) is a sparse weighted subgraph $\tilde G$ that approximately retains the cut structure of $G$. For general graphs, non-trivial sparsification is possible only by using weighted graphs in which different edges have different weights. Even for graphs that admit unweighted sparsifiers, there are no known polynomial time algorithms tha…
▽ More
A sparsifier of a graph $G$ (Benczúr and Karger; Spielman and Teng) is a sparse weighted subgraph $\tilde G$ that approximately retains the cut structure of $G$. For general graphs, non-trivial sparsification is possible only by using weighted graphs in which different edges have different weights. Even for graphs that admit unweighted sparsifiers, there are no known polynomial time algorithms that find such unweighted sparsifiers.
We study a weaker notion of sparsification suggested by Oveis Gharan, in which the number of edges in each cut $(S,\bar S)$ is not approximated within a multiplicative factor $(1+ε)$, but is, instead, approximated up to an additive term bounded by $ε$ times $d\cdot |S| + \text{vol}(S)$, where $d$ is the average degree, and $\text{vol}(S)$ is the sum of the degrees of the vertices in $S$. We provide a probabilistic polynomial time construction of such sparsifiers for every graph, and our sparsifiers have a near-optimal number of edges $O(ε^{-2} n {\rm polylog}(1/ε))$. We also provide a deterministic polynomial time construction that constructs sparsifiers with a weaker property having the optimal number of edges $O(ε^{-2} n)$. Our constructions also satisfy a spectral version of the ``additive sparsification'' property.
Our construction of ``additive sparsifiers'' with $O_ε(n)$ edges also works for hypergraphs, and provides the first non-trivial notion of sparsification for hypergraphs achievable with $O(n)$ hyperedges when $ε$ and the rank $r$ of the hyperedges are constant. Finally, we provide a new construction of spectral hypergraph sparsifiers, according to the standard definition, with ${\rm poly}(ε^{-1},r)\cdot n\log n$ hyperedges, improving over the previous spectral construction (Soma and Yoshida) that used $\tilde O(n^3)$ hyperedges even for constant $r$ and $ε$.
△ Less
Submitted 4 May, 2019;
originally announced May 2019.
-
Online Matching with General Arrivals
Authors:
Buddhima Gamlath,
Michael Kapralov,
Andreas Maggiori,
Ola Svensson,
David Wajc
Abstract:
The online matching problem was introduced by Karp, Vazirani and Vazirani nearly three decades ago. In that seminal work, they studied this problem in bipartite graphs with vertices arriving only on one side, and presented optimal deterministic and randomized algorithms for this setting. In comparison, more general arrival models, such as edge arrivals and general vertex arrivals, have proven more…
▽ More
The online matching problem was introduced by Karp, Vazirani and Vazirani nearly three decades ago. In that seminal work, they studied this problem in bipartite graphs with vertices arriving only on one side, and presented optimal deterministic and randomized algorithms for this setting. In comparison, more general arrival models, such as edge arrivals and general vertex arrivals, have proven more challenging and positive results are known only for various relaxations of the problem. In particular, even the basic question of whether randomization allows one to beat the trivially-optimal deterministic competitive ratio of $\frac{1}{2}$ for either of these models was open. In this paper, we resolve this question for both these natural arrival models, and show the following.
1. For edge arrivals, randomization does not help --- no randomized algorithm is better than $\frac{1}{2}$ competitive.
2. For general vertex arrivals, randomization helps --- there exists a randomized $(\frac{1}{2}+Ω(1))$-competitive online matching algorithm.
△ Less
Submitted 17 April, 2019;
originally announced April 2019.
-
SZZ Unleashed: An Open Implementation of the SZZ Algorithm -- Featuring Example Usage in a Study of Just-in-Time Bug Prediction for the Jenkins Project
Authors:
Markus Borg,
Oscar Svensson,
Kristian Berg,
Daniel Hansson
Abstract:
Numerous empirical software engineering studies rely on detailed information about bugs. While issue trackers often contain information about when bugs were fixed, details about when they were introduced to the system are often absent. As a remedy, researchers often rely on the SZZ algorithm as a heuristic approach to identify bug-introducing software changes. Unfortunately, as reported in a recen…
▽ More
Numerous empirical software engineering studies rely on detailed information about bugs. While issue trackers often contain information about when bugs were fixed, details about when they were introduced to the system are often absent. As a remedy, researchers often rely on the SZZ algorithm as a heuristic approach to identify bug-introducing software changes. Unfortunately, as reported in a recent systematic literature review, few researchers have made their SZZ implementations publicly available. Consequently, there is a risk that research effort is wasted as new projects based on SZZ output need to initially reimplement the approach. Furthermore, there is a risk that newly developed (closed source) SZZ implementations have not been properly tested, thus conducting research based on their output might introduce threats to validity. We present SZZ Unleashed, an open implementation of the SZZ algorithm for git repositories. This paper describes our implementation along with a usage example for the Jenkins project, and conclude with an illustrative study on just-in-time bug prediction. We hope to continue evolving SZZ Unleashed on GitHub, and warmly invite the community to contribute.
△ Less
Submitted 19 August, 2019; v1 submitted 5 March, 2019;
originally announced March 2019.
-
Weighted Matchings via Unweighted Augmentations
Authors:
Buddhima Gamlath,
Sagar Kale,
Slobodan Mitrović,
Ola Svensson
Abstract:
We design a generic method for reducing the task of finding weighted matchings to that of finding short augmenting paths in unweighted graphs. This method enables us to provide efficient implementations for approximating weighted matchings in the streaming model and in the massively parallel computation (MPC) model.
In the context of streaming with random edge arrivals, our techniques yield a…
▽ More
We design a generic method for reducing the task of finding weighted matchings to that of finding short augmenting paths in unweighted graphs. This method enables us to provide efficient implementations for approximating weighted matchings in the streaming model and in the massively parallel computation (MPC) model.
In the context of streaming with random edge arrivals, our techniques yield a $(1/2+c)$-approximation algorithm thus breaking the natural barrier of $1/2$. For multi-pass streaming and the MPC model, we show that any algorithm computing a $(1-δ)$-approximate unweighted matching in bipartite graphs can be translated into an algorithm that computes a $(1-\varepsilon(δ))$-approximate maximum weighted matching. Furthermore, this translation incurs only a constant factor (that depends on $\varepsilon> 0$) overhead in the complexity. Instantiating this with the current best multi-pass streaming and MPC algorithms for unweighted matchings yields the following results for maximum weighted matchings:
* A $(1-\varepsilon)$-approximation streaming algorithm that uses $O_\varepsilon(1)$ passes and $O_\varepsilon(n\, \text{poly} (\log n))$ memory. This is the first $(1-\varepsilon)$-approximation streaming algorithm for weighted matchings that uses a constant number of passes (only depending on $\varepsilon$).
* A $(1 - \varepsilon)$-approximation algorithm in the MPC model that uses $O_\varepsilon(\log \log n)$ rounds, $O(m/n)$ machines per round, and $O_\varepsilon(n\, \text{poly}(\log n))$ memory per machine. This improves upon the previous best approximation guarantee of $(1/2-\varepsilon)$ for weighted graphs.
△ Less
Submitted 6 November, 2018;
originally announced November 2018.
-
Beyond $1/2$-Approximation for Submodular Maximization on Massive Data Streams
Authors:
Ashkan Norouzi-Fard,
Jakub Tarnawski,
Slobodan Mitrović,
Amir Zandieh,
Aida Mousavifar,
Ola Svensson
Abstract:
Many tasks in machine learning and data mining, such as data diversification, non-parametric learning, kernel machines, clustering etc., require extracting a small but representative summary from a massive dataset. Often, such problems can be posed as maximizing a submodular set function subject to a cardinality constraint. We consider this question in the streaming setting, where elements arrive…
▽ More
Many tasks in machine learning and data mining, such as data diversification, non-parametric learning, kernel machines, clustering etc., require extracting a small but representative summary from a massive dataset. Often, such problems can be posed as maximizing a submodular set function subject to a cardinality constraint. We consider this question in the streaming setting, where elements arrive over time at a fast pace and thus we need to design an efficient, low-memory algorithm. One such method, proposed by Badanidiyuru et al. (2014), always finds a $0.5$-approximate solution. Can this approximation factor be improved? We answer this question affirmatively by designing a new algorithm SALSA for streaming submodular maximization. It is the first low-memory, single-pass algorithm that improves the factor $0.5$, under the natural assumption that elements arrive in a random order. We also show that this assumption is necessary, i.e., that there is no such algorithm with better than $0.5$-approximation when elements arrive in arbitrary order. Our experiments demonstrate that SALSA significantly outperforms the state of the art in applications related to exemplar-based clustering, social graph analysis, and recommender systems.
△ Less
Submitted 6 August, 2018;
originally announced August 2018.
-
Damped second order flow applied to image denoising
Authors:
George Baravdish,
Olof Svensson,
Mårten Gulliksson,
Ye Zhang
Abstract:
In this paper, we introduce a new image denoising model: the damped flow (DF), which is a second order nonlinear evolution equation associated with a class of energy functionals of image. The existence, uniqueness and regularization property of DF are proven. For the numerical implementation, based on the Störmer-Verlet method, a discrete damped flow, SV-DDF, is developed. The convergence of SV-DD…
▽ More
In this paper, we introduce a new image denoising model: the damped flow (DF), which is a second order nonlinear evolution equation associated with a class of energy functionals of image. The existence, uniqueness and regularization property of DF are proven. For the numerical implementation, based on the Störmer-Verlet method, a discrete damped flow, SV-DDF, is developed. The convergence of SV-DDF is studied as well. Several numerical experiments, as well as a comparison with other methods, are provided to demonstrate the feasibility and effectiveness of the SV-DDF.
△ Less
Submitted 27 September, 2019; v1 submitted 18 June, 2018;
originally announced June 2018.
-
Semi-Supervised Algorithms for Approximately Optimal and Accurate Clustering
Authors:
Buddhima Gamlath,
Sangxia Huang,
Ola Svensson
Abstract:
We study $k$-means clustering in a semi-supervised setting. Given an oracle that returns whether two given points belong to the same cluster in a fixed optimal clustering, we investigate the following question: how many oracle queries are sufficient to efficiently recover a clustering that, with probability at least $(1 - δ)$, simultaneously has a cost of at most $(1 + ε)$ times the optimal cost a…
▽ More
We study $k$-means clustering in a semi-supervised setting. Given an oracle that returns whether two given points belong to the same cluster in a fixed optimal clustering, we investigate the following question: how many oracle queries are sufficient to efficiently recover a clustering that, with probability at least $(1 - δ)$, simultaneously has a cost of at most $(1 + ε)$ times the optimal cost and an accuracy of at least $(1 - ε)$?
We show how to achieve such a clustering on $n$ points with $O{((k^2 \log n) \cdot m{(Q, ε^4, δ/ (k\log n))})}$ oracle queries, when the $k$ clusters can be learned with an $ε'$ error and a failure probability $δ'$ using $m(Q, ε',δ')$ labeled samples in the supervised setting, where $Q$ is the set of candidate cluster centers. We show that $m(Q, ε', δ')$ is small both for $k$-means instances in Euclidean space and for those in finite metric spaces. We further show that, for the Euclidean $k$-means instances, we can avoid the dependency on $n$ in the query complexity at the expense of an increased dependency on $k$: specifically, we give a slightly more involved algorithm that uses $O(k^4/(ε^2 δ) + (k^{9}/ε^4) \log(1/δ) + k \cdot m(\mathbb{R}^r, ε^4/k, δ))$ oracle queries.
We also show that the number of queries needed for $(1 - ε)$-accuracy in Euclidean $k$-means must linearly depend on the dimension of the underlying Euclidean space, and for finite metric space $k$-means, we show that it must at least be logarithmic in the number of candidate centers. This shows that our query complexities capture the right dependencies on the respective parameters.
△ Less
Submitted 6 November, 2018; v1 submitted 2 March, 2018;
originally announced March 2018.
-
On bounded pitch inequalities for the min-knapsack polytope
Authors:
Yuri Faenza,
Igor Malinović,
Monaldo Mastrolilli,
Ola Svensson
Abstract:
In the min-knapsack problem one aims at choosing a set of objects with minimum total cost and total profit above a given threshold. In this paper, we study a class of valid inequalities for min-knapsack known as bounded pitch inequalities, which generalize the well-known unweighted cover inequalities. While separating over pitch-1 inequalities is NP-hard, we show that approximate separation over t…
▽ More
In the min-knapsack problem one aims at choosing a set of objects with minimum total cost and total profit above a given threshold. In this paper, we study a class of valid inequalities for min-knapsack known as bounded pitch inequalities, which generalize the well-known unweighted cover inequalities. While separating over pitch-1 inequalities is NP-hard, we show that approximate separation over the set of pitch-1 and pitch-2 inequalities can be done in polynomial time. We also investigate integrality gaps of linear relaxations for min-knapsack when these inequalities are added. Among other results, we show that, for any fixed $t$, the $t$-th CG closure of the natural linear relaxation has the unbounded integrality gap.
△ Less
Submitted 26 January, 2018;
originally announced January 2018.
-
A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem
Authors:
Ola Svensson,
Jakub Tarnawski,
László A. Végh
Abstract:
We give a constant-factor approximation algorithm for the asymmetric traveling salesman problem (ATSP). Our approximation guarantee is analyzed with respect to the standard LP relaxation, and thus our result confirms the conjectured constant integrality gap of that relaxation.
The main idea of our approach is a reduction to Subtour Partition Cover, an easier problem obtained by significantly rel…
▽ More
We give a constant-factor approximation algorithm for the asymmetric traveling salesman problem (ATSP). Our approximation guarantee is analyzed with respect to the standard LP relaxation, and thus our result confirms the conjectured constant integrality gap of that relaxation.
The main idea of our approach is a reduction to Subtour Partition Cover, an easier problem obtained by significantly relaxing the general connectivity requirements into local connectivity conditions. We first show that any algorithm for Subtour Partition Cover can be turned into an algorithm for ATSP while only losing a small constant factor in the performance guarantee. Next, we present a reduction from general ATSP instances to structured instances, on which we then solve Subtour Partition Cover, yielding our constant-factor approximation algorithm for ATSP.
△ Less
Submitted 15 September, 2020; v1 submitted 14 August, 2017;
originally announced August 2017.
-
A Framework for the Secretary Problem on the Intersection of Matroids
Authors:
Moran Feldman,
Ola Svensson,
Rico Zenklusen
Abstract:
The secretary problem became one of the most prominent online selection problems due to its numerous applications in online mechanism design. The task is to select a maximum weight subset of elements subject to given constraints, where elements arrive one-by-one in random order, revealing a weight upon arrival. The decision whether to select an element has to be taken immediately after its arrival…
▽ More
The secretary problem became one of the most prominent online selection problems due to its numerous applications in online mechanism design. The task is to select a maximum weight subset of elements subject to given constraints, where elements arrive one-by-one in random order, revealing a weight upon arrival. The decision whether to select an element has to be taken immediately after its arrival. The different applications that map to the secretary problem ask for different constraint families to be handled. The most prominent ones are matroid constraints, which both capture many relevant settings and admit strongly competitive secretary algorithms. However, dealing with more involved constraints proved to be much more difficult, and strong algorithms are known only for a few specific settings. In this paper, we present a general framework for dealing with the secretary problem over the intersection of several matroids. This framework allows us to combine and exploit the large set of matroid secretary algorithms known in the literature. As one consequence, we get constant-competitive secretary algorithms over the intersection of any constant number of matroids whose corresponding (single-)matroid secretary problems are currently known to have a constant-competitive algorithm. Moreover, we show that our results extend to submodular objectives.
△ Less
Submitted 9 April, 2017;
originally announced April 2017.
-
The Matching Problem in General Graphs is in Quasi-NC
Authors:
Ola Svensson,
Jakub Tarnawski
Abstract:
We show that the perfect matching problem in general graphs is in Quasi-NC. That is, we give a deterministic parallel algorithm which runs in $O(\log^3 n)$ time on $n^{O(\log^2 n)}$ processors. The result is obtained by a derandomization of the Isolation Lemma for perfect matchings, which was introduced in the classic paper by Mulmuley, Vazirani and Vazirani [1987] to obtain a Randomized NC algori…
▽ More
We show that the perfect matching problem in general graphs is in Quasi-NC. That is, we give a deterministic parallel algorithm which runs in $O(\log^3 n)$ time on $n^{O(\log^2 n)}$ processors. The result is obtained by a derandomization of the Isolation Lemma for perfect matchings, which was introduced in the classic paper by Mulmuley, Vazirani and Vazirani [1987] to obtain a Randomized NC algorithm.
Our proof extends the framework of Fenner, Gurjar and Thierauf [2016], who proved the analogous result in the special case of bipartite graphs. Compared to that setting, several new ingredients are needed due to the significantly more complex structure of perfect matchings in general graphs. In particular, our proof heavily relies on the laminar structure of the faces of the perfect matching polytope.
△ Less
Submitted 4 September, 2017; v1 submitted 6 April, 2017;
originally announced April 2017.
-
Better Guarantees for k-Means and Euclidean k-Median by Primal-Dual Algorithms
Authors:
Sara Ahmadian,
Ashkan Norouzi-Fard,
Ola Svensson,
Justin Ward
Abstract:
Clustering is a classic topic in optimization with $k$-means being one of the most fundamental such problems. In the absence of any restrictions on the input, the best known algorithm for $k$-means with a provable guarantee is a simple local search heuristic yielding an approximation guarantee of $9+ε$, a ratio that is known to be tight with respect to such methods.
We overcome this barrier by p…
▽ More
Clustering is a classic topic in optimization with $k$-means being one of the most fundamental such problems. In the absence of any restrictions on the input, the best known algorithm for $k$-means with a provable guarantee is a simple local search heuristic yielding an approximation guarantee of $9+ε$, a ratio that is known to be tight with respect to such methods.
We overcome this barrier by presenting a new primal-dual approach that allows us to (1) exploit the geometric structure of $k$-means and (2) to satisfy the hard constraint that at most $k$ clusters are selected without deteriorating the approximation guarantee. Our main result is a $6.357$-approximation algorithm with respect to the standard LP relaxation. Our techniques are quite general and we also show improved guarantees for the general version of $k$-means where the underlying metric is not required to be Euclidean and for $k$-median in Euclidean metrics.
△ Less
Submitted 10 April, 2017; v1 submitted 23 December, 2016;
originally announced December 2016.
-
Small Extended Formulation for Knapsack Cover Inequalities from Monotone Circuits
Authors:
Abbas Bazzi,
Samuel Fiorini,
Sangxia Huang,
Ola Svensson
Abstract:
Initially developed for the min-knapsack problem, the knapsack cover inequalities are used in the current best relaxations for numerous combinatorial optimization problems of covering type. In spite of their widespread use, these inequalities yield linear programming (LP) relaxations of exponential size, over which it is not known how to optimize exactly in polynomial time. In this paper we addres…
▽ More
Initially developed for the min-knapsack problem, the knapsack cover inequalities are used in the current best relaxations for numerous combinatorial optimization problems of covering type. In spite of their widespread use, these inequalities yield linear programming (LP) relaxations of exponential size, over which it is not known how to optimize exactly in polynomial time. In this paper we address this issue and obtain LP relaxations of quasi-polynomial size that are at least as strong as that given by the knapsack cover inequalities.
For the min-knapsack cover problem, our main result can be stated formally as follows: for any $\varepsilon >0$, there is a $(1/\varepsilon)^{O(1)}n^{O(\log n)}$-size LP relaxation with an integrality gap of at most $2+\varepsilon$, where $n$ is the number of items. Prior to this work, there was no known relaxation of subexponential size with a constant upper bound on the integrality gap.
Our construction is inspired by a connection between extended formulations and monotone circuit complexity via Karchmer-Wigderson games. In particular, our LP is based on $O(\log^2 n)$-depth monotone circuits with fan-in~$2$ for evaluating weighted threshold functions with $n$ inputs, as constructed by Beimel and Weinreb. We believe that a further understanding of this connection may lead to more positive results complementing the numerous lower bounds recently proved for extended formulations.
△ Less
Submitted 18 November, 2016; v1 submitted 13 September, 2016;
originally announced September 2016.
-
Unrelated Machine Scheduling of Jobs with Uniform Smith Ratios
Authors:
Christos Kalaitzis,
Ola Svensson,
Jakub Tarnawski
Abstract:
We consider the classic problem of scheduling jobs on unrelated machines so as to minimize the weighted sum of completion times. Recently, for a small constant $\varepsilon >0 $, Bansal et al. gave a $(3/2-\varepsilon)$-approximation algorithm improving upon the natural barrier of $3/2$ which follows from independent randomized rounding. In simplified terms, their result is obtained by an enhancem…
▽ More
We consider the classic problem of scheduling jobs on unrelated machines so as to minimize the weighted sum of completion times. Recently, for a small constant $\varepsilon >0 $, Bansal et al. gave a $(3/2-\varepsilon)$-approximation algorithm improving upon the natural barrier of $3/2$ which follows from independent randomized rounding. In simplified terms, their result is obtained by an enhancement of independent randomized rounding via strong negative correlation properties.
In this work, we take a different approach and propose to use the same elegant rounding scheme for the weighted completion time objective as devised by Shmoys and Tardos for optimizing a linear function subject to makespan constraints. Our main result is a $1.21$-approximation algorithm for the natural special case where the weight of a job is proportional to its processing time (specifically, all jobs have the same Smith ratio), which expresses the notion that each unit of work has the same weight. In addition, as a direct consequence of the rounding, our algorithm also achieves a bi-criteria $2$-approximation for the makespan objective. Our technical contribution is a tight analysis of the expected cost of the solution compared to the one given by the Configuration-LP relaxation - we reduce this task to that of understanding certain worst-case instances which are simple to analyze.
△ Less
Submitted 3 November, 2016; v1 submitted 26 July, 2016;
originally announced July 2016.
-
Lift-and-Round to Improve Weighted Completion Time on Unrelated Machines
Authors:
Nikhil Bansal,
Aravind Srinivasan,
Ola Svensson
Abstract:
We consider the problem of scheduling jobs on unrelated machines so as to minimize the sum of weighted completion times. Our main result is a $(3/2-c)$-approximation algorithm for some fixed $c>0$, improving upon the long-standing bound of 3/2 (independently due to Skutella, Journal of the ACM, 2001, and Sethuraman & Squillante, SODA, 1999). To do this, we first introduce a new lift-and-project ba…
▽ More
We consider the problem of scheduling jobs on unrelated machines so as to minimize the sum of weighted completion times. Our main result is a $(3/2-c)$-approximation algorithm for some fixed $c>0$, improving upon the long-standing bound of 3/2 (independently due to Skutella, Journal of the ACM, 2001, and Sethuraman & Squillante, SODA, 1999). To do this, we first introduce a new lift-and-project based SDP relaxation for the problem. This is necessary as the previous convex programming relaxations have an integrality gap of $3/2$. Second, we give a new general bipartite-rounding procedure that produces an assignment with certain strong negative correlation properties.
△ Less
Submitted 1 December, 2015; v1 submitted 24 November, 2015;
originally announced November 2015.
-
Constant Factor Approximation for ATSP with Two Edge Weights
Authors:
Ola Svensson,
Jakub Tarnawski,
László A. Végh
Abstract:
We give a constant factor approximation algorithm for the Asymmetric Traveling Salesman Problem on shortest path metrics of directed graphs with two different edge weights. For the case of unit edge weights, the first constant factor approximation was given recently by Svensson. This was accomplished by introducing an easier problem called Local-Connectivity ATSP and showing that a good solution t…
▽ More
We give a constant factor approximation algorithm for the Asymmetric Traveling Salesman Problem on shortest path metrics of directed graphs with two different edge weights. For the case of unit edge weights, the first constant factor approximation was given recently by Svensson. This was accomplished by introducing an easier problem called Local-Connectivity ATSP and showing that a good solution to this problem can be used to obtain a constant factor approximation for ATSP. In this paper, we solve Local-Connectivity ATSP for two different edge weights. The solution is based on a flow decomposition theorem for solutions of the Held-Karp relaxation, which may be of independent interest.
△ Less
Submitted 4 September, 2017; v1 submitted 22 November, 2015;
originally announced November 2015.
-
Online Contention Resolution Schemes
Authors:
Moran Feldman,
Ola Svensson,
Rico Zenklusen
Abstract:
We introduce a new rounding technique designed for online optimization problems, which is related to contention resolution schemes, a technique initially introduced in the context of submodular function maximization. Our rounding technique, which we call online contention resolution schemes (OCRSs), is applicable to many online selection problems, including Bayesian online selection, oblivious pos…
▽ More
We introduce a new rounding technique designed for online optimization problems, which is related to contention resolution schemes, a technique initially introduced in the context of submodular function maximization. Our rounding technique, which we call online contention resolution schemes (OCRSs), is applicable to many online selection problems, including Bayesian online selection, oblivious posted pricing mechanisms, and stochastic probing models. It allows for handling a wide set of constraints, and shares many strong properties of offline contention resolution schemes. In particular, OCRSs for different constraint families can be combined to obtain an OCRS for their intersection. Moreover, we can approximately maximize submodular functions in the online settings we consider.
We, thus, get a broadly applicable framework for several online selection problems, which improves on previous approaches in terms of the types of constraints that can be handled, the objective functions that can be dealt with, and the assumptions on the strength of the adversary. Furthermore, we resolve two open problems from the literature; namely, we present the first constant-factor constrained oblivious posted price mechanism for matroid constraints, and the first constant-factor algorithm for weighted stochastic probing with deadlines.
△ Less
Submitted 14 October, 2015; v1 submitted 1 August, 2015;
originally announced August 2015.
-
No Small Linear Program Approximates Vertex Cover within a Factor $2 - ε$
Authors:
Abbas Bazzi,
Samuel Fiorini,
Sebastian Pokutta,
Ola Svensson
Abstract:
The vertex cover problem is one of the most important and intensively studied combinatorial optimization problems. Khot and Regev (2003) proved that the problem is NP-hard to approximate within a factor $2 - ε$, assuming the Unique Games Conjecture (UGC). This is tight because the problem has an easy 2-approximation algorithm. Without resorting to the UGC, the best inapproximability result for the…
▽ More
The vertex cover problem is one of the most important and intensively studied combinatorial optimization problems. Khot and Regev (2003) proved that the problem is NP-hard to approximate within a factor $2 - ε$, assuming the Unique Games Conjecture (UGC). This is tight because the problem has an easy 2-approximation algorithm. Without resorting to the UGC, the best inapproximability result for the problem is due to Dinur and Safra (2002): vertex cover is NP-hard to approximate within a factor 1.3606. We prove the following unconditional result about linear programming (LP) relaxations of the problem: every LP relaxation that approximates vertex cover within a factor $2-ε$ has super-polynomially many inequalities. As a direct consequence of our methods, we also establish that LP relaxations (as well as SDP relaxations) that approximate the independent set problem within any constant factor have super-polynomial size.
△ Less
Submitted 26 November, 2015; v1 submitted 2 March, 2015;
originally announced March 2015.
-
Approximating ATSP by Relaxing Connectivity
Authors:
Ola Svensson
Abstract:
The standard LP relaxation of the asymmetric traveling salesman problem has been conjectured to have a constant integrality gap in the metric case. We prove this conjecture when restricted to shortest path metrics of node-weighted digraphs. Our arguments are constructive and give a constant factor approximation algorithm for these metrics. We remark that the considered case is more general than th…
▽ More
The standard LP relaxation of the asymmetric traveling salesman problem has been conjectured to have a constant integrality gap in the metric case. We prove this conjecture when restricted to shortest path metrics of node-weighted digraphs. Our arguments are constructive and give a constant factor approximation algorithm for these metrics. We remark that the considered case is more general than the directed analog of the special case of the symmetric traveling salesman problem for which there were recent improvements on Christofides' algorithm.
The main idea of our approach is to first consider an easier problem obtained by significantly relaxing the general connectivity requirements into local connectivity conditions. For this relaxed problem, it is quite easy to give an algorithm with a guarantee of 3 on node-weighted shortest path metrics. More surprisingly, we then show that any algorithm (irrespective of the metric) for the relaxed problem can be turned into an algorithm for the asymmetric traveling salesman problem by only losing a small constant factor in the performance guarantee. This leaves open the intriguing task of designing a "good" algorithm for the relaxed problem on general metrics.
△ Less
Submitted 13 August, 2015; v1 submitted 6 February, 2015;
originally announced February 2015.
-
Dynamic Facility Location via Exponential Clocks
Authors:
Hyung-Chan An,
Ashkan Norouzi-Fard,
Ola Svensson
Abstract:
The \emph{dynamic facility location problem} is a generalization of the classic facility location problem proposed by Eisenstat, Mathieu, and Schabanel to model the dynamics of evolving social/infrastructure networks. The generalization lies in that the distance metric between clients and facilities changes over time. This leads to a trade-off between optimizing the classic objective function and…
▽ More
The \emph{dynamic facility location problem} is a generalization of the classic facility location problem proposed by Eisenstat, Mathieu, and Schabanel to model the dynamics of evolving social/infrastructure networks. The generalization lies in that the distance metric between clients and facilities changes over time. This leads to a trade-off between optimizing the classic objective function and the "stability" of the solution: there is a switching cost charged every time a client changes the facility to which it is connected. While the standard linear program (LP) relaxation for the classic problem naturally extends to this problem, traditional LP-rounding techniques do not, as they are often sensitive to small changes in the metric resulting in frequent switches.
We present a new LP-rounding algorithm for facility location problems, which yields the first constant approximation algorithm for the dynamic facility location problem. Our algorithm installs competing exponential clocks on the clients and facilities, and connect every client by the path that repeatedly follows the smallest clock in the neighborhood. The use of exponential clocks gives rise to several properties that distinguish our approach from previous LP-roundings for facility location problems. In particular, we use \emph{no clustering} and we allow clients to connect through paths of \emph{arbitrary lengths}. In fact, the clustering-free nature of our algorithm is crucial for applying our LP-rounding approach to the dynamic problem.
△ Less
Submitted 17 November, 2014;
originally announced November 2014.
-
Combinatorial Algorithm for Restricted Max-Min Fair Allocation
Authors:
Chidambaram Annamalai,
Christos Kalaitzis,
Ola Svensson
Abstract:
We study the basic allocation problem of assigning resources to players so as to maximize fairness. This is one of the few natural problems that enjoys the intriguing status of having a better estimation algorithm than approximation algorithm. Indeed, a certain Configuration-LP can be used to estimate the value of the optimal allocation to within a factor of $4 + ε$. In contrast, however, the best…
▽ More
We study the basic allocation problem of assigning resources to players so as to maximize fairness. This is one of the few natural problems that enjoys the intriguing status of having a better estimation algorithm than approximation algorithm. Indeed, a certain Configuration-LP can be used to estimate the value of the optimal allocation to within a factor of $4 + ε$. In contrast, however, the best known approximation algorithm for the problem has an unspecified large constant guarantee.
In this paper we significantly narrow this gap by giving a $13$-approximation algorithm for the problem. Our approach develops a local search technique introduced by Haxell [Hax95] for hypergraph matchings, and later used in this context by Asadpour, Feige, and Saberi [AFS12]. For our local search procedure to terminate in polynomial time, we introduce several new ideas such as lazy updates and greedy players. Besides the improved approximation guarantee, the highlight of our approach is that it is purely combinatorial and uses the Configuration-LP only in the analysis.
△ Less
Submitted 23 November, 2016; v1 submitted 2 September, 2014;
originally announced September 2014.
-
LP-Based Algorithms for Capacitated Facility Location
Authors:
Hyung-Chan An,
Mohit Singh,
Ola Svensson
Abstract:
Linear programming has played a key role in the study of algorithms for combinatorial optimization problems. In the field of approximation algorithms, this is well illustrated by the uncapacitated facility location problem. A variety of algorithmic methodologies, such as LP-rounding and primal-dual method, have been applied to and evolved from algorithms for this problem. Unfortunately, this colle…
▽ More
Linear programming has played a key role in the study of algorithms for combinatorial optimization problems. In the field of approximation algorithms, this is well illustrated by the uncapacitated facility location problem. A variety of algorithmic methodologies, such as LP-rounding and primal-dual method, have been applied to and evolved from algorithms for this problem. Unfortunately, this collection of powerful algorithmic techniques had not yet been applicable to the more general capacitated facility location problem. In fact, all of the known algorithms with good performance guarantees were based on a single technique, local search, and no linear programming relaxation was known to efficiently approximate the problem.
In this paper, we present a linear programming relaxation with constant integrality gap for capacitated facility location. We demonstrate that the fundamental theories of multi-commodity flows and matchings provide key insights that lead to the strong relaxation. Our algorithmic proof of integrality gap is obtained by finally accessing the rich toolbox of LP-based methodologies: we present a constant factor approximation algorithm based on LP-rounding.
△ Less
Submitted 15 September, 2014; v1 submitted 11 July, 2014;
originally announced July 2014.
-
A Simple $O(\log\log(\mathrm{rank}))$-Competitive Algorithm for the Matroid Secretary Problem
Authors:
Moran Feldman,
Ola Svensson,
Rico Zenklusen
Abstract:
Only recently progress has been made in obtaining $o(\log(\mathrm{rank}))$-competitive algorithms for the matroid secretary problem. More precisely, Chakraborty and Lachish (2012) presented a $O(\sqrt{\log(\mathrm{rank})})$-competitive procedure, and Lachish (2014) later presented a $O(\log\log(\mathrm{rank}))$-competitive algorithm. Both these algorithms and their analyses are very involved, whic…
▽ More
Only recently progress has been made in obtaining $o(\log(\mathrm{rank}))$-competitive algorithms for the matroid secretary problem. More precisely, Chakraborty and Lachish (2012) presented a $O(\sqrt{\log(\mathrm{rank})})$-competitive procedure, and Lachish (2014) later presented a $O(\log\log(\mathrm{rank}))$-competitive algorithm. Both these algorithms and their analyses are very involved, which is also reflected in the extremely high constants in their competitive ratios.
Using different tools, we present a considerably simpler $O(\log\log(\mathrm{rank}))$-competitive algorithm for the matroid secretary problem. Our algorithm can be interpreted as a distribution over a simple type of matroid secretary algorithms which are easy to analyze. Due to the simplicity of our procedure, we are also able to vastly improve on the hidden constant in the competitive ratio.
△ Less
Submitted 4 July, 2014; v1 submitted 17 April, 2014;
originally announced April 2014.
-
On the Configuration LP for Maximum Budgeted Allocation
Authors:
Christos Kalaitzis,
Aleksander Mcadry,
Alantha Newman,
Lukáš Poláček,
Ola Svensson
Abstract:
We study the Maximum Budgeted Allocation problem, i.e., the problem of selling a set of $m$ indivisible goods to $n$ players, each with a separate budget, such that we maximize the collected revenue. Since the natural assignment LP is known to have an integrality gap of $\frac{3}{4}$, which matches the best known approximation algorithms, our main focus is to improve our understanding of the stron…
▽ More
We study the Maximum Budgeted Allocation problem, i.e., the problem of selling a set of $m$ indivisible goods to $n$ players, each with a separate budget, such that we maximize the collected revenue. Since the natural assignment LP is known to have an integrality gap of $\frac{3}{4}$, which matches the best known approximation algorithms, our main focus is to improve our understanding of the stronger configuration LP relaxation. In this direction, we prove that the integrality gap of the configuration LP is strictly better than $\frac{3}{4}$, and provide corresponding polynomial time roundings, in the following restrictions of the problem: (i) the Restricted Budgeted Allocation problem, in which all the players have the same budget and every item has the same value for any player it can be sold to, and (ii) the graph MBA problem, in which an item can be assigned to at most 2 players. Finally, we improve the best known upper bound on the integrality gap for the general case from $\frac{5}{6}$ to $2\sqrt{2}-2\approx 0.828$ and also prove hardness of approximation results for both cases.
△ Less
Submitted 28 March, 2014;
originally announced March 2014.