-
Toward Scalable Algorithms for the Unsplittable Shortest Path Routing Problem
Authors:
Amal Benhamiche,
Morgan Chopin
Abstract:
In this paper, we consider the Delay Constrained Unsplittable Shortest Path Routing problem which arises in the field of traffic engineering for IP networks. This problem consists, given a directed graph and a set of commodities, to compute a set of routing paths and the associated administrative weights such that each commodity is routed along the unique shortest path between its origin and its d…
▽ More
In this paper, we consider the Delay Constrained Unsplittable Shortest Path Routing problem which arises in the field of traffic engineering for IP networks. This problem consists, given a directed graph and a set of commodities, to compute a set of routing paths and the associated administrative weights such that each commodity is routed along the unique shortest path between its origin and its destination, according to these weights. We present a compact MILP formulation for the problem, extending the work in (A. Bley, 2010) along with some valid inequalities to strengthen its linear relaxation. This formulation is used as the bulding block of an iterative approach that we develop to tackle large scale instances. We further propose a dynamic programming algorithm based on a tree decomposition of the graph. To the best of our knowledge, this is the first exact combinatorial algorithm for the problem. Finally, we assess the efficiency of our approaches through a set of experiments on state-of-the-art instances.
△ Less
Submitted 7 June, 2020;
originally announced June 2020.
-
Fixed-Parameter Algorithms for DAG Partitioning
Authors:
René van Bevern,
Robert Bredereck,
Morgan Chopin,
Sepp Hartung,
Falk Hüffner,
André Nichterlein,
Ondřej Suchý
Abstract:
Finding the origin of short phrases propagating through the web has been formalized by Leskovec et al. [ACM SIGKDD 2009] as DAG Partitioning: given an arc-weighted directed acyclic graph on $n$ vertices and $m$ arcs, delete arcs with total weight at most $k$ such that each resulting weakly-connected component contains exactly one sink---a vertex without outgoing arcs. DAG Partitioning is NP-hard.…
▽ More
Finding the origin of short phrases propagating through the web has been formalized by Leskovec et al. [ACM SIGKDD 2009] as DAG Partitioning: given an arc-weighted directed acyclic graph on $n$ vertices and $m$ arcs, delete arcs with total weight at most $k$ such that each resulting weakly-connected component contains exactly one sink---a vertex without outgoing arcs. DAG Partitioning is NP-hard.
We show an algorithm to solve DAG Partitioning in $O(2^k \cdot (n+m))$ time, that is, in linear time for fixed $k$. We complement it with linear-time executable data reduction rules. Our experiments show that, in combination, they can optimally solve DAG Partitioning on simulated citation networks within five minutes for $k\leq190$ and $m$ being $10^7$ and larger. We use our obtained optimal solutions to evaluate the solution quality of Leskovec et al.'s heuristic.
We show that Leskovec et al.'s heuristic works optimally on trees and generalize this result by showing that DAG Partitioning is solvable in $2^{O(w^2)}\cdot n$ time if a width-$w$ tree decomposition of the input graph is given. Thus, we improve an algorithm and answer an open question of Alamdari and Mehrabian [WAW 2012].
We complement our algorithms by lower bounds on the running time of exact algorithms and on the effectivity of data reduction.
△ Less
Submitted 27 November, 2016;
originally announced November 2016.
-
Data Reductions and Combinatorial Bounds for Improved Approximation Algorithms
Authors:
Faisal N. Abu-Khzam,
Cristina Bazgan,
Morgan Chopin,
Henning Fernau
Abstract:
Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of reduction rules and combinatorial insights. We will expose in this paper a similar strategy for obtaining polynomial-time approximation algorithms. Our method features the use of approximation-preserving reductions, akin to the notion of parameterized reductions. We exemplify this method to obta…
▽ More
Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of reduction rules and combinatorial insights. We will expose in this paper a similar strategy for obtaining polynomial-time approximation algorithms. Our method features the use of approximation-preserving reductions, akin to the notion of parameterized reductions. We exemplify this method to obtain the currently best approximation algorithms for \textsc{Harmless Set}, \textsc{Differential} and \textsc{Multiple Nonblocker}, all of them can be considered in the context of securing networks or information propagation.
△ Less
Submitted 12 September, 2014;
originally announced September 2014.
-
Parameterized Inapproximability of Target Set Selection and Generalizations
Authors:
Cristina Bazgan,
Morgan Chopin,
André Nichterlein,
Florian Sikora
Abstract:
In this paper, we consider the Target Set Selection problem: given a graph and a threshold value $thr(v)$ for any vertex $v$ of the graph, find a minimum size vertex-subset to "activate" s.t. all the vertices of the graph are activated at the end of the propagation process. A vertex $v$ is activated during the propagation process if at least $thr(v)$ of its neighbors are activated. This problem mo…
▽ More
In this paper, we consider the Target Set Selection problem: given a graph and a threshold value $thr(v)$ for any vertex $v$ of the graph, find a minimum size vertex-subset to "activate" s.t. all the vertices of the graph are activated at the end of the propagation process. A vertex $v$ is activated during the propagation process if at least $thr(v)$ of its neighbors are activated. This problem models several practical issues like faults in distributed networks or word-to-mouth recommendations in social networks. We show that for any functions $f$ and $ρ$ this problem cannot be approximated within a factor of $ρ(k)$ in $f(k) \cdot n^{O(1)}$ time, unless FPT = W[P], even for restricted thresholds (namely constant and majority thresholds). We also study the cardinality constraint maximization and minimization versions of the problem for which we prove similar hardness results.
△ Less
Submitted 10 June, 2015; v1 submitted 14 March, 2014;
originally announced March 2014.
-
The Firefighter Problem: A Structural Analysis
Authors:
Janka Chlebíková,
Morgan Chopin
Abstract:
We consider the complexity of the firefighter problem where b>=1 firefighters are available at each time step. This problem is proved NP-complete even on trees of degree at most three and budget one (Finbow et al.,2007) and on trees of bounded degree b+3 for any fixed budget b>=2 (Bazgan et al.,2012). In this paper, we provide further insight into the complexity landscape of the problem by showing…
▽ More
We consider the complexity of the firefighter problem where b>=1 firefighters are available at each time step. This problem is proved NP-complete even on trees of degree at most three and budget one (Finbow et al.,2007) and on trees of bounded degree b+3 for any fixed budget b>=2 (Bazgan et al.,2012). In this paper, we provide further insight into the complexity landscape of the problem by showing that the pathwidth and the maximum degree of the input graph govern its complexity. More precisely, we first prove that the problem is NP-complete even on trees of pathwidth at most three for any fixed budget b>=1. We then show that the problem turns out to be fixed parameter-tractable with respect to the combined parameter "pathwidth" and "maximum degree" of the input graph.
△ Less
Submitted 28 April, 2014; v1 submitted 8 October, 2013;
originally announced October 2013.
-
Parameterized Approximability of Maximizing the Spread of Influence in Networks
Authors:
Cristina Bazgan,
Morgan Chopin,
André Nichterlein,
Florian Sikora
Abstract:
In this paper, we consider the problem of maximizing the spread of influence through a social network. Given a graph with a threshold value~$thr(v)$ attached to each vertex~$v$, the spread of influence is modeled as follows: A vertex~$v$ becomes "active" (influenced) if at least $thr(v)$ of its neighbors are active. In the corresponding optimization problem the objective is then to find a fixed nu…
▽ More
In this paper, we consider the problem of maximizing the spread of influence through a social network. Given a graph with a threshold value~$thr(v)$ attached to each vertex~$v$, the spread of influence is modeled as follows: A vertex~$v$ becomes "active" (influenced) if at least $thr(v)$ of its neighbors are active. In the corresponding optimization problem the objective is then to find a fixed number of vertices to activate such that the number of activated vertices at the end of the propagation process is maximum. We show that this problem is strongly inapproximable in fpt-time with respect to (w.r.t.) parameter $k$ even for very restrictive thresholds. In the case that the threshold of each vertex equals its degree, we prove that the problem is inapproximable in polynomial time and it becomes $r(n)$-approximable in fpt-time w.r.t. parameter $k$ for any strictly increasing function $r$.
Moreover, we show that the decision version is W[1]-hard w.r.t. parameter $k$ but becomes fixed-parameter tractable on bounded degree graphs.
△ Less
Submitted 17 August, 2014; v1 submitted 27 March, 2013;
originally announced March 2013.
-
The firefighter problem with more than one firefighter on trees
Authors:
Cristina Bazgan,
Morgan Chopin,
Bernard Ries
Abstract:
In this paper we study the complexity of the firefighter problem and related problems on trees when more than one firefighter is available at each time step, and answer several open questions of Finbow and MacGillivray 2009. More precisely, when $b \geq 2$ firefighters are allowed at each time step, the problem is NP-complete for trees of maximum degree $b+2$ and polynomial-time solvable for trees…
▽ More
In this paper we study the complexity of the firefighter problem and related problems on trees when more than one firefighter is available at each time step, and answer several open questions of Finbow and MacGillivray 2009. More precisely, when $b \geq 2$ firefighters are allowed at each time step, the problem is NP-complete for trees of maximum degree $b+2$ and polynomial-time solvable for trees of maximum degree $b+2$ when the fire breaks out at a vertex of degree at most $b+1$. Moreover we present a polynomial-time algorithm for a subclass of trees, namely $k$-caterpillars.
△ Less
Submitted 3 October, 2011;
originally announced October 2011.