This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: University of British Columbia, Vancouver, Canada
%First ̵names ̵are ̵abbreviated ̵in ̵the ̵running ̵head.%If ̵there ̵are ̵more ̵than ̵two ̵authors, ̵’et ̵al.’ ̵is ̵used.%**** ̵ms.tex ̵Line ̵75 ̵****[email protected], [email protected]
22institutetext: University of Waterloo, Waterloo, Canada
[email protected]

A Knapsack Intersection Hierarchy Applied to All-or-Nothing Flow in Trees

Adam Jozefiak 11    F. Bruce Shepherd 11    Noah Weninger 22
Abstract

We introduce a natural knapsack intersection hierarchy for strengthening linear programming relaxations of packing integer programs, i.e., max{wTx:xP{0,1}n}\max\{w^{T}x:x\in P\cap\{0,1\}^{n}\} where P={x[0,1]n:Axb}P=\{x\in[0,1]^{n}:Ax\leq b\} and A,b,w0A,b,w\geq 0. The ttht^{th} level PtP^{t} corresponds to adding cuts associated with the integer hull of the intersection of any tt knapsack constraints (rows of the constraint matrix). This model captures the maximum possible strength of “tt-row cuts”, an approach often used by solvers for small tt. If AA is m×nm\times n, then PmP^{m} is the integer hull of PP and P1P^{1} corresponds to adding cuts for each associated single-row knapsack problem. Thus, even separating over P1P^{1} is NP-hard. However, for fixed tt and any ϵ>0\epsilon>0, results of Pritchard imply there is a polytime (1+ϵ)(1+\epsilon)-approximation for PtP^{t}. We then investigate the hierarchy’s strength in the context of the well-studied all-or-nothing flow problem in trees (also called unsplittable flow on trees). For this problem, we show that the integrality gap of PtP^{t} is O(n/t)O(n/t) and give examples where the gap is Ω(n/t)\Omega(n/t). We then examine the stronger formulation PrankP_{\operatorname{rank}} where all rank constraints are added. For PranktP_{\operatorname{rank}}^{t}, our best lower bound drops to Ω(1/c)\Omega(1/c) at level t=nct=n^{c} for any c>0c>0. Moreover, on a well-known class of “bad instances” due to Friggstad and Gao, we show that we can achieve this gap; hence a constant integrality gap for these instances is obtained at level ncn^{c}.

1 Introduction

In this paper we study linear relaxations for packing integer programs (PIP). A PIP is described by a 0-1 optimization problem max{wTx:x{0,1}n,Axb}\max\,\{w^{T}x:x\in\{0,1\}^{n},\,Ax\leq b\}, where w+n,A+m×n, and b+mw\in{\mathbb{Z}}^{n}_{+},\,A\in{\mathbb{Z}}^{m\times n}_{+},\text{ and }b\in{\mathbb{Z}}^{m}_{+}. These integer programs capture well-known problems such as 0-1 knapsack, matroid optimization, maximum stable set, demand matching and all-or-nothing flow in trees (also called unsplittable flow on trees). PIPs are also called 0-1 multidimensional knapsack problems in the case where mm is fixed. We introduce a hierarchy of strengthened PIP formulations where level tt is defined by adding cuts associated with the integer hulls of all intersections of tt constraints. This knapsack intersection hierarchy is inspired by successful computational approaches; in the case of a single constraint it corresponds to the cuts added in the pioneering work of Crowder, Johnson, and Padberg [7]. We evaluate the strength of this hierarchy applied to the well-studied “all-or-nothing flow” problem in trees (ANF-Tree). This problem generalizes weighted matching but has no known polytime O(1)O(1)-approximation. In this section we formally define the hierarchy and in the next section we discuss our results for ANF-Tree.

PIPs generally have a (one or more) natural linear relaxation P:={x[0,1]n:Axb}P:=\{x\in[0,1]^{n}:Ax\leq b\}, where A,b0A,b\geq 0. The discrete problem of interest is to optimize over the integer hull PI:=conv(P{0,1}n)P_{I}:=\operatorname{conv}(P\cap\{0,1\}^{n}). Computational solution strategies for PIPs often use some form of branch and cut method, and one of the most effective approaches is to rely on cuts for the knapsack polytopes associated with individual constraints [7]. Let aja^{j} be row jj of AA and bjb^{j} be element jj in bb. For each j[m]j\in[m], let K(j)K(j) denote the polytope {x[0,1]n:iaijxibj}\{x\in[0,1]^{n}:\sum_{i}a^{j}_{i}x_{i}\leq b^{j}\}. The knapsack cuts for K(j)K(j) are the inequalities which are valid for the integer hull KI(j):=conv(K(j){0,1}n)K_{I}(j):=\operatorname{conv}(K(j)\cap\{0,1\}^{n}), i.e., the knapsack polytope for constraint jj. On each iteration of a branch and cut approach (e.g., see [25]), one has a feasible—but fractional—solution x~\tilde{x} for a current relaxation PP^{\prime} of PIP_{I}. In [7], they generate knapsack cuts for some constraint. That is, for some jj, they find a valid inequality cTxdc^{T}x\leq d for KI(j)K_{I}(j) for which cTx~>dc^{T}\tilde{x}>d. Adding such inequalities to PP^{\prime} gives a tighter formulation for PIP_{I} on which to recurse.

This approach has also been extended to multi-row cuts. This can be set up in various ways, e.g.: (1) by aggregating multiple constraints to form a single inequality and then generating cuts for the associated knapsack [11, 26, 12] and (2) by considering cuts associated with the integer hull of the intersection of several knapsack polytopes [21, 18]. The latter set-up is potentially stronger in the following sense: there are instances where adding all cuts of type (2) defines the integer hull but adding (any number of) cuts of type (1) does not.111A well-known example for the Chvátal rank actually shows that one may need an unbounded number of rounds of aggregated cuts in order to obtain the integer hull (e.g., see Section 23 in [25]).

We discuss a framework to measure the strength of cuts in the latter setting. For some S[m]S\subseteq[m], we denote the intersection of the fractional knapsack polytopes associated with constraints in SS; we define K(S):=jSK(j)K(S):=\cap_{j\in S}K(j). We consider a relaxation where all cuts are added for the associated integer hull KI(S)K_{I}(S). We then define a knapsack intersection hierarchy for PIP_{I} as follows. For each t[m]t\in[m], define

Pt:=|S|=tKI(S).\displaystyle P^{t}:=\bigcap_{|S|=t}K_{I}(S).

In other words, PtP^{t} is obtained from PP by adding, for each S[m]S\subseteq[m] with |S|=t|S|=t, all valid inequalities for KI(S)K_{I}(S). Clearly, Pt+1PtP^{t+1}\subseteq P^{t} and Pm=PIP^{m}=P_{I}, so we have the following hierarchy:

PP1Pm1Pm=PI.\displaystyle P\supseteq P^{1}\supseteq\ldots\supseteq P^{m-1}\supseteq P^{m}=P_{I}.

Separating over KI(S)K_{I}(S) is NP-Hard given that, even for t=1t=1, 0-1 knapsack is a special case, Hence it is already NP-Hard to separate over P1P^{1}, the first level of the hierarchy; this fate is shared by a different hierarchy, since the Chvátal closure of a polyhedron is NP-hard to separate [13]. To mitigate this, we show that results of Pritchard [23] lead to a tractable formulation, that is, one that is polynomially sized, but approximate, when tt is constant.

Theorem 1.1

For 0<ϵ10<\epsilon\leq 1, there is an approximate formulation for PtP^{t} of size O(nt3ϵ1+t+1)O(n^{t^{3}\epsilon^{-1}+t+1}) for which the value of an optimal solution is at most a (1/(1ϵ))(1/(1-\epsilon))-factor larger than the optimal solution to PtP^{t}.

Corollary 1

For fixed tt there is a PTAS for max{wTx:xPt}\max\{w^{T}x:x\in P^{t}\}.

We defer the proofs to Section 2. We now discuss the impact of the knapsack hierarchy on formulations for ANF-Tree.

1.1 All-or-Nothing Flow in Trees

The all-or-nothing flow problem [10] is defined for a multiflow problem whose input is a supply graph GG and demand graph HH. GG and HH may also be endowed with edge capacities ue:eE(G)u_{e}:e\in E(G) and demands d(f):fE(H)d(f):f\in E(H). We call E(H)E(H) the requests and a subset RR of requests is routable if there is a (fractional) multiflow which routes the requests in RR using GG’s capacity. The problem is “all-or-nothing” in the sense that if fRf\in R, then we must route the whole d(f)d(f) units of demand. An instance is said to satisfy the no-bottleneck-assumption (NBA) if d(f)ued(f)\leq u_{e} for every request ff and supply edge ee. ANF-Tree is the special case of all-or-nothing flow where the supply graph GG is a tree.

When the NBA holds, there is a polylog approximation in general graphs [9] and a 4848-approximation in trees [10]. Without the NBA, however, the natural LP has a super-constant integrality gap. The first theoretical progress for the non-NBA setting was a quasi-PTAS when the supply graph is a path [2]. A sequence of papers has ultimately yielded a constant-factor approximation (and integrality gap) for paths, the best of which is an O(1+11+e+ϵ)O(1+\frac{1}{1+e}+\epsilon)-approximation [15], and an LP with integrality gap 7+ϵ7+\epsilon [3]. For trees, however, the strongest result is an O(log2n)O(\log^{2}n)-approximation [5, 14, 1]. It remains an open question whether ANF-Tree has an O(1)O(1)-approximation (or even an O(logn)O(\log n)-approximation), and whether ANF-Path has a PTAS.

For trees we use the following notation. An instance =(T,R){\mathcal{I}}=(T,R) of ANF-Tree consists of an undirected capacitated tree T=(V,E,u)T=(V,E,u) and a set of requests RR, defined as follows. VV is the set of vertices and each edge eEe\in E has some positive capacity ueu_{e}. Each request rRr\in R imposes some non-negative demand drd_{r} on all edges along the unique simple path PrP_{r} between srVs_{r}\in V and trVt_{r}\in V. A request may also have a profit wrw_{r}. We assume that srtrs_{r}\neq t_{r} for all rRr\in R. For each edge ee, let Re={rR:ePr}R_{e}=\{r\in R:e\in P_{r}\}. We denote k=|R|k=|R| and m=|E|m=|E|. A subset SRS\subseteq R of requests is feasible or routable if, for each edge eEe\in E, the total demand of all requests rSRer\in S\cap R_{e} is at most the capacity ueu_{e}. The goal is to select a feasible subset SRS\subseteq R which maximizes the profit rSwr\sum_{r\in S}w_{r}. We formalize this with the following IP.

maxwTxsuch thatrRedrxrueeExr{0,1}krR\displaystyle\begin{array}[]{r@{\hspace{10pt}}l@{\hspace{20pt}}l}\max\hskip 10.&\lx@intercol w^{T}x\hfil\lx@intercol\vspace{10pt}\\ \text{such that}\hskip 10.&\sum_{r\in R_{e}}d_{r}x_{r}\leq u_{e}\hfil\hskip 20.&\forall\,e\in E\vspace{3pt}\\ \hskip 10.&x_{r}\in\{0,1\}^{k}\hfil\hskip 20.&\forall\,r\in R\vspace{3pt}\\ \end{array}

The natural LP relaxation ANF-LP is defined by replacing x{0,1}kx\in\{0,1\}^{k} with x[0,1]kx\in[0,1]^{k}; ANF-Path is defined similarly.

One approach for strengthening ANF-LP is to add rank constraints [5, 14]. For SRS\subseteq R its rank is defined as rank(S):=max{|T|:TS and T is feasible}\operatorname{rank}(S):=\max\{|T|:T\subseteq S\text{ and }T\text{ is feasible}\}, and the rank constraint is then iSxirank(S)\sum_{i\in S}x_{i}\leq\operatorname{rank}(S). Adding all such inequalities to ANF-LP defines the Rank-LP. We denote by PrankP_{\operatorname{rank}} the polytope obtained from adding all rank constraints to an ANF-Tree relaxation PP. Rank-LP is NP-Hard to separate, but it can be O(1)O(1)-approximated [5, 14].

We summarize the known results for these general ANF-Tree formulations.

Theorem 1.2
  1. 1.

    The integrality gap of ANF-LP is Ω(k)\Omega(k) [4].

  2. 2.

    For ANF-Path, the integrality gap of Rank-LP is O(logk)O(\log k) and the best known lower bound is Ω(1)\Omega(1) [5].

  3. 3.

    For ANF-Tree, the integrality gap of Rank-LP is O(log2k)O(\log^{2}k) and the best known lower bound is Ω(logk)\Omega(\sqrt{\log k}) [14].

1.2 Knapsack Hierarchy and Strengthening ANF-Tree Relaxations

In the rest of the paper, PP refers to the feasible region of ANF-LP and hence PrankP_{\operatorname{rank}} refers to same for Rank-LP. The first result shows the general dependence of the integrality gap for PtP^{t} on kk and tt; this is similar to the Sherali-Adams hierarchy [5] (although the proofs are not similar). The upper bound part is proved in Lemma 1, and the lower bound is proved in Lemma 5 - see Section 3

Theorem 1.3

For ANF-Tree, the integrality gap of PtP^{t} is O(k/t)O(k/t) and there are instances where it is Ω(k/t)\Omega(k/t).

We now focus on the Friggstad-Gao instances (definition in Section 3). These instances established the Ω(logk)\Omega(\sqrt{\log k}) ANF-Tree lower bound in Theorem 1.2; this is significant since it established a super-constant lower bound even when all rank constraints are added. Furthermore, these are single-sink instances, i.e., all requests share one common endpoint. We establish the following lower bounds for the knapsack hierarchy on the Friggstad-Gao instances.

Theorem 1.4

For constant tt, the integrality gap of PranktP^{t}_{\operatorname{rank}} is Ω(logk)\Omega(\sqrt{\log k}). For any c>0c>0, the integrality gap of both PkcP^{k^{c}} and PrankkcP^{k^{c}}_{\operatorname{rank}} is Ω(1/c)\Omega(1/c).

Interestingly, the proof of this lower bound depends on an upper bound proof. Namely, we define a colouring problem for which we upper bound the chromatic number (see Section 4.2). We can also show that our analysis of PranktP^{t}_{\operatorname{rank}} on the Friggstad-Gao instances is tight in the following sense.

Theorem 1.5

On the class of Friggstad-Gao instances, for any c>0c>0, the integrality gap of both PkcP^{k^{c}} and PrankkcP^{k^{c}}_{\operatorname{rank}} is O(1/c)O(1/c).

It remains an intriguing question whether this constant integrality gap of O(1/c)O(1/c) holds for general tree instances, even in the single-sink scenario.

1.3 Related Work

The use of hierarchies for integer programs dates back to the notion of Chvátal rank [6]. The Chvátal closure of a polyhedron PP is the polyhedron PPP^{\prime}\subseteq P which is defined by the system of Chvátal-Gomory cutting planes obtainable from PP. If we denote PC1=PP_{C}^{1}=P^{\prime} then the hierarchy is generated by PCt+1=(PCt)P_{C}^{t+1}=(P_{C}^{t})^{\prime}. Chvátal proved that PPC1PCn1PCn=PI.P\supseteq P_{C}^{1}\supseteq\ldots\supseteq P_{C}^{n-1}\supseteq P_{C}^{n}=P_{I}. As discussed, it is NP-hard to separate over P1P^{1} both in the Chvátal hierachy and the knapsack hierarchy considered in this paper. Other hierarchies have since been introduced and widely studied, such as the hierarchy defined by the split closure [8] and hierarchies introduced by Lovász-Schrijver [20], Sherali-Adams [24], Parillo [22], and Lasserre [19]. These other hierachies also have that the integer hull is obtained after nn rounds of the hierarchy, where nn is the number of variables. In that sense, the knapsack hierarchy is different since Pm=PIP^{m}=P_{I} where mm is the number of constraints. For ANF-tree formulations, however the number of variables equals kk, the number of requests. Moreover, for ANF-Tree instances one may show that m4km\leq 4k (see Appendix A.3 in [14]). Hence the knapsack hierarchy is equal to the integer hull at level O(k)O(k) for ANF-Tree.

We summarize the existing work on the effectiveness of classical hierarchies on ANF-Tree. Friggstad and Gao showed that the Lovász-Schrijver hierarchy is ineffective at reducing the integrality gap of ANF-Tree after 2 rounds and amounts to adding the rank one constraints [14]. Additionally, Chekuri, Ene, and Korula prove that after applying tt rounds of the Sherali-Adams hierarchy to ANF-LP, the integrality gap is Ω(k/t)\Omega(k/t) [5], matching the result for our hierarchy. For the case of 0-1 knapsack, Karlin, Mathieu, and Nguyen show that t2t^{2} rounds of Lasserre reduce the integrality gap to t/(t1)t/(t-1) [17]. We are not aware of any work done on whether this would generalize to ANF-Tree.

In the remainder of the paper we introduce the well-known “bad gap instances” for ANF: in particular, the so-called staircase and Friggstad-Gao instances (in Section 3). We then prove our results (in Sections 2, 4 and 5), and discuss future work (in Section 6).

2 Preliminary Proofs

We begin by showing Theorem 1.1, establishing tractability of our hierarchy for constant tt.

Proof (Theorem 1.1)

We use a result by Pritchard which gives a (1ϵ)(1-\epsilon)-approximate extended formulation for KI(S)K_{I}(S) with size O(n1+t3ϵ1)O(n^{1+t^{3}\epsilon^{-1}}) [23]. For 0<ϵ10<\epsilon\leq 1, denote the projection of this extended formulation onto n\mathbb{R}^{n} by Kϵ(S)K_{\epsilon}(S). Furthermore, denote by PϵtP^{t}_{\epsilon} the polytope |S|=tKϵ(S)\bigcap_{|S|=t}K_{\epsilon}(S). Since Kϵ(S)K_{\epsilon}(S) is a polyhedral approximation, we have (1ϵ)Kϵ(S)KI(S)Kϵ(S)(1-\epsilon)K_{\epsilon}(S)\subseteq K_{I}(S)\subseteq K_{\epsilon}(S) [23]. It follows that

(1ϵ)Pϵt=(1ϵ)|S|=tKϵ(S)\displaystyle(1-\epsilon)P^{t}_{\epsilon}=(1-\epsilon)\bigcap_{|S|=t}K_{\epsilon}(S) =|S|=t(1ϵ)Kϵ(S)|S|=tKI(S)=Pt\displaystyle=\bigcap_{|S|=t}(1-\epsilon)K_{\epsilon}(S)\subseteq\bigcap_{|S|=t}K_{I}(S)=P^{t}
and
Pt=|S|=tKI(S)\displaystyle P^{t}=\bigcap_{|S|=t}K_{I}(S) |S|=tKϵ(S)=Pϵt.\displaystyle\subseteq\bigcap_{|S|=t}K_{\epsilon}(S)=P^{t}_{\epsilon}.

Therefore, PϵtP^{t}_{\epsilon} is a polyhedral (1ϵ)(1-\epsilon)-approximate extended formulation for PtP^{t}. There are (nt)=O(nt)\binom{n}{t}=O(n^{t}) sets SS with |S|=t|S|=t, so since each Kϵ(S)K_{\epsilon}(S) has size O(n1+t3ϵ1)O(n^{1+t^{3}\epsilon^{-1}}), PϵtP^{t}_{\epsilon} has size O(n1+t3ϵ1)O(nt)=O(nt3ϵ1+t+1)O(n^{1+t^{3}\epsilon^{-1}})\cdot O(n^{t})=O(n^{t^{3}\epsilon^{-1}+t+1}) as desired.∎

The proof of the upper bound in Theorem 1.3 uses a strategy which appears again in the proof of Theorem 1.5: pick some xPtx\in P^{t} and partition the requests into sets S1,,SqS_{1},\dots,S_{q} such that the profit of each xSix_{S_{i}} (i.e., the vector xx but with elements not in SiS_{i} set to zero) can easily be bounded, thus establishing a bound on the profit of xS1++xSq=xx_{S_{1}}+\dots+x_{S_{q}}=x.

Lemma 1

For ANF-Tree, the integrality gap of PtP^{t} is O(k/t)O(k/t).

Proof

Let OPT be the optimal value of max{wTx:xPI}\max\{w^{T}x:x\in P_{I}\}. Consider some set SRS\subseteq R with |S|t/4|S|\leq t/4. It can be shown that for any ANF-Tree instance there exists an equivalent instance (in the sense of having the same integer hull) with m4km\leq 4k (see Appendix A.3 in [14]), so we assume w.l.o.g. that m4km\leq 4k. So, if the problem is reduced to contain only the requests in SS, then at most tt edges are needed to define the integer hull. Let TT be this set of at most tt edges. Then, we must have max{wTx:xKI(T),xRS=0}OPT\max\{w^{T}x:x\in K_{I}(T),\,x_{R\setminus S}=0\}\leq\text{OPT} because any such xx is in PIP_{I}.

We can arbitrarily partition the requests into q:=O(k4t)q:=O(\frac{k}{4t}) such sets S1,,SqS_{1},\dots,S_{q} (i.e., with SiRS_{i}\subseteq R and |Si|t/4|S_{i}|\leq t/4) with corresponding edge sets T1,,TqT_{1},\dots,T_{q} (i.e., where |Ti|t|T_{i}|\leq t and TiT_{i} defines the integer hull for requests SiS_{i}). Then max{wTx:xPt}i=1qmax{wTx:xKI(Ti),xRSi=0}O(k4tOPT)\max\{w^{T}x:x\in P^{t}\}\leq\sum_{i=1}^{q}\max\{w^{T}x:x\in K_{I}(T_{i}),\,x_{R\setminus{S_{i}}}=0\}\leq O(\frac{k}{4t}\text{OPT}), so the integrality gap is O(k/t)O(k/t) as desired.∎

3 ANF-Tree Preliminaries

3.1 Staircase Instances

rr6464323216168844221111224488161632326464
Figure 1: S7S^{7} is an ANF-Path instance with 88 vertices and 77 requests. Each vertex marked with a bullet (\bullet) is associated with a request (dashed line) which routes between that vertex and rr. The value under each edge denotes the capacity of that edge, and the value above each vertex denotes the demand of the request associated with that vertex. All requests have profit 11.

For k1k\geq 1, we define the staircase222In the literature, this instance is referred to as a staircase because of a common way of visualizing ANF-Path instances where the capacity is plotted above the vertices on the Y axis. ANF-Path instance Sk=(T,R)S^{k}=(T,R) as follows. Let TT be a path graph on k+1k+1 vertices, that is, V={1,,k+1}V=\{1,\dots,k+1\} and E={(1,2),(2,3),,(k,k+1)}E=\{(1,2),(2,3),\dots,(k,k+1)\}. We refer to vertex 11 as the root or rr. For each i=1,,ki=1,\dots,k, define u(i,i+1)=2i1u_{(i,i+1)}=2^{i-1} and create a request ii with si=is_{i}=i, ti=rt_{i}=r, di=2i1d_{i}=2^{i-1}, and wi=1w_{i}=1. See Fig. 1 for an illustration. These instances were first described by Chakrabarti, Chekuri, Gupta, and Kumar [4].

3.2 Friggstad-Gao Instances

In this section, we describe the family of Friggstad-Gao ANF-Tree instances, which were introduced in [14].

rr23202^{3}-2^{0}26232^{6}-2^{3}29262^{9}-2^{6}dvd_{v}242^{-4}222^{-2}202^{0}wvw_{v}232^{3}262^{6}292^{9}ueu_{e}
Figure 2: ANF-Tree Instance TFG3T_{FG}^{3}. Each vertex marked with a bullet (\bullet) is associated with a request which terminates at rr. The values on the left indicate the profits/demands/capacities associated with each level.

We define the tree TFGhT_{FG}^{h} with height h2h\geq 2 as follows. There is a root vertex rr which has a single child v1v_{1}. Apart from rr and the leaves (which are in level hh), all vertices have 2h12^{h-1} children. We denote the set of vertices with distance \ell from rr by levellevel_{\ell}, that is, level0={r}level_{0}=\{r\}, level1={v1}level_{1}=\{v_{1}\}, and for [h]\ell\in[h], |level|=2(h1)(1)|level_{\ell}|=2^{(h-1)(\ell-1)}. For each edge e=uve=uv with ulevel1u\in level_{\ell-1} and vlevelv\in level_{\ell}, define ue=2h(h+1)u_{e}=2^{h(h-\ell+1)}. For all 1\ell\geq 1 and each vertex vlevelv\in level_{\ell}, create a request associated with vv with sv=vs_{v}=v, tv=rt_{v}=r, demand dv=2h(h+1)2h(h)d_{v}=2^{h(h-\ell+1)}-2^{h(h-\ell)}, and profit wv=2(h1)(1)w_{v}=2^{-(h-1)(\ell-1)}. See Fig. 2 for an example. This defines a single-sink instance since every request terminates at rr. Moreover, since the profit of each request in any level is the inverse of the number of requests in that level, the total profit of requests in any level is exactly 11. A simple calculation shows that the number of requests (and equivalently the number of edges) in levels 0 through \ell is

n()=i=01(2h1)i=2(h1)12h11=Θ(2(h1)(1)).n(\ell)=\sum_{i=0}^{\ell-1}(2^{h-1})^{i}=\frac{2^{(h-1)\ell}-1}{2^{h-1}-1}=\Theta\left(2^{(h-1)(\ell-1)}\right).

Thus, h=Θ(logk)h=\Theta(\sqrt{\log k}) where k=n(h)k=n(h) is the total number of requests/edges, and for any \ell we have =Θ(logn()h)\ell=\Theta\left(\frac{\log n(\ell)}{h}\right).

The following lemmas establish some fundamental properties of these instances. We use T<vT^{<v} to denote the requests in the subtree of TT rooted at vv with vv itself removed.

Lemma 2

For any edge e=uve=uv where ulevel1u\in level_{\ell-1} and vlevelv\in level_{\ell} for some \ell, the set of requests in T<vT^{<v} is routable on ee. That is, 1T<vKI(e)1_{T^{<v}}\in K_{I}(e).

Proof

In any level >\ell^{\prime}>\ell, 2h(h+1)2^{h(h-\ell^{\prime}+1)} is an upper bound for the demand 2h(h+1)2h(h)2^{h(h-\ell^{\prime}+1)}-2^{h(h-\ell^{\prime})} of the requests. The number of vertices in levelklevel_{k} that are also in the subtree below ee is 2(h1)()2^{(h-1)(\ell^{\prime}-\ell)}. Thus, the demand on ee from routing all requests in levellevel_{\ell^{\prime}} is at most 2(h1)()2h(h+1)=2h2h++h2^{(h-1)(\ell^{\prime}-\ell)}2^{h(h-\ell^{\prime}+1)}=2^{h^{2}-h\ell-\ell^{\prime}+\ell+h}. Therefore, summing over all >\ell^{\prime}>\ell, we have

=+1h2h2h++h\displaystyle\textstyle\sum_{\ell^{\prime}=\ell+1}^{h}2^{h^{2}-h\ell-\ell^{\prime}+\ell+h} =2h2h++h=+1h2\displaystyle=2^{h^{2}-h\ell+\ell+h}\textstyle\sum_{\ell^{\prime}=\ell+1}^{h}2^{-\ell^{\prime}}
=2h2h++h(22h)\displaystyle=2^{h^{2}-h\ell+\ell+h}(2^{-\ell}-2^{-h})
2h(h+1)=ue.\displaystyle\leq 2^{h(h-\ell+1)}=u_{e}.
Lemma 3

Let rr be the root of the tree TFGhT_{FG}^{h} and PP be any path from rr to a leaf. Then the demands for the requests of PP form a routable set.

Proof

The requests associated with level \ell have demand 2h(h+1)2h(h)2^{h(h-\ell+1)}-2^{h(h-\ell)}, so the total demand of such a path is

=1h2h(h+1)2h(h)\displaystyle\sum_{\ell=1}^{h}2^{h(h-\ell+1)}-2^{h(h-\ell)} =2h22h(h1)+2h(h1)2h(h2)++22h2h+2h20\displaystyle=2^{h^{2}}-2^{h(h-1)}+2^{h(h-1)}-2^{h(h-2)}+\dots+2^{2h}-2^{h}+2^{h}-2^{0}
=2h21.\displaystyle=2^{h^{2}}-1.

This is less than 2h22^{h^{2}}, the capacity of the topmost edge. A similar argument shows that no other edges are violated by leveraging the self-similar structure of the tree.∎

Lemma 4

The vector 12\frac{1}{2} is in KI(e)K_{I}(e) for every edge ee.

Proof

Consider any edge e=uve=uv where ulevel1u\in level_{\ell-1} and vlevelv\in level_{\ell}. The only requests which route on ee are those in the subtree rooted at vv. Therefore it is sufficient to show that b:=12(1{v}+1T<v)KI(v)b:=\frac{1}{2}(1_{\{v\}}+1_{T^{<v}})\in K_{I}(v). Note that 1{v}1_{\{v\}} is in KI(e)K_{I}(e) since

dv=2h(h+1)2h(hl)<2h(h+1)=ue,\displaystyle d_{v}=2^{h(h-\ell+1)}-2^{h(h-l)}<2^{h(h-\ell+1)}=u_{e},

and by 2, we have that 1T<vKI(e)1_{T^{<v}}\in K_{I}(e). It follows that any convex combination of these vectors, and hence bb, lies in KI(e)K_{I}(e).∎

4 Integrality Gap Lower Bound

In Section 4.1, we prove a lower bound of Ω(k/t)\Omega(k/t) on the integrality gap of PtP^{t}, matching the upper bound shown in Lemma 1 and thus proving Theorem 1.3. However, this lower bound does not hold for PranktP^{t}_{\operatorname{rank}}. To resolve this case, we show in Section 4.2 that on the Friggstad-Gao tree instances, for any c>0c>0 the integrality gap is reduced to Ω(1/c)\Omega(1/c) for both PkcP^{k^{c}} and PrankkcP^{k^{c}}_{\operatorname{rank}}, despite that PrankP_{\operatorname{rank}} has integrality gap Ω(logk)\Omega(\sqrt{\log k}) for these instances.

In the following we assume that all requests are routable on their own, i.e., for each rRr\in R and ePre\in P_{r}, drued_{r}\leq u_{e}. We also assume that it is impossible to route all requests together, as the optimal solution would then be trivial.

4.1 Path Instances

For path instances, it is known that the integrality gap of PrankP_{\operatorname{rank}} is O(logk)O(\log k) and it is conjectured to be O(1)O(1) [5]. However, the ANF-LP has an integrality gap of Ω(k)\Omega(k), which is evidenced by the staircase instances SkS^{k} [4]. We now prove the upper bound from Theorem 1.3 by showing that the integrality gap of PtP^{t} is Ω(k/t)\Omega(k/t).

Lemma 5

The integrality gap of PtP^{t} is Ω(k/t)\Omega(k/t).

Proof

Let t>1t>1. We show that 1t+1Pt\frac{1}{t+1}\in P^{t} for instances SkS^{k}, as defined in Section 3.1. Let SE(Sk)S\subseteq E(S^{k}) with |S|=t|S|=t. For each edge (i,i+1)S(i,i+1)\in S, request ii is feasible alone. All other requests are feasible together without violating this edge’s capacity, because any other request jj which routes on (i,i+1)(i,i+1) has demand 2j2^{j}, edge (i,i+1)(i,i+1) has capacity 2i2^{i}, and j=0i12j<2i\sum_{j=0}^{i-1}2^{j}<2^{i}. These feasible sets define a partition of R(Sk)R(S^{k}) into t+1t+1 sets: a set for each of the requests with the same indices as the tt edges of SS and a set of all other requests. Since all of these sets are feasible, the indicator vector for each of these sets lies in KI(S)K_{I}(S). Since these sets partition R(SkR(S^{k}), the vector 1t+1\frac{1}{t+1} is a convex combination of these sets, and hence 1t+1KI(S)\frac{1}{t+1}\in K_{I}(S). Since this holds for every such SS, we have 1t+1Pt\frac{1}{t+1}\in P^{t} and its total profit is Ω(k/t)\Omega(k/t), thus establishing the integrality gap.∎

4.2 Tree Instances

In this section, we prove Theorem 1.4, which gives a lower bound on the integrality gap of PtP^{t} on instances T:=TFGhT:=T_{FG}^{h}. Recall that Lemma 4 establishes 1/2P11/2\in P^{1} by proving that for each edge ee, the 1/21/2 vector can be written as a convex combination of (incidence vectors of) two sets, each of which is routable on ee. We generalize this to any value of tt by showing that for 1/cPt1/c\in P^{t} for sufficiently small cc, and thus the integrality gap is Ω(logk/c)\Omega(\sqrt{\log k}/c).

Let SE(T)S\subseteq E(T). We call a set XR(T)X\subseteq R(T) SS-routable if eS\forall e\in S, iXR(e)diue\sum_{i\in X\cap R(e)}d_{i}\leq u_{e}. Our key structural result gives a condition when we can express a vector 1/c1/c as a convex combination of SS-routable sets.

We cast this convex combination question as a question of colouring the set of all requests. For SE(T)S\subseteq E(T), we define the SS-chromatic number, denoted by χ(S)\chi(S), to be the minimum value cc such that R(T)R(T) can be partitioned into cc sets, each of which is SS-routable. Given such a partition, the vector 1/c1/c is trivially a convex combination of the indicator vectors of the SS-routable sets in the partition. Thus, if we can show that χ(S)c\chi(S)\leq c for every |S|=t|S|=t, we have guaranteed that 1/cPt1/c\in P^{t}. Hence, the integrality gap established by Friggstad and Gao decreases by at most a factor of c/2c/2 for PtP^{t}, since the result of Friggstad and Gao is associated with the feasible vector 1/2P01/2\in P^{0}. In fact, the following holds even if we start with the stronger formulation PrankP_{\operatorname{rank}}; we explain why at the end of this section.

Observation 1

The integrality gap of PtP^{t} is Ω(h/c)\Omega(h/c), where c(t):=max{χ(S):SR,|S|=t}c(t):=\max\{\chi(S):S\subseteq R,|S|=t\}.

Theorem 1.4 follows from the following proposition which the rest of this section is dedicated to proving.

Proposition 1

If |S|2h(c1)|S|\leq 2^{h(c-1)}, then χ(S)c+1\chi(S)\leq c+1.

Proof (Theorem 1.4)

For constant tt and SRS\subseteq R with |S|=t|S|=t, χ(S)2\chi(S)\leq 2 for sufficiently large hh. Thus, the integrality gap of PtP^{t} is Ω(h)=Ω(logk)\Omega(h)=\Omega(\sqrt{\log k}).

Now consider some d>0d>0 and let t=kdt=k^{d}. Let SRS\subseteq R with |S|=t|S|=t. Then, if |S|2h(c1)|S|\leq 2^{h(c-1)}, we have c=Ω(log(kd)/h)c=\Omega(\log(k^{d})/h). Hence, χ(S)=Ω(log(kd)/h))\chi(S)=\Omega(\log(k^{d})/h)), so by Observation 1, the integrality gap is Ω(h2/log(kd))=Ω(1/d)\Omega(h^{2}/\log(k^{d}))=\Omega(1/d).

To establish that this lower bound holds even when all rank inequalities are added, we use Theorem 5 from [14] which proves that x/9x/9 satisfies all rank constraints if xx satisfies all valid constraints of the form xi+xj1x_{i}+x_{j}\leq 1; these are trivially satisfied by the vector 1/c1/c for c2c\geq 2.∎

Our proof of Proposition 1 is based on the following colouring result. The tree TT^{\prime} plays the role of a subtree essentially induced by the edges from some set SS with |S|=t|S|=t.

Lemma 6

Let TT^{\prime} be a subtree of TT rooted at some vertex vv. If each level of TT^{\prime} has at most 2h(c1)2^{h(c-1)} vertices, then V(T)V(T^{\prime}) can be partitioned into at most cc sets which are E(T)E(T^{\prime})-routable.

vvv1v_{1}\dots\dots\dots\dots\dots\dots\dots\dots\dots\dots\dotsvpv_{p}\dots\dots\dots\dots\dotsL1L_{1}L2L_{2}L3L_{3}\dotsLc+1L_{c+1}Lc+2L_{c+2}\dots
Figure 3: A diagram to aid with understanding the proof of Lemma 6. The key observation is illustrated by the arrows on the left: the total demand of every request in the box at the tail of an arrow is at most the demand of a single request at the tip of that arrow.
Proof

We prove this by induction using a stronger induction hypothesis. Specifically, not only does the colouring exist but we may use the following special type of colouring. We define layers LkL_{k} of TT^{\prime} inductively where L1={v}L_{1}=\{v\}. For each k1k\geq 1, Lk+1L_{k+1} consists of the children of the requests in layer LkL_{k} which are contained in TT^{\prime}. Then for each i=1,2,,ci=1,2,\ldots,c we claim that Xi=LiLi+cLi+2cX_{i}=L_{i}\cup L_{i+c}\cup L_{i+2c}\cup\ldots is E(T)E(T^{\prime})-routable. Hence, X1,X2,,XcX_{1},X_{2},\ldots,X_{c} is a valid cc-colouring which we call layered. We claim that a layered colouring always exists for any such subtree TT^{\prime}. The base case is a single-vertex tree which is trivially true for any c1c\geq 1.

Now consider the children of vv in TT^{\prime}. Call these v1,v2,vpv_{1},v_{2},\ldots v_{p} and let TiT_{i} be the subtrees of TT^{\prime} associated with each viv_{i}. By induction, each TiT_{i} has a layered colouring which uses at most cc colours. Assume we have such a colouring and without loss of generality that each viv_{i} has colour class 22, the next layer below that has colour class 33, and so on up to colour class cc, after which the next layer has colour class 11. We show that vv can be added to colour class 11. Let XiX_{i} denote the union of the colour classes ii which occur for the TjT_{j}. Each layered colour class XiX_{i} is E(Ti)E(T_{i})-routable and thus is also E(T)E(T^{\prime})-routable. Hence, it only remains to show that X1{v}X_{1}\cup\{v\} is also E(T)E(T^{\prime})-routable. Note that X1{v}X_{1}\cup\{v\} consists of layers L1Lc+1L2c+1Lqc+1L_{1}\cup L_{c+1}\cup L_{2c+1}\cup\ldots\cup L_{qc+1} of TT^{\prime} for some choice of qq. Recall that Lemma 3 asserts that the requests along any path from vv to the leaves of TT is routable. We show that for all ii, the total demand of requests of Lic+1L_{ic+1} is at most the demand of a single request in L(i1)c+2L_{(i-1)c+2}, so the total demand from requests in X1X_{1} on any edge is at most the demand from routing a path from vv to a leaf, and thus is routable. See Fig. 3 for a visual depiction of this. Suppose this is not the case. By the self similarity of the tree, we can assume that the demand of a request in Lic+1L_{ic+1} is

2h(h(ic1)+1)2h(h(ic+1))=(2h1)2h(hic1)\displaystyle 2^{h(h-(ic-1)+1)}-2^{h(h-(ic+1))}=(2^{h}-1)2^{h(h-ic-1)}

and the demand of a request in L(i1)c+2L_{(i-1)c+2} is

2h(h((i1)c+2)+1)2h(h((i1)c+2))=(2h1)2h(h(i1)c2).\displaystyle 2^{h(h-((i-1)c+2)+1)}-2^{h(h-((i-1)c+2))}=(2^{h}-1)2^{h(h-(i-1)c-2)}.

Then, we have

|Lic+1|(2h1)2h(hic1)>\displaystyle|L_{ic+1}|\cdot(2^{h}-1)2^{h(h-ic-1)}> (2h1)2h(h(i1)c2)\displaystyle~{}(2^{h}-1)2^{h(h-(i-1)c-2)}
\displaystyle\Leftrightarrow
|Lic+1|>\displaystyle|L_{ic+1}|> 2h(h(i1)c2)2h(hic1)=2h(c1),\displaystyle~{}\frac{2^{h(h-(i-1)c-2)}}{2^{h(h-ic-1)}}=2^{h(c-1)},

which contradicts our hypothesis.∎

We now complete the proof of Proposition 1.

Proof

Let vv be the least common ancestor of the vertices which are incident to the edges in SS. We now create a subtree TT^{\prime} which is a sort of closure of SS. TT^{\prime} is obtained by adding edges to SS of any path between vv and some vertex incident to an edge eSe\in S. We also include the parent edge of vv. We claim that TT^{\prime} satisfies the hypothesis of Lemma 6. To see this, consider some level of TT^{\prime} consisting of vertices a1,,apa_{1},\ldots,a_{p}. Let EiE_{i} denote the set of edges which are either incident to vertex aia_{i} or lie in its subtree. Note that the EiE_{i} are disjoint. Since each aia_{i} is either incident to an edge of SS, or is the internal vertices of some path used to define the closure TT^{\prime}, it follows that EiSE_{i}\cap S\neq\emptyset for each ii, and hence pi=1p|EiS||S|2h(c1)p\leq\sum_{i=1}^{p}|E_{i}\cap S|\leq|S|\leq 2^{h(c-1)}.

We now colour all the requests of TT. We first invoke Lemma 6 to colour R(T)R(T^{\prime}) using cc colours. We can partition R(T)R(T)R(T)\setminus R(T^{\prime}) as ABA\cup B, where BB denotes the requests “below” TT^{\prime} (their paths to the root of TT intersect TT^{\prime}) and AA denotes the remaining “above” requests. The set BB is SS-routable by Lemma 2. Requests in the set AA do not even route on any edge of SS. Hence, ABA\cup B can be the (c+1)st(c+1)^{st} colour class.∎

5 Integrality Gap Upper Bound

In this section, we prove Theorem 1.5, namely that for instances TFGhT^{h}_{FG} and c>0c>0, the integrality gap of both PkcP^{k^{c}} and PrankkcP^{k^{c}}_{\operatorname{rank}} is O(1/c)O(1/c).

Theorem 5.1

Let \ell be the largest integer such that n()tn(\ell)\leq t (with n()n(\ell) as defined in Section 3.2). The integrality gap for optimizing over PtP^{t} (with profits defined in Section 3.2) for instances TFGhT_{FG}^{h} is O(h/)O(h/\ell).

We saw in Section 3.2 that =Θ(log(n())/h)\ell=\Theta\left({\log(n(\ell))}/h\right) and h=Θ(logk)h=\Theta\left(\sqrt{\log k}\right). For c>0c>0 and t=kct=k^{c}, the theorem statement chooses =Θ(log(kc)/h)\ell=\Theta\left({\log(k^{c})}/h\right), so the integrality gap is O(h/)=O(1/c)O(h/\ell)=O(1/c), proving Theorem 1.5.

We show a particular way to partition the requests of the tree into O(h/)O(h/\ell) sets, and then show that for each set the profit of any xPtx\in P^{t} which uses only the requests in that set is O(1)O(1). Since the integral optimum for instances TFGhT_{FG}^{h} is at most 22 [14], it follows that the integrality gap of PtP^{t} is O(h/)O(h/\ell) on these instances. The proof relies on the self similar structure of the Friggstad-Gao instances, namely that every vertex except for the leaves and the root has exactly 2h12^{h-1} children and capacities and demands scale down by 2h2^{h} for each step away from the root.

For vrv\neq r let TvT^{\ell}_{v} be the subtree consisting of the first \ell levels of the children of vertex vv along with the edge immediately above vv. The edge immediately above vv has its upper endpoint outside of the subtree. We denote the edges of the subtree, vertices of the subtree, and requests with an endpoint inside the subtree by E(Tv)E(T^{\ell}_{v}), V(Tv)V(T^{\ell}_{v}), and R(Tv)R(T^{\ell}_{v}), respectively. For Friggstad-Gao instances, |E(Tv)|=|V(Tv)|=|R(Tv)||E(T^{\ell}_{v})|=|V(T^{\ell}_{v})|=|R(T^{\ell}_{v})|; we denote this size simply by |Tv||T^{\ell}_{v}|. Notice that we have |Tv|n()|T_{v}^{\ell}|\leq n(\ell) by self similarity, and this holds with equality unless vv is less than \ell levels from the leaves. Since we assumed n()tn(\ell)\leq t, we have |Tv|t|T^{\ell}_{v}|\leq t. For vectors xkx\in\mathbb{R}^{k}, we denote by xTvx_{T^{\ell}_{v}} the restriction of xx to those requests with an endpoint in TvT^{\ell}_{v}.

We now define, for each 0i<h/0\leq i<\lceil h/\ell\rceil, a set of subtrees 𝒫i={Tv:vleveli+1}\mathcal{P}_{i}=\left\{T_{v}^{\ell}:v\in level_{i\ell+1}\right\}. Let x𝒫ix_{\mathcal{P}_{i}} denote the restriction of xx to those requests with an endpoint in some Tv𝒫iT^{\ell}_{v}\in\mathcal{P}_{i}. Observe that the union 𝒫=𝒫i\mathcal{P}=\bigcup\mathcal{P}_{i} of these subtrees is a partition of TFGh{r}T^{h}_{FG}\setminus\{r\} into edge and vertex disjoint subtrees. See Fig. 4 for a visual depiction of this. The following lemma bounds the profit obtainable using requests with an endpoint in some 𝒫i\mathcal{P}_{i}.

rr\dots\dots\dots\dots\dots\dots
Figure 4: The partition of TFGhT_{FG}^{h} used to upper bound the integrality gap of the knapsack intersection hierarchy. Each vertex marked by \bullet is associated with a subtree TvT_{v}^{\ell}, indicated here by a dashed triangle. Each triangle spans \ell layers of the tree, i.e., if a vertex marked by \bullet is in level kk, then the vertex marked by \circ immediately below it are in level k+1k+\ell-1. The set 𝒫i\mathcal{P}_{i} contains the ithi^{th} level of subtrees. For example, 𝒫0\mathcal{P}_{0} contains the single triangle under rr and 𝒫1\mathcal{P}_{1} contains all the triangles immediately below that.
Lemma 7

For any feasible vector xPtx\in P^{t} we have w𝒫iTx𝒫i2w^{T}_{\mathcal{P}_{i}}x_{\mathcal{P}_{i}}\leq 2 for all 0i<h/0\leq i<\lceil h/\ell\rceil.

Proof

Let Tv𝒫iT_{v}^{\ell}\in\mathcal{P}_{i}. First we show that every feasible subset of R(Tv)R(T_{v}^{\ell}) has profit at most 2(h1)i+12^{-(h-1)i\ell+1}. This follows by the self similarity of the instance; scaling all demands and capacities in TvT_{v}^{\ell} by 2hi2^{hi\ell} and all profits by 2(h1)i2^{(h-1)i\ell} produces a tree identical to Tv1T_{v_{1}}^{\ell} (recall v1v_{1} is the single child vertex of the root rr). For instances TFGhT_{FG}^{h}, every routable set has profit at most 22 [14], so if we only use requests in Tv1T_{v_{1}}^{\ell} the profit certainly must be less than 22. By scaling as necessary, it then follows that any feasible subset of R(Tv)R(T_{v}^{\ell}) has profit at most 2(h1)i+12^{-(h-1)i\ell+1}, as desired.

Now, we show that to determine feasibility of a subset of R(Tv)R(T_{v}^{\ell}) it is sufficient to check only the capacity constraints of the edges E(Tv)E(T_{v}^{\ell}). If SS is routable, then clearly no capacity constraints are violated, so assume conversely that SS is not routable. By Lemma 2, no edge which is outside of E(Tv)E(T_{v}^{\ell}) and is an ancestor (towards the root) of any edge in SS has its capacity violated by routing all requests in TT. Furthermore, any other edge which is outside of E(Tv)E(T_{v}^{\ell}) is not routed on by the requests in SS and thus cannot be violated. Thus, in order for SS to not be routable, the capacity of one of the edges in E(Tv)E(T_{v}^{\ell}) must be violated.

Since KI(E(Tv))K_{I}(E(T_{v}^{\ell})) is an integer hull, any xKI(E(Tv))x\in K_{I}(E(T_{v}^{\ell})) can be written as a convex combination of integral vectors in KI(E(Tv))K_{I}(E(T_{v}^{\ell})). We saw that to determine feasibility of a subset of R(Tv)R(T_{v}^{\ell}) it is sufficient to check the capacity constraints of edges in E(Tv)E(T_{v}^{\ell}). Thus, for xKI(E(Tv))x\in K_{I}(E(T_{v}^{\ell})) such that x1R(Tv)x\leq 1_{R(T_{v}^{\ell})}, we can write xx as a convex combination of integral vectors 1S1_{S} for routable sets SR(Tv)S\subseteq R(T_{v}^{\ell}), which we know all have profit at most 2(h1)i+12^{-(h-1)i\ell+1}. Given |Tv|t|T_{v}^{\ell}|\leq t, any xPtx\in P^{t} has xKI(E(Tv))x\in K_{I}(E(T_{v}^{\ell})), so wTvTxTv2(h1)i+1w^{T}_{T_{v}^{\ell}}x_{T_{v}^{\ell}}\leq 2^{-(h-1)i\ell+1}. Finally, |𝒫i|=|leveli+1|=2(h1)i|\mathcal{P}_{i}|=|level_{i\ell+1}|=2^{(h-1)i\ell}, so we can conclude that w𝒫iTx𝒫i2(h1)i+12(h1)i=2w^{T}_{\mathcal{P}_{i}}x_{\mathcal{P}_{i}}\leq 2^{-(h-1)i\ell+1}\cdot 2^{(h-1)i\ell}=2.∎

Proof (Theorem 5.1)

Let xPtx\in P^{t}. From Lemma 7, we know that for each ih/\leq i\leq\lfloor h/\ell\rfloor we have w𝒫iTx𝒫i2w^{T}_{\mathcal{P}_{i}}x_{\mathcal{P}_{i}}\leq 2. Summing over all ii, we find that wTx2h/2h/w^{T}x\leq 2\lfloor h/\ell\rfloor\leq 2h/\ell. We know that the integral optimum is Ω(1)\Omega(1), so the integrality gap of PtP^{t} is O(h/)O(h/\ell). Since the rank formulation is stronger than the natural LP formulation, the integrality gap of PranktP^{t}_{\operatorname{rank}} is O(h/)O(h/\ell) as well.∎

6 Conclusion

It would be interesting to establish stronger links to existing hierarchies such as those given by Lasserre, Parillo, Lovász-Schrijver, Sherali-Adams, or Chvátal, or that induced by the split closure. In terms of achieving stronger approximations for ANF-Tree, we see two interesting directions. One is to consider a rank tt approximation PtP^{\prime t} based on intersecting a structured set of tt-row cuts (as opposed to all possible tt-row cuts, as we have done here). This may allow tractable formulations with larger values of tt. A related idea is to consider the intersection of the integer hulls of sub-instances induced by keeping a subset of the requests (instead of keeping a subset of the edges). For example, to restrict to the set of requests which pass through at least one of some set of tt edges, as such instances are known to be easier to approximate [16]. Lastly, the question of whether PrankkcP_{\operatorname{rank}}^{k^{c}} has constant integrality gap for general ANF-Tree instances has so far eluded us; it remains a very interesting question.

Acknowledgements: The authors are grateful to NSERC for supporting this research. We would also like to thank Joe Paat for his careful reading and suggestions which improved the presentation.

References

  • ACEW [16] A. Adamaszek, P. Chalermsook, A. Ene and A. Wiese, Submodular Unsplittable Flow on Trees, Mathematical Programming 172 (2016).
  • BCES [06] N. Bansal, A. Chakrabarti, A. Epstein and B. Schieber, A quasi-PTAS for unsplittable flow on line graphs, in Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing, STOC ’06, page 721–729, New York, NY, USA, 2006, Association for Computing Machinery.
  • BSW [14] P. Bonsma, J. Schulz and A. Wiese, A constant-factor approximation algorithm for unsplittable flow on paths, SIAM journal on computing 43(2), 767–799 (2014), arXiv:1102.3643.
  • CCGK [02] A. Chakrabarti, C. Chekuri, A. Gupta and A. Kumar, Approximation Algorithms for the Unsplittable Flow Problem, Lecture Notes in Computer Science 47 (2002).
  • CEK [09] C. Chekuri, A. Ene and N. Korula, Unsplittable Flow in Paths and Trees and Column-Restricted Packing Integer Programs, in Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 42–55, Springer, 2009.
  • Chv [73] V. Chvátal, Edmonds polytopes and a hierarchy of combinatorial problems, Discrete mathematics 4(4), 305–337 (1973).
  • CJP [83] H. Crowder, E. L. Johnson and M. Padberg, Solving large-scale zero-one linear programming problems, Operations Research 31(5), 803–834 (1983).
  • CKS [90] W. Cook, R. Kannan and A. Schrijver, Chvátal closures for mixed integer programming problems, Mathematical Programming 47(1), 155–174 (1990).
  • CKS [13] C. Chekuri, S. Khanna and F. B. Shepherd, The all-or-nothing multicommodity flow problem, SIAM Journal on Computing 42(4), 1467–1493 (2013).
  • CMS [07] C. Chekuri, M. Mydlarz and F. B. Shepherd, Multicommodity demand flow in a tree and packing integer programs, ACM Transactions on Algorithms 3 (2007).
  • DLTW [14] S. S. Dey, A. Lodi, A. Tramontani and L. A. Wolsey, On the practical strength of two-row tableau cuts, INFORMS Journal on Computing 26(2), 222–237 (2014).
  • DM [18] S. S. Dey and M. Molinaro, Theoretical challenges towards cutting-plane selection, Mathematical Programming 170(1), 237–266 (2018), arXiv:1805.02782.
  • Eis [99] F. Eisenbrand, Note on the membership problem for the elementary closure of a polyhedron, Combinatorica 19(2), 297–300 (1999).
  • FG [15] Z. Friggstad and Z. Gao, On Linear Programming Relaxations for Unsplittable Flow in Trees, in Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2015), edited by N. Garg, K. Jansen, A. Rao and J. D. P. Rolim, volume 40 of Leibniz International Proceedings in Informatics (LIPIcs), pages 265–283, Dagstuhl, Germany, 2015, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.
  • GMW [20] F. Grandoni, T. Mömke and A. Wiese, Unsplittable flow on a path: The game!, (2020).
  • GMWZ [17] F. Grandoni, T. Mömke, A. Wiese and H. Zhou, To augment or not to augment: solving unsplittable flow on a path by creating slack, in Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 2411–2422, SIAM, 2017.
  • KMN [10] A. R. Karlin, C. Mathieu and C. T. Nguyen, Integrality Gaps of Linear and Semi-definite Programming Relaxations for Knapsack, (2010), arXiv:1007.1283.
  • KPP [04] H. Kellerer, U. Pferschy and D. Pisinger, Multidimensional knapsack problems, in Knapsack problems, pages 235–283, Springer, 2004.
  • Las [01] J. B. Lasserre, An explicit exact SDP relaxation for nonlinear 0-1 programs, in International Conference on Integer Programming and Combinatorial Optimization, pages 293–303, Springer, 2001.
  • LS [91] L. Lovász and A. Schrijver, Cones of matrices and set-functions and 0–1 optimization, SIAM journal on optimization 1(2), 166–190 (1991).
  • LW [08] Q. Louveaux and R. Weismantel, Polyhedral properties for the intersection of two knapsacks, Mathematical programming 113(1), 15–37 (2008).
  • Par [03] P. A. Parrilo, Semidefinite programming relaxations for semialgebraic problems, Mathematical programming 96(2), 293–320 (2003).
  • Pri [10] D. Pritchard, An LP with Integrality Gap 1+ϵ1+\epsilon for Multidimensional Knapsack, (2010), arXiv:1005.3324.
  • SA [90] H. D. Sherali and W. P. Adams, A hierarchy of relaxations between the continuous and convex hull representations for zero-one programming problems, SIAM Journal on Discrete Mathematics 3(3), 411–430 (1990).
  • Sch [98] A. Schrijver, Theory of linear and integer programming, John Wiley & Sons, 1998.
  • Xav [17] A. S. Xavier, Computing with multi-row intersection cuts, PhD thesis, The University of Waterloo, 2017.