Approximation Algorithms for Flexible Graph Connectivity
Abstract.
We present approximation algorithms for several network design problems in the model of Flexible Graph Connectivity (Adjiashvili, Hommelsheim and Mühlenthaler, “Flexible Graph Connectivity”, Math. Program. pp. 1–33 (2021), IPCO 2020: pp. 13–26).
Let , and be integers. In an instance of the -Flexible Graph Connectivity problem, denoted , we have an undirected connected graph , a partition of into a set of safe edges and a set of unsafe edges , and nonnegative costs on the edges. A subset of edges is feasible for the problem if for any set with , the subgraph is -edge connected. The algorithmic goal is to find a feasible solution that minimizes . We present a simple -approximation algorithm for the problem via a reduction to the minimum-cost rooted -arborescence problem. This improves on the -approximation algorithm of Adjiashvili et al. Our -approximation algorithm for the problem extends to a -approximation algorithm for the problem. We present a -approximation algorithm for the problem, and an -approximation algorithm for the problem. Finally, we improve on the result of Adjiashvili et al. for the unweighted problem by presenting a -approximation algorithm.
The problem is related to the well-known Capacitated -Connected Subgraph problem (denoted ) that arises in the area of Capacitated Network Design. We give a -approximation algorithm for the problem, where denotes the maximum capacity of an edge.
Corresponding Author: Joseph Cheriyan
Affiliation:
Department of Combinatorics and Optimization, University of Waterloo, Canada
E-mail Address: [email protected]
Key words and phrases:
Approximation Algorithms, Combinatorial Optimization, Network Design, Edge-Connectivity of Graphs, Reliability of Networks1991 Mathematics Subject Classification:
Primary 68W25; Secondary 90C17, 90C27, 90C59, 05C401. Introduction
Network design and graph connectivity are core topics in Theoretical Computer Science and Operations Research. A basic problem in network design is to find a minimum-cost sub-network of a given network such that satisfies some specified connectivity requirements. Most of these problems are NP-hard. Several important algorithmic paradigms were developed in the context of these topics, ranging from exact algorithms for the shortest -path problem and the minimum spanning tree () problem to linear programming-based approximation algorithms for the survivable network design problem and the generalized Steiner network problem. Network design problems are often motivated by practical considerations such as the design of fault-tolerant supply chains, congestion control for urban road traffic, and the modeling of epidemics (see [13, 15, 18]).
Recently, Adjiashvili, Hommelsheim and Mühlenthaler [1, 2] introduced a new model called Flexible Graph Connectivity (), that is motivated by research in robust optimization. (In this paper, the notation may be used as an abbreviation for “the problem”; we use similar abbreviations for the names of other related problems.) In an instance of , we have an undirected connected graph , a partition of into a set of safe edges and a set of unsafe edges , and nonnegative costs on the edges. The graph may have multiedges, but no self-loops. We use to denote the number of vertices of . The cost of an edge-set is denoted by . A subset of edges is feasible for if for any unsafe edge , the subgraph is connected. The problem is to find a feasible edge-set of minimum cost. The motivation for studying is two-fold. First, generalizes many well-studied survivable network design problems. Notably, the problem of finding a minimum-cost -edge connected spanning subgraph (abbreviated as ) corresponds to the special case of where all edges are unsafe, and the problem corresponds to the special case of where all edges are safe. Second, captures a non-uniform model of survivable network design problems where a specified subset of edges never fail, whereas each edge can fail in the classical model of survivable network design problems. Since generalizes the minimum-cost problem, it is APX-hard (see [7]); thus, a polynomial-time approximation scheme for is ruled out unless PNP.
The notion of is an extension of the basic model where we have two additional integer parameters and satisfying and . For a subgraph of and a vertex-set , we use to denote the set of edges in with exactly one end-vertex in . A subset of edges is feasible for if the spanning subgraph is -edge connected, and moreover, the deletion of any set of at most unsafe edges of preserves -edge connectivity. In other words, each cut , , of either contains safe edges or contains (safe or unsafe) edges. The algorithmic goal is to find a feasible edge-set of minimum cost. The problem is a natural and fundamental question in robust network design. Note that the problem is the same as the problem. Observe that the problem of finding a minimum-cost -edge connected spanning subgraph (abbreviated as ) corresponds to the special case of where all edges are safe, and the problem of finding a minimum-cost corresponds to the special case of where all edges are unsafe. Informally speaking, the model of interpolates between -edge connectivity (when all edges are safe) and -edge connectivity (when all edges are unsafe).
For each of the problems considered in this paper, any solution (i.e., output) must be a subgraph of the graph of the instance; that is, the (multi) set of edges of a solution must be a subset of the (multi) set ; in other words, the number of copies of an edge in cannot exceed the number of copies of in ; see the discussion in [16, Chapter 3.1].
The model is related to the model of Capacitated Network Design. There are several results pertaining to approximation algorithms for various problems in Capacitated Network Design; for example, see Goemans et al. [8] and Chakrabarty et al. [3]. Let be a positive integer. The Capacitated -Connected Subgraph problem, see [3], is a well studied problem in this area. We denote this problem by . In an instance of this problem, we have an undirected connected graph , nonnegative integer edge-capacities , nonnegative edge-costs , and a positive integer . The goal is to find an edge-set such that for any nonempty we have , and is minimized. Let and denote the number of vertices and edges of , respectively. For this problem, Goemans et al. [8] give a -approximation algorithm, and Chakrabarty et al. [3] give a randomized -approximation algorithm. We mention that for some particular values of and , such as (and arbitrary ) or (and arbitrary ), can be cast as a special case of the problem. The problem corresponds to the problem where safe edges have capacity two and unsafe edges have capacity one. Moreover, corresponds to the problem where safe edges have capacity and unsafe edges have capacity one; corresponds to the problem where safe edges have capacity and unsafe edges have capacity . We mention that there exist values of and (e.g., ) such that the problem differs from the problem where safe edges have capacity and unsafe edges have capacity .
Our contributions:
We list our main contributions and give a brief overview of our results and techniques.
Our first result is based on a simple reduction from to the well-known minimum-cost rooted -arborescence problem that achieves an approximation factor of two for . This result matches the current best approximation factor known for the minimum-cost problem, and improves on the -approximation algorithm of [2]. At a high level, our result is based on an extension of the -approximation algorithm of Khuller and Vishkin [12] for the minimum-cost problem. (In fact, Khuller and Vishkin [12] give a reduction from the minimum-cost problem to the problem of computing a minimum-cost rooted -arborescence in a digraph, and they prove an approximation factor of two for the former problem.)
Theorem 1.1.
There is a -approximation algorithm for .
The following result generalizes Theorem 1.1 to the problem. Our proof of the generalization of Theorem 1.1 is based on a reduction from to the minimum-cost rooted -arborescence problem (see [16], Chapters 52 and 53). We lose a factor of in this reduction.
Theorem 1.2.
There is a -approximation algorithm for .
In Section 3, we consider the Capacitated -Connected Subgraph problem that we denote by . For notational convenience, let denote the maximum capacity of an edge in the given instance of ; similarly, let . Our main result in Section 3 is a -approximation algorithm for the problem, stated in Theorem 1.3. Similar to Theorems 1.1 and 1.2, our proof of Theorem 1.3 is based on a reduction from the problem to the minimum-cost rooted -arborescence problem. The factor in the approximation factor of Goemans et al. comes from the fact that a simple greedy strategy yields an -approximation for the problem. Assuming , our result is better, and, in fact, for the standard case of , no previous result achieves an approximation factor of (to the best of our knowledge). Our result above is incomparable to the result in [3]; our approximation factor is independent of the graph size, whereas their result is independent of . The algorithm in [3] is probabilistic and its analysis is based on Chernoff tail bounds.
Theorem 1.3.
There is a -approximation algorithm for the problem.
In Section 4, we present a 4-approximation algorithm for the problem, see Theorem 1.4. Our algorithm in Theorem 1.4 runs in two stages. In the first stage we pretend that all edges are safe. Under this assumption, simplifies to the minimum-cost problem, for which several -approximation algorithms are known, see [12], [10]. We apply one of these algorithms. Let be the found in Stage 1. In the second stage, our goal is to preserve -edge connectivity against the failure of any one unsafe edge. In the graph , consider a cut , , that has (exactly) edges and that contains at least one unsafe edge. Such a cut, that we call deficient, certifies that is not feasible for , so it needs to be augmented. The residual problem is that of finding a cheapest augmentation of all deficient cuts w.r.t. (with respect to) . It turns out that this augmentation problem can be formulated as the minimum-cost -connectivity problem for an uncrossable function (to be defined in Section 4). Williamson, Goemans, Mihail and Vazirani [20] present a -approximation algorithm for the latter problem.
Theorem 1.4.
There is a -approximation algorithm for .
In Section 5, we present an -approximation algorithm for . As above, our approximation algorithm for runs in two stages. In the first stage, we construct an instance of the problem (that partially models the given instance), and then we apply our approximation algorithm for the problem (see Theorem 1.3) to compute a cheap edge-set that is nearly feasible for the instance. We call a cut , , deficient (w.r.t. ) if and ; thus, a deficient cut is one that certifies the infeasibility of . The second stage of our algorithm applies several iterations. In the first iteration, we find all the deficient cuts of our current subgraph , and then we apply the greedy algorithm for the (well-known) hitting-set problem to cover all the deficient cuts. We repeat such iterations until our current subgraph is a feasible solution of the instance (i.e., there are no deficient cuts).
Theorem 1.5.
There is an -approximation algorithm for .
In Section 6, we consider the unweighted version of , where each edge has unit cost. We design an improved approximation algorithm for this special case. We give two algorithms for obtaining two candidate solutions to an instance of unweighted ; the simpler of these algorithms is discussed by Adjiashvili et al. [1, 2]. Assuming that we have access to an -approximation algorithm for the minimum-size (i.e., unweighted) problem, we argue that the cheaper of the two candidate solutions is a -approximate solution to the instance of unweighted . We use a result of Sebö & Vygen [17], and we fix .
Theorem 1.6.
There is a -approximation algorithm for unweighted .
Section 2 focuses on and gives our -approximation for this problem (Theorem 1.2); the -approximation for (Theorem 1.1) follows as a special case. Section 3 focuses on the problem, and gives our -approximation algorithm for this problem (Theorem 1.3). Section 4 focuses on , and gives our -approximation algorithm for this problem (Theorem 1.4). Section 5 focuses on , and gives our -approximation algorithm for this problem (Theorem 1.5). Section 6 focuses on the unweighted version of , and gives our -approximation algorithm for this problem (Theorem 1.6). This section also has an improved approximation factor for the unweighted version of .
2. A -Approximation Algorithm for
We give a -approximation for , where is a positive integer. The -approximation for (Theorem 1.1) follows as a special case. Recall that in an instance of we have an undirected graph (with no self loops), a partition of into safe and unsafe edges, , and nonnegative edge-costs . Our objective is to find a minimum-cost edge-set such that the subgraph remains connected against the failure of any set of unsafe edges.
For a subgraph of and a vertex-set , we use or to denote the set of edges in with exactly one end-vertex in , i.e., . We drop the subscript when the underlying graph is clear from the context.
The following characterization of feasible solutions of is straightforward.
Proposition 2.1.
An edge-set is feasible for if and only if for all nonempty , the edge-set contains a safe edge or unsafe edges. Furthermore, in time polynomial in , we can test if is feasible for .
We check the feasibility of for by creating an auxiliary capacitated graph that has a capacity of for each safe edge and a capacity of one for each unsafe edge; then, we test whether or not the minimum capacity of a cut of the auxiliary graph is at least . For the rest of this section, we assume that the given instance of is feasible.
As mentioned before, our algorithm for is based on a reduction to the minimum-cost rooted -arborescence problem. We state a few standard results on arborescences. Let be a digraph and let be nonnegative costs on the arcs. We remark that may have parallel arcs but it has no self-loops. Let be a designated root vertex. For a subgraph of and a nonempty vertex-set , we use to denote the set of arcs in such that the head of the arc is in and the tail of the arc is in , i.e., .
Definition 2.1 (-rooted arborescence).
An -rooted arborescence is a subgraph of satisfying: (i) the undirected version of is acyclic; and (ii) for every , there is a directed path from to in the subgraph .
In other words, an -rooted arborescence is a directed spanning tree such that vertex has no incoming arcs and every other vertex has one incoming arc. An -rooted -arborescence is a union of arc-disjoint -rooted arborescences.
Definition 2.2 (-rooted -arborescence).
For a positive integer , a subgraph is an -rooted -arborescence if can be partitioned into arc-disjoint -rooted arborescences.
The following results on rooted arborescences and the corresponding optimization problem are useful for us.
Proposition 2.2 ([16], Chapter 53.8).
Let be a digraph, let be a vertex, and let be a positive integer. Then, contains an -rooted -arborescence if and only if for any nonempty vertex-set .
Proposition 2.3 ([16], Theorem 53.10).
In strongly polynomial time, we can obtain an optimal solution to the minimum-cost -rooted -arborescence problem on , or conclude that there is no -rooted -arborescence in .
Claim 2.4.
Let be an -rooted -arborescence for an integer . Let be two distinct vertices. Then, the number of arcs in that have one end-vertex at and the other end-vertex at (counting multiplicities) is at most .
Proof.
Since an -rooted -arborescence is a union of arc-disjoint -rooted -arborescences, it suffices to prove the result for . The claim holds for because the undirected version of is acyclic, by definition. ∎
Informally speaking, our proofs map undirected graphs to their directed counterparts by bidirecting edges. We formalize this notion.
Definition 2.3 (Bidirected pair).
For an undirected edge , we call the arc-set a bidirected pair arising from .
The following lemma shows how a solution to can be used to obtain a rooted -arborescence (in an appropriate digraph) of cost at most times .
Lemma 2.5.
Let be a solution. Consider the digraph where the arc-set is defined as follows: for each unsafe edge , we include a bidirected pair of arcs arising from , and for each safe edge , we include bidirected pairs arising from . Consider the natural extension of the cost vector to where the cost of an arc is equal to the cost of the edge in that gives rise to it. Then, there is an -rooted -arborescence in with cost at most .
Proof.
Let be a minimum-cost -rooted -arborescence in . First, we argue that is well-defined. By Proposition 2.2, it suffices to show that for any nonempty , we have . Fix some nonempty . By feasibility of , contains a safe edge or unsafe edges (see Proposition 2.1). If contains a safe edge with , then by our choice of , contains -arcs. Otherwise, contains unsafe edges, and for each such unsafe edge with , contains the arc . In both cases we have , so is well-defined.
We use Claim 2.4 to show that satisfies the required bound on the cost. For each unsafe edge , contains at most arcs from the bidirected pair arising from , and for each safe edge , contains at most arcs from the (disjoint) union of bidirected pairs arising from . Thus, . ∎
Lemma 2.5 naturally suggests a reduction from to the minimum-cost -rooted -arborescence problem. We prove the main theorem of this section.
Proof of Theorem 1.2.
Fix some vertex as the root vertex. Consider the digraph obtained from as follows: for each unsafe edge , we include a bidirected pair arising from , and for each safe edge , we include bidirected pairs arising from . For each edge , let denote the multi-set of all arcs in that arise from . For any edge (that could be one of the copies of a multiedge) and each of the corresponding arcs , we define . Let denote a minimum-cost -rooted -arborescence in . By Lemma 2.5, , where denotes an optimal solution to the given instance of .
We finish the proof by arguing that induces a solution with cost at most . Let . By definition of and our choice of arc-costs in , we have . It remains to show that is feasible for . Consider a nonempty set . Since is an -rooted -arborescence, by Proposition 2.2 we have . If contains a safe arc (i.e., an arc that arises from a safe edge), then that safe edge belongs to . Otherwise, contains some unsafe arcs (that arise from unsafe edges). Since both orientations of an edge cannot appear in , we get that . By Proposition 2.1, is a feasible solution for the given instance of with , where OPT denotes the optimal value of the instance. ∎
3. The Capacitated -Connected Subgraph Problem
In this section we consider the problem. We are given a graph , nonnegative integer edge-capacities , nonnegative edge-costs , and a positive integer . Our goal is to find a spanning subgraph such that for all nonempty sets we have , and the cost is minimized.
Given an instance of the problem, we may assume without loss of generality that for all (we can drop edges with zero capacity and replace edge-capacities by ). We also assume that the instance is feasible. This can be verified in polynomial time by checking if has any cut , , with capacity less than . Let denote the maximum capacity of an edge in . Our main result in this section is a -approximation algorithm for the problem (Theorem 1.3); our algorithm is based on a reduction to the minimum-cost rooted -arborescence problem.
Description of our algorithm for the problem:
Let be the directed graph obtained from by replacing every edge by pairs of bidirected arcs , each with the same cost as the edge ; thus, each edge in has corresponding arcs in , each of cost . Designate an arbitrary vertex as the root. By feasibility of the instance, we know that contains an -rooted -arborescence (see Proposition 2.2). We use Proposition 2.3 on to obtain a minimum-cost -rooted -arborescence in polynomial time. Let be the set of all edges such that at least one of the corresponding arcs in appears in .
Lemma 3.1.
The edge-set obtained by the above algorithm is feasible for the given instance and it has cost at most .
Proof.
Let be a nonempty vertex-set that excludes the root vertex . Since contains arc-disjoint -rooted arborescences, (by Proposition 2.2). For each edge , at most of the corresponding arcs in can occur in the arc-set , by the construction of ; hence, for any edge , is an upper bound on the number of corresponding arcs of in . Therefore, , and is a feasible solution for the instance, as required. For any edge , we only include a single copy of in whenever any of the corresponding arcs appear in , so we have . ∎
We now prove Theorem 1.3 by showing that the edge-set found by the algorithm has cost , where OPT denotes the optimal value of the instance.
Proof of Theorem 1.3.
Let denote a feasible instance of the problem. Let be the root vertex fixed by the algorithm. Let be the digraph and let be the -rooted -arborescence constructed by our algorithm. Let be an optimal solution to the instance, and let be the digraph obtained from by replacing every edge by pairs of bidirected arcs each with the same cost as edge . By feasibility of (for the instance), contains an -rooted -arborescence. Let denote an optimal -rooted -arborescence in . Since is a subgraph of and is an optimal -rooted -arborescence in , we have . By Lemma 3.1, , so to prove the theorem it suffices to argue that . To this end, observe that for any edge there are at most corresponding arcs in by construction of . Hence, we have . Next, by definition, can be partitioned into (arc-disjoint) -rooted arborescences, each of which can use at most one of the corresponding arcs of an edge of ; see Claim 2.4. It follows that for each edge at most of the corresponding arcs can appear in . Hence, . This completes the proof. ∎
4. A -Approximation Algorithm for
Our main result in this section is a -approximation algorithm for (Theorem 1.4). Recall that in an instance of , we have a graph , with a partition of the edge-set into safe and unsafe edges, , nonnegative edge-costs , and a positive integer . The objective is to find a minimum-cost subgraph that remains -edge connected against the failure of any one unsafe edge. We remark that for the case, Theorem 1.1 yields a better approximation factor than Theorem 1.4. Let denote an optimal solution to the instance. The following result pertains to feasible solutions of .
Proposition 4.1.
An edge-set is feasible for if and only if for all nonempty , the edge-set contains safe edges or edges. Furthermore, in time polynomial in , we can test if is feasible for .
Proof.
The characterization of feasible solutions of follows from the definitions.
We check the feasibility of for by creating an auxiliary capacitated graph that has a capacity of for each safe edge and a capacity of for each unsafe edge; then, we test whether or not the minimum capacity of a cut of the auxiliary graph is at least . ∎
For the rest of this section, we assume that the given instance of is feasible.
Proposition 4.1 suggests a two-stage strategy for finding an approximately optimal solution to . In the first stage, we do not distinguish between safe edges and unsafe edges, and we compute a cheap of that we denote by . Clearly, for every nonempty set , we have ; if equality holds, then we call a -edge-cut. If is feasible for , then we are done. Otherwise, by Proposition 4.1, the infeasibility of for is due to -edge-cuts of that contain at least one unsafe edge. We call such cuts deficient. In the second stage, we address the remaining augmentation problem for the deficient cuts, by casting it as a special case of the minimum-cost -connectivity problem (defined below).
An instance of the minimum-cost -connectivity problem consists of an undirected graph , nonnegative edge-costs , and a requirement function satisfying . We assume access to via a value oracle that takes as input a vertex-set and outputs . An edge-set is feasible if for every . In other words, is feasible if and only if for every vertex-set with there is at least one -edge in the cut . The objective is to find a feasible that minimizes . The minimum-cost -connectivity problem can be formulated as an integer program whose linear relaxation (P) is stated below. For each edge , the LP (linear program) has a nonnegative variable ; informally speaking, quantifies the “usage” of the edge in a feasible solution to the LP.
(P) | |||||
subject to | |||||
The minimum-cost -connectivity problem has received attention since it captures many well-known problems in network design. In particular, it captures the generalized Steiner network problem. Williamson et al. [20] gave a primal-dual framework to obtain approximation algorithms for the minimum-cost -connectivity problem when is a proper function, and more generally, when is an uncrossable function (also see the book chapter by Goemans and Williamson [9]).
Definition 4.1 (Uncrossable function).
A function is called uncrossable if and satisfies the following two conditions:
-
(i)
is symmetric, i.e., for all ;
-
(ii)
for any two sets with , either or holds.
Under the assumption that minimal violated sets can be computed efficiently throughout, the primal-dual algorithm of [20] gives a -approximation for the minimum-cost -connectivity problem with an uncrossable function . There is no explicit result in [20] that can be quoted verbatim and applied for our purposes, so we state the most relevant result from [20].
Definition 4.2 (Minimal violated sets).
Let be a requirement function and be an edge-set. A vertex-set is said to be violated, w.r.t. and , if and . We say that is a minimal violated set if none of the proper subsets of is violated.
Proposition 4.2 ([20], Lemma 2.1).
Let be an instance of the minimum-cost -connectivity problem, where is an uncrossable function that is given via a value oracle. Suppose that for any we can compute all minimal violated sets (w.r.t. and ) in polynomial time. Then, in polynomial time, we can compute a feasible solution such that , where denotes the optimal value of the LP relaxation (P).
We now describe a two-stage algorithm that produces a -approximate solution in polynomial time, thereby proving Theorem 1.4.
Description of our -approximation algorithm for :
Our algorithm runs in two stages. In the first stage, we construct an instance of the minimum-cost problem from the instance of , by ignoring the distinction between the safe edges and the unsafe edges of ; the resulting instance is feasible because is -edge connected. Then, we compute a of by applying a 2-approximation algorithm to the instance of the minimum-cost problem; either the algorithm of Khuller & Vishkin [12] or the algorithm of Jain [10] could be used. Clearly, . Next, we compute the collection of all vertex-sets that correspond to -edge-cuts of . Consider the requirement function where
(4:1) |
Consider an instance of the minimum-cost -connectivity problem for the graph with nonnegative edge-costs ; note that is feasible for this instance. In the second stage, we use Proposition 4.2 to compute a feasible solution for this instance such that . We return the solution .
We prove Theorem 1.4 via a sequence of lemmas and claims. Lemma 4.3 below shows that is uncrossable, and Claim 4.4 below shows that we can compute minimal violated sets (w.r.t. and any ) in polynomial time. These two results together with Proposition 4.2 imply that our algorithm runs in polynomial time. Lemma 4.5 shows the correctness of our algorithm, and proves the approximation factor of four.
Lemma 4.3.
is uncrossable.
Proof.
We check that the two properties (i), (ii) of an uncrossable function hold for (recall Definition 4.1). The symmetry of follows from the symmetry of cuts in undirected graphs. To check the second property, consider nonempty satisfying . By definition of , see (4:1), in the subgraph , both and are (minimum) -edge-cuts, and there is at least one unsafe edge in each of these cuts. Let be an unsafe edge in and let be an unsafe edge in . Let be an arbitrary vertex. By symmetry of the cut function, we may assume without loss of generality that . If , then , so we are done. If or , then , so we are done. Thus, we may assume that are all nonempty. For , let denote the set of edges of with exactly one end-vertex in and exactly one end-vertex in . By submodularity of the function , see [16], we have:
(4:2) |
Furthermore, we also have:
(4:3) |
We finish the proof by a case analysis on and . By (4:3), exactly one of the following cases occurs: (i) ; or (ii) . If (i) occurs, then . Otherwise, (ii) occurs and . We apply a similar analysis for . Exactly one of the following occurs: (a) ; or (b) . If (a) occurs, then . Otherwise, (b) occurs and . It is easy to verify that for each of the four combinations, we either have or we have . ∎
Claim 4.4.
For any , we can compute all minimal violated sets w.r.t. and in polynomial time.
Proof.
The number of minimum-cuts of a graph on vertices is (at most) , see [11], hence, we have . Using results on network flow algorithms, we can compute in polynomial time, see [4], [14]. Since we have explicit access to , we have a value oracle for .
Let be a given edge-set. By Definition 4.2, any violated set w.r.t. is in and has . We can exhaustively check each of the sets in and find each of the minimal violated sets. ∎
Lemma 4.5.
The edge-set is feasible for and satisfies .
Proof.
We first argue that is feasible. Since and are edge-disjoint, we have . We use the characterization of feasible solutions given by Proposition 4.1. Consider an arbitrary nonempty vertex-set . Since is a -edge connected subgraph of , we have . If , then . Otherwise, is a -edge-cut of , i.e., . If contains only safe edges, then contains safe edges. Otherwise, by definition of , see (4:1), . Next, by feasibility of for the minimum-cost -connectivity problem, we have . Thus, . We show that by arguing that each of and is . The bound on is immediate from the fact that is feasible for the instance of the minimum-cost problem considered in Stage 1, and by the 2-approximation algorithm used in Stage 1. Next, by feasibility of for the instance of the minimum-cost -connectivity problem, we have . The lemma follows. ∎
Remarks: The function is not a proper function (see [20]), and it is not weakly-supermodular (see [10]). Any proper function must satisfy the maximality property, that is, must hold for any two disjoint sets . Suppose that . Consider the graph with and with four unsafe edges, namely, two copies of , one copy of , and one copy of . Let be defined by (4:1). Then we have , , and . Clearly, maximality is violated by the sets . Any weakly-supermodular function must satisfy the property that the inequality holds for any two sets . Suppose that . Consider the graph with and with one unsafe edge, namely, , and five safe edges, namely, two copies of , two copies of , and one copy of . Let be defined by (4:1). Let and let . Then we have , , , , , and . Clearly, the required inequality fails to hold for the sets .
5. An -Approximation Algorithm for
In this section, we present an -approximation algorithm for . Recall that an instance of consists of an undirected graph , a partition of into safe and unsafe edges, , nonnegative edge-costs , and two integer parameters and . The objective is to find a minimum-cost edge-set such that the subgraph remains -edge connected against the failure of any set of at most unsafe edges, that is, for any with , the subgraph is -edge connected. We assume that , since otherwise our results from Section 4 give a -approximation algorithm. The following result pertains to feasible solutions of .
Proposition 5.1.
Consider an instance of . An edge-set is feasible if and only if for all nonempty , the edge-set contains safe edges or edges. Furthermore, in time polynomial in , we can test if is feasible for .
Proof.
The characterization of feasible solutions of follows from the definitions.
We check the feasibility of for by creating an auxiliary capacitated graph that has as the underlying graph, and that has a capacity of for each safe edge and a capacity of for each unsafe edge. Then, we compute a minimum-capacity cut of the auxiliary graph, call it ; note that is nonempty and . Let denote the capacity of ; thus, . If , then is infeasible. Otherwise, we compute the set of all cuts of the auxiliary graph that have capacity between and , by applying the polynomial-time algorithm of Nagamochi, Nishimura and Ibaraki [14] that enumerates over all -approximate minimum-cuts of a capacitated graph. We exhaustively check whether or not each of the cuts in has either edges or has safe edges. Clearly, is infeasible if contains a cut that violates this condition. Otherwise, is feasible because any cut , , of the auxiliary graph that is not in has capacity , and so either , that is, has safe edges, or , that is, has (unsafe) edges. ∎
For the rest of this section, we assume that the given instance of is feasible. Let denote an optimal solution for the instance, and let denote the optimal value.
Given an edge-set (i.e., a candidate solution), we call a cut , , deficient if and ; thus, a deficient cut is one that certifies the infeasibility of .
First, we give an overview of our -approximation algorithm for . Our algorithm runs in two stages. In the first stage, we construct an instance of the problem (that partially models the given instance), and then we apply our approximation algorithm for the problem (see Theorem 1.3) to compute an edge-set of cost that is “nearly feasible” for the instance. In more detail, the set of cuts that are deficient w.r.t. has size polynomial in , and the set is computable in time polynomial in . The second stage of our algorithm applies several iterations. In each iteration , we find all the deficient cuts of our current subgraph and then we apply the greedy algorithm for the (well-known) hitting-set problem to find an edge-set that covers all the deficient cuts (i.e., each of the deficient cuts contains at least one edge of ). Then, we update to , i.e., we augment by the edge-set computed by the greedy algorithm, and then we re-compute the set of deficient cuts w.r.t. the updated subgraph . We stop iterating when there are no deficient cuts w.r.t. ; thus, at the termination of the second stage, is feasible for the instance. The greedy algorithm (for the hitting-set instances that arise) achieves an approximation factor of .
We discuss the hitting-set problem and state the approximation factor of the greedy algorithm for this problem.
Definition 5.1 (Hitting-Set Problem).
Given a ground set of elements, a collection of subsets of , and nonnegative costs on the elements of , find a minimum-cost subset such that for every , we have .
It is well-known that there is an -approximation algorithm for the hitting-set problem based on the greedy strategy, see [19].
Proposition 5.2 ([19]).
There is an -approximation algorithm for the hitting-set problem that runs in time polynomial in and .
Constructing an instance of :
Given an instance of , we construct an instance of the problem on the underlying graph with edge costs .
We consider two cases, one for , and the other for , and we use different values of the edge capacities for the two cases. In the first case, we use unit edge capacities, and in the second case, we use the edge capacities given in the proof of Proposition 5.1. Let us explain our choice of edge capacities. Recall that our plan is to apply the -approximation algorithm for (Theorem 1.3) to compute an edge-set of cost that is “nearly feasible” for the instance. In the first case (, unit edge capacities), the edge-set (computed via Theorem 1.3) has cost . In the second case (, edge capacities of or ), the edge-set (computed via Theorem 1.3) has cost .
- Case 1 :
-
, and all edges have unit capacity i.e., for all .
- Case 2 :
-
, each safe edge has capacity , and each unsafe edge has capacity , that is, if , and if .
Let be the maximum edge capacity.
First, we argue that the instance of is feasible. Recall that denotes an optimal solution for the given (feasible) instance. By Proposition 5.1, for any nonempty set , we either have or . The feasibility of the instance follows from showing that for all nonempty sets , we have . To this end, fix such an and recall the choice of edge capacities that depends on the relative values of and . If , then
(5:1) |
On the other hand, if , then we have:
(5:2) |
Let be a feasible solution to the instance; thus, every nonempty has . Let
Informally speaking, in the capacitated graph that corresponds to the edge-set , is the collection of all vertex-sets that correspond to 2-approximate minimum-cuts that violate the feasibility requirement stated in Proposition 5.1.
Description of our two-stage algorithm for :
In the first stage of the algorithm, we use Theorem 1.3 to obtain a feasible solution for the above instance such that the cost is . The second stage of the algorithm consists of several iterations that augment edges to until all the deficient cuts w.r.t. have been fixed. The iteration (for some ) consists of solving an instance of the hitting-set problem: we want to hit all sets in the collection by using edge-elements , where the cost of is (in the hitting-set instance). Let denote a hitting-set computed by the greedy algorithm for the above hitting-set instance. We update to , and recompute using the new . As long as is not empty, we repeat the above iteration. When becomes empty, we return the current as a feasible solution of the given instance. Assuming that the number of iterations in the second stage is , the cost of is .
Observe that each of the hitting-set instances constructed by the algorithm is feasible, because for any deficient cut w.r.t. the current solution , we have , that is, is a feasible hitting-set.
The next result shows that the algorithm finds a feasible solution.
Lemma 5.3.
The edge-set returned by the algorithm is feasible for the given instance.
Proof.
By the design of the second stage of the algorithm, the solution is repeatedly augmented as long as is nonempty, so it suffices to argue that every deficient cut (w.r.t. the current ) belongs to . Let , , be an arbitrary deficient cut w.r.t. . By definition, and . To show that belongs to , we need to show that holds. If , then
(5:3) |
On the other hand, if , then
(5:4) |
Thus, in either case, deficient cuts are 2-approximate minimum-cuts in the capacitated graph , and they belong to . ∎
We complete the proof of Theorem 1.5 by arguing that the above algorithm finds a feasible solution of the instance of cost in polynomial time.
Lemma 5.4.
The above two-stage algorithm runs in time polynomial in and returns a feasible solution for such that .
Proof.
We argue that the output of the algorithm has cost at most . It is easy to see that the cost of the first-stage solution is because of the approximation factor from Theorem 1.3; as mentioned before, is feasible for the instance, and , for all relevant values of and .
We bound the cost incurred in the second stage by arguing that: (i) each iteration leads to an additional cost of at most ; and (ii) there are at most iterations.
In the capacitated graph , all deficient cuts are 2-approximate minimum-cuts, i.e., the capacity of each deficient cut is at most two times the capacity of a minimum-cut. Karger’s bound [11] on the number of -approximate minimum-cuts implies that . By using the algorithm of Nagamochi et al. [14] we can explicitly compute the collection in (deterministic) polynomial time. Since is a feasible solution to each of the hitting-set instances constructed in the second stage, Proposition 5.2 implies that the cost of the augmenting edge-set found in each iteration is , thereby showing (i).
Next, we bound the number of iterations via a case analysis. First, suppose that . Then each iteration increases the capacity of a deficient cut by at least one. By (5:1), every deficient cut has capacity at least at the end of the first stage, and due to (5:3), a cut is no longer deficient once its capacity is at least . Next, suppose that . We use a similar argument for this case. Now, each iteration increases the capacity of a deficient cut by at least . By (5:2), every deficient cut has capacity at least at the end of the first stage, and due to (5:4), a cut is longer deficient once its capacity is at least . Overall, we have , as desired.
Lastly, we argue that the entire algorithm runs in polynomial time. The first stage runs in (deterministic) polynomial time, by Theorem 1.3. The second stage also runs in (deterministic) polynomial time because the number of iterations is at most (), and in each iteration we solve a polynomial-sized hitting-set instance. This completes the proof of the lemma. ∎
6. Unweighted problems: and
Consider the unweighted version of where each edge has unit cost, i.e., for all . We present a -approximation algorithm (see Theorem 1.6). To the best of our knowledge, this is the first result that improves on the approximation factor of for unweighted . In fact, we give two algorithms for obtaining two candidate solutions to an instance of unweighted ; the simpler of these algorithms is discussed by Adjiashvili et al. [1, 2]. Assuming that we have access to an -approximation algorithm for the minimum-size (i.e., unweighted) problem, we argue that the cheaper of the two candidate solutions is a -approximate solution to the instance of unweighted . Adjiashvili et al. [2] gave an -approximation algorithm for unweighted , assuming the existence of an -approximation algorithm for the minimum-size (i.e., unweighted) problem; this implies a -approximation algorithm for unweighted by using a result of Sebö and Vygen [17]. The algorithm in [2] starts with a maximal forest of safe edges in the graph. At the end of this section, we give an example showing that the (asymptotic) approximation factor achievable by such an algorithm is at least . Our main result in this section is the following.
Theorem 6.1.
Suppose that there is an -approximation algorithm for the minimum-size (i.e., unweighted) problem. Then, there is a -approximation algorithm for unweighted .
Theorem 1.6 follows from the above theorem by using the -approximation algorithm of Sebö and Vygen [17] for the minimum-size problem. Before delving into the proof of Theorem 6.1, we introduce some basic results on -joins, which will be useful in our algorithm and its analysis. Let be an undirected graph with no self-loops and let be nonnegative costs on the edges.
Definition 6.1 (-join).
Let be a subset of vertices with even. A subset of edges is called a -join if is equal to the set of vertices of odd degree in the subgraph .
The following classical result on finding a minimum-cost -join is due to Edmonds.
Proposition 6.2 ([16], Theorem 29.1).
Given , we can either obtain a minimum-cost -join, or conclude that there is no -join, in strongly polynomial time.
The -join polytope is the convex hull of the incidence vectors of -joins. Edmonds & Johnson showed that the dominant of the -join polytope has a simple linear description.
Proposition 6.3 ([16], Corollary 29.2b).
The dominant of the -join polytope is given by .
Consider an instance of unweighted consisting of a graph with a specified partition of into a set of safe edges and a set of unsafe edges, . We will assume that is connected and has no unsafe bridges, since otherwise the instance is infeasible. Let denote an optimal solution.
Join-based algorithm for unweighted :
Let be a spanning tree in that maximizes the number of safe edges. Clearly, for each safe edge in , the (unique) -path in consists of safe edges; hence, the graph obtained from by contracting all the safe edges of has no safe edges. If , then is an optimal solution for the given instance, and we are done. Otherwise, let be the (nonempty) set of unsafe edges in . Let denote the graph obtained from by contracting all the (safe) edges in . (We remove all self-loops from , but retain parallel edges that arise due to edge contractions.) Note that all edges in are unsafe (by the discussion above), and is a spanning tree of . Let denote the (nonempty) set of odd degree vertices in the subgraph . Using Proposition 6.2, in polynomial time, we compute a minimum-cardinality -join in , and denote it by . By our choice, the subgraph is connected and Eulerian, so it is -edge connected in . Consider the multiset consisting of edges in ; if an edge appears in both and , then we include two copies of in .
If contains at most one copy of each edge in , then is -feasible. Otherwise, we modify to get rid of all duplicates without increasing . Consider an unsafe edge that appears twice in , i.e., belongs to both and . We remove a copy of from . If this does not violate -feasibility, then we take no further action. Otherwise, the second copy of in is an unsafe bridge in that induces a cut , , in . By our assumption that has no unsafe bridges, there is another edge that is in but not in . We include in . This finishes the description of our first algorithm.
At the end of the de-duplication step, is -feasible and it contains at most one copy of any edge . It is also clear that . The following claim gives a bound on the quality of our first solution.
Claim 6.4.
We have . Hence, .
Proof.
We prove the claim by constructing a fractional -join of small size. Recall that we chose such that is maximum, and we obtained by contracting connected components in . consists of only unsafe edges, and moreover, is -edge connected because has no unsafe bridges (by our assumption). Let denote the set of unsafe edges in the optimal solution that also belong to . Consider the vector where is the incidence vector of in . Let , , be an arbitrary cut in and let be the unique cut in that gives rise to when we contract (safe) edges in . Since is -feasible and there are no safe edges in , we must have . Consequently, . By Proposition 6.3, lies in the dominant of the -join polytope, i.e., dominates a fractional -join. Since is a min-cardinality -join, . We bound the size of by using the trivial bound :
Our second algorithm uses the -approximation for the minimum-size problem as a subroutine. Informally speaking, the solution returned by this algorithm has the property that its size complements that of .
-based algorithm for unweighted :
Consider the graph obtained from by duplicating every safe edge in . Similarly, let be the multiedge-set obtained from by duplicating every safe edge in . Clearly, is a -edge connected subgraph of consisting of edges. Let be the output of running the -approximation algorithm for the minimum-size problem on . Since is -edge connected and only safe edges can appear more than once in (because only has duplicates of safe edges), we can drop the extra copy of all safe edges while maintaining -feasibility in . This finishes the description of our second algorithm.
The following claim is immediate.
Claim 6.5.
We have .
We end this section with the proof of our main result on unweighted .
Proof of Theorem 6.1.
Given an instance of unweighted , we compute two candidate solutions and as given by the two algorithms described above. The solution can be computed using algorithms for the problem and the minimum-weight -join problem, followed by basic graph operations. The solution can be computed using the given -approximation algorithm for the minimum-size problem. We show that the smaller of and is a -approximate solution for the instance of unweighted . By Claims 6.4 and 6.5:
As mentioned earlier, we have an example (see Figure 1 below) such that any algorithm for unweighted that starts with a maximal forest on safe edges achieves an (asymptotic) approximation factor of or more.
Improved approximation factor for unweighted :
Finally, we focus on unweighted where each edge has unit cost. We can improve on the approximation factor of four of Theorem 1.4, by using the same method (see Section 4), except that in the first stage we apply the best approximation algorithm known for the minimum-size (unweighted) problem. Let denote the best approximation factor known for the latter problem. Note that (see Sebö & Vygen [17]), (see Gabow [5]), and, in general, (see Gabow & Gallagher [6]).
Proposition 6.6.
There is a -approximation algorithm for unweighted . Thus, the approximation factor is for , for , and it is less than for all integers .
Acknowledgements. We thank the anonymous reviewers and PC members of FSTTCS 2021 for their comments.
References
- [1] D. Adjiashvili, F. Hommelsheim, and M. Mühlenthaler. Flexible Graph Connectivity. In Proceedings of the 21st Integer Programming and Combinatorial Optimization Conference, volume 12125 of Lecture Notes in Computer Science, pages 13–26, 2020.
- [2] D. Adjiashvili, F. Hommelsheim, and M. Mühlenthaler. Flexible Graph Connectivity. Mathematical Programming, pages 1–33, 2021.
- [3] D. Chakrabarty, C. Chekuri, S. Khanna, and N. Korula. Approximability of Capacitated Network Design. Algorithmica, 72(2):493–514, 2015.
- [4] L. Fleischer. Building Chain and Cactus Representations of All Minimum Cuts from Hao-Orlin in the Same Asymptotic Run Time. Journal of Algorithms, 33(1):51–72, 1999.
- [5] H. N. Gabow. An Ear Decomposition Approach to Approximating the Smallest 3-Edge Connected Spanning Subgraph of a Multigraph. SIAM J. Discret. Math., 18(1):41–70, 2004.
- [6] H. N. Gabow and S. Gallagher. Iterated Rounding Algorithms for the Smallest -Edge Connected Spanning Subgraph. SIAM J. Comput., 41(1):61–103, 2012.
- [7] H. N. Gabow, M. X. Goemans, É. Tardos, and D. P. Williamson. Approximating the Smallest k-Edge Connected Spanning Subgraph by LP-Rounding. Networks, 53(4):345–357, 2009.
- [8] M. X. Goemans, A. V. Goldberg, S. A. Plotkin, D. B. Shmoys, É. Tardos, and D. P. Williamson. Improved Approximation Algorithms for Network Design Problems. In Proceedings of the 5th Symposium on Discrete Algorithms, pages 223–232, 1994.
- [9] M. X. Goemans and D. P. Williamson. The Primal-Dual Method for Approximation Algorithms and its Application to Network Design Problems, chapter 4, pages 144–191. PWS Publishing Company, Boston, MA, 1997.
- [10] K. Jain. A Factor 2 Approximation Algorithm for the Generalized Steiner Network Problem. Combinatorica, 21(1):39–60, 2001.
- [11] D. R. Karger. Global Min-Cuts in , and Other Ramifications of a Simple Min-Cut Algorithm. In Proceedings of the 4th Symposium on Discrete Algorithms, pages 21––30, 1993.
- [12] S. Khuller and U. Vishkin. Biconnectivity Approximations and Graph Carvings. Journal of the ACM, 41(2):214–235, 1994.
- [13] T. L. Magnanti and R. T. Wong. Network Design and Transportation Planning: Models and Algorithms. Transportation Science, 18(1):1–55, 1984.
- [14] H. Nagamochi, K. Nishimura, and T. Ibaraki. Computing All Small Cuts in an Undirected Network. SIAM Journal on Discrete Mathematics, 10(3):469–481, 1997.
- [15] P. Rozenshtein, A. Gionis, B. A. Prakash, and J. Vreeken. Reconstructing an Epidemic Over Time. In Proceedings of the 22nd International Conference on Knowledge Discovery and Data Mining, KDD ’16, page 1835–1844, 2016.
- [16] A. Schrijver. Combinatorial Optimization: Polyhedra and Efficiency, volume 24 of Algorithms and Combinatorics. Springer-Verlag Berlin Heidelberg, 2003.
- [17] A. Sebö and J. Vygen. Shorter Tours by Nicer Ears: 7/5-Approximation for the Graph-TSP, 3/2 for the Path Version, and 4/3 for Two-Edge-Connected Subgraphs. Combinatorica, 34(5):597–629, 2014.
- [18] L. V. Snyder, M. P. Scaparra, M. S. Daskin, and R. L. Church. Planning for Disruptions in Supply Chain Networks, pages 234–257. Institute for Operations Research and the Management Sciences (INFORMS), 2014.
- [19] V. V. Vazirani. Approximation Algorithms. Springer Berlin Heidelberg, 2003.
- [20] D. P. Williamson, M. X. Goemans, M. Mihail, and V. V. Vazirani. A Primal-Dual Approximation Algorithm for Generalized Steiner Network Problems. Combinatorica, 15(3):435–454, 1995.