This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Approximation Algorithms for Flexible Graph Connectivity

Sylvia Boyd School of Electrical Engineering & Computer Science, University of Ottawa, Canada [email protected] https://www.site.uottawa.ca/ sylvia Joseph Cheriyan Department of Combinatorics and Optimization, University of Waterloo, Canada [email protected] http://www.math.uwaterloo.ca/ jcheriyan Arash Haddadan Warner Music Group, New York, NY, USA [email protected]  and  Sharat Ibrahimpur Department of Combinatorics and Optimization, University of Waterloo, Canada [email protected] http://www.math.uwaterloo.ca/ s26ibrah  https://orcid.org/0000-0002-1575-9648
Abstract.

We present approximation algorithms for several network design problems in the model of Flexible Graph Connectivity (Adjiashvili, Hommelsheim and Mühlenthaler, “Flexible Graph Connectivity”, Math. Program. pp. 1–33 (2021), IPCO 2020: pp. 13–26).

Let k1k\geq 1, p1p\geq 1 and q0q\geq 0 be integers. In an instance of the (p,q)(p,q)-Flexible Graph Connectivity problem, denoted (p,q)-FGC(p,q)\text{-}\mathrm{FGC}, we have an undirected connected graph G=(V,E)G=(V,E), a partition of EE into a set of safe edges 𝒮\mathscr{S} and a set of unsafe edges 𝒰\mathscr{U}, and nonnegative costs c:E0c:E\to\mathbb{R}_{\geq 0} on the edges. A subset FEF\subseteq E of edges is feasible for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} problem if for any set F𝒰F^{\prime}\subseteq\mathscr{U} with |F|q|F^{\prime}|\leq q, the subgraph (V,FF)(V,F\setminus F^{\prime}) is pp-edge connected. The algorithmic goal is to find a feasible solution FF that minimizes c(F)=eFcec(F)=\sum_{e\in F}c_{e}. We present a simple 22-approximation algorithm for the (1,1)-FGC(1,1)\text{-}\mathrm{FGC} problem via a reduction to the minimum-cost rooted 22-arborescence problem. This improves on the 2.5272.527-approximation algorithm of Adjiashvili et al. Our 22-approximation algorithm for the (1,1)-FGC(1,1)\text{-}\mathrm{FGC} problem extends to a (k+1)(k+1)-approximation algorithm for the (1,k)-FGC(1,k)\text{-}\mathrm{FGC} problem. We present a 44-approximation algorithm for the (k,1)-FGC(k,1)\text{-}\mathrm{FGC} problem, and an O(qlog|V|)O(q\log|V|)-approximation algorithm for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} problem. Finally, we improve on the result of Adjiashvili et al. for the unweighted (1,1)-FGC(1,1)\text{-}\mathrm{FGC} problem by presenting a 16/1116/11-approximation algorithm.

The (p,q)-FGC(p,q)\text{-}\mathrm{FGC} problem is related to the well-known Capacitated kk-Connected Subgraph problem (denoted Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS}) that arises in the area of Capacitated Network Design. We give a min(k,2umax)\min(k,2{u}_{\mathrm{max}})-approximation algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem, where umax{u}_{\mathrm{max}} denotes the maximum capacity of an edge.



Corresponding Author: Joseph Cheriyan
Affiliation: Department of Combinatorics and Optimization, University of Waterloo, Canada
E-mail Address: [email protected]

Key words and phrases:
Approximation Algorithms, Combinatorial Optimization, Network Design, Edge-Connectivity of Graphs, Reliability of Networks
1991 Mathematics Subject Classification:
Primary 68W25; Secondary 90C17, 90C27, 90C59, 05C40
A preliminary version of this paper appeared in the Proceedings of the 41st IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2021), December 15–17, 2021, Ed. M. Bojańczyk and C. Chekuri (LIPIcs, Volume 213, Article No. 9, pp. 9:1–9:14).
The second author is supported in part by NSERC, RGPIN-2019-04197.
This work of the third author was mostly done as a postdoctoral researcher at the Biocomplexity Institute and Initiative at the University of Virginia, Charlottesville, and supported by the NSF Expeditions in Computing Grant with award number CCF-1918656.
The fourth author is supported in part by NSERC grant 327620-09.

1. Introduction

Network design and graph connectivity are core topics in Theoretical Computer Science and Operations Research. A basic problem in network design is to find a minimum-cost sub-network HH of a given network GG such that HH satisfies some specified connectivity requirements. Most of these problems are NP-hard. Several important algorithmic paradigms were developed in the context of these topics, ranging from exact algorithms for the shortest s,t{s,t}-path problem and the minimum spanning tree (MST\mathrm{MST}) problem to linear programming-based approximation algorithms for the survivable network design problem and the generalized Steiner network problem. Network design problems are often motivated by practical considerations such as the design of fault-tolerant supply chains, congestion control for urban road traffic, and the modeling of epidemics (see [13, 15, 18]).

Recently, Adjiashvili, Hommelsheim and Mühlenthaler [1, 2] introduced a new model called Flexible Graph Connectivity (FGC\mathrm{FGC}), that is motivated by research in robust optimization. (In this paper, the notation FGC\mathrm{FGC} may be used as an abbreviation for “the FGC\mathrm{FGC} problem”; we use similar abbreviations for the names of other related problems.) In an instance of FGC\mathrm{FGC}, we have an undirected connected graph G=(V,E)G=(V,E), a partition of EE into a set of safe edges 𝒮\mathscr{S} and a set of unsafe edges 𝒰\mathscr{U}, and nonnegative costs c:E0c:E\to\mathbb{R}_{\geq 0} on the edges. The graph GG may have multiedges, but no self-loops. We use nn to denote the number of vertices of GG. The cost of an edge-set FEF\subseteq{E} is denoted by c(F)=eFcec(F)=\sum_{e\in{F}}c_{e}. A subset FEF\subseteq E of edges is feasible for FGC\mathrm{FGC} if for any unsafe edge eF𝒰e\in F\cap\mathscr{U}, the subgraph (V,F{e})(V,F\setminus\{e\}) is connected. The problem is to find a feasible edge-set FF of minimum cost. The motivation for studying FGC\mathrm{FGC} is two-fold. First, FGC\mathrm{FGC} generalizes many well-studied survivable network design problems. Notably, the problem of finding a minimum-cost 22-edge connected spanning subgraph (abbreviated as 2-ECSS2\text{-}\mathrm{ECSS}) corresponds to the special case of FGC\mathrm{FGC} where all edges are unsafe, and the MST\mathrm{MST} problem corresponds to the special case of FGC\mathrm{FGC} where all edges are safe. Second, FGC\mathrm{FGC} captures a non-uniform model of survivable network design problems where a specified subset of edges never fail, whereas each edge can fail in the classical model of survivable network design problems. Since FGC\mathrm{FGC} generalizes the minimum-cost 2-ECSS2\text{-}\mathrm{ECSS} problem, it is APX-hard (see [7]); thus, a polynomial-time approximation scheme for FGC\mathrm{FGC} is ruled out unless P==NP.

The notion of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} is an extension of the basic FGC\mathrm{FGC} model where we have two additional integer parameters pp and qq satisfying p1p\geq 1 and q0q\geq 0. For a subgraph H=(V,F)H=(V,F) of GG and a vertex-set SVS\subseteq{V}, we use δH(S)\delta_{H}(S) to denote the set of edges in HH with exactly one end-vertex in SS. A subset FEF\subseteq E of edges is feasible for (p,q)-FGC(p,q)\text{-}\mathrm{FGC} if the spanning subgraph H=(V,F)H=(V,F) is pp-edge connected, and moreover, the deletion of any set of at most qq unsafe edges of FF preserves pp-edge connectivity. In other words, each cut δH(S)\delta_{H}(S), SV\emptyset\neq{S}\subsetneq{V}, of HH either contains pp safe edges or contains p+qp+q (safe or unsafe) edges. The algorithmic goal is to find a feasible edge-set FF of minimum cost. The (p,q)-FGC(p,q)\text{-}\mathrm{FGC} problem is a natural and fundamental question in robust network design. Note that the FGC\mathrm{FGC} problem is the same as the (1,1)-FGC(1,1)\text{-}\mathrm{FGC} problem. Observe that the problem of finding a minimum-cost pp-edge connected spanning subgraph (abbreviated as p-ECSSp\text{-}\mathrm{ECSS}) corresponds to the special case of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} where all edges are safe, and the problem of finding a minimum-cost (p+q)-ECSS(p+q)\text{-}\mathrm{ECSS} corresponds to the special case of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} where all edges are unsafe. Informally speaking, the model of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} interpolates between pp-edge connectivity (when all edges are safe) and (p+q)(p+q)-edge connectivity (when all edges are unsafe).

For each of the problems considered in this paper, any solution (i.e., output) must be a subgraph of the graph GG of the instance; that is, the (multi) set of edges FF of a solution must be a subset of the (multi) set E(G)E(G); in other words, the number of copies of an edge e=vwe=vw in FF cannot exceed the number of copies of ee in E(G)E(G); see the discussion in [16, Chapter 3.1].

The (p,q)-FGC(p,q)\text{-}\mathrm{FGC} model is related to the model of Capacitated Network Design. There are several results pertaining to approximation algorithms for various problems in Capacitated Network Design; for example, see Goemans et al. [8] and Chakrabarty et al. [3]. Let kk be a positive integer. The Capacitated kk-Connected Subgraph problem, see [3], is a well studied problem in this area. We denote this problem by Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS}. In an instance of this problem, we have an undirected connected graph G=(V,E)G=(V,E), nonnegative integer edge-capacities u:E0u:E\to\mathbb{Z}_{\geq 0}, nonnegative edge-costs c:E0c:E\to\mathbb{R}_{\geq 0}, and a positive integer kk. The goal is to find an edge-set FEF\subseteq E such that for any nonempty RVR\subsetneq{V} we have eδG(R)Fuek\sum_{e\in\delta_{G}(R)\cap F}u_{e}\geq k, and c(F)c(F) is minimized. Let nn and mm denote the number of vertices and edges of GG, respectively. For this problem, Goemans et al. [8] give a min(2k,m)\min(2k,m)-approximation algorithm, and Chakrabarty et al. [3] give a randomized O(logn)O(\log n)-approximation algorithm. We mention that for some particular values of pp and qq, such as p=1p=1 (and arbitrary qq) or q1q\leq 1 (and arbitrary pp), (p,q)-FGC(p,q)\text{-}\mathrm{FGC} can be cast as a special case of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem. The FGC\mathrm{FGC} problem corresponds to the Cap-2-ECSS\mathrm{Cap}\text{-}2\text{-}\mathrm{ECSS} problem where safe edges have capacity two and unsafe edges have capacity one. Moreover, (1,k)-FGC(1,k)\text{-}\mathrm{FGC} corresponds to the Cap-(k+1)-ECSS\mathrm{Cap}\text{-}(k+1)\text{-}\mathrm{ECSS} problem where safe edges have capacity k+1k+1 and unsafe edges have capacity one; (k,1)-FGC(k,1)\text{-}\mathrm{FGC} corresponds to the Cap-(k(k+1))-ECSS\mathrm{Cap}\text{-}(k(k+1))\text{-}\mathrm{ECSS} problem where safe edges have capacity k+1k+1 and unsafe edges have capacity kk. We mention that there exist values of pp and qq (e.g., p=2,q=2p=2,q=2) such that the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} problem differs from the Cap-(p(p+q))-ECSS\mathrm{Cap}\text{-}(p(p+q))\text{-}\mathrm{ECSS} problem where safe edges have capacity p+qp+q and unsafe edges have capacity pp.

Our contributions:

We list our main contributions and give a brief overview of our results and techniques.

Our first result is based on a simple reduction from FGC\mathrm{FGC} to the well-known minimum-cost rooted 22-arborescence problem that achieves an approximation factor of two for FGC\mathrm{FGC}. This result matches the current best approximation factor known for the minimum-cost 2-ECSS2\text{-}\mathrm{ECSS} problem, and improves on the 2.5272.527-approximation algorithm of [2]. At a high level, our result is based on an extension of the 22-approximation algorithm of Khuller and Vishkin [12] for the minimum-cost 2-ECSS2\text{-}\mathrm{ECSS} problem. (In fact, Khuller and Vishkin [12] give a reduction from the minimum-cost k-ECSSk\text{-}\mathrm{ECSS} problem to the problem of computing a minimum-cost rooted kk-arborescence in a digraph, and they prove an approximation factor of two for the former problem.)

Theorem 1.1.

There is a 22-approximation algorithm for FGC\mathrm{FGC}.

The following result generalizes Theorem 1.1 to the (1,k)-FGC(1,k)\text{-}\mathrm{FGC} problem. Our proof of the generalization of Theorem 1.1 is based on a reduction from (1,k)-FGC(1,k)\text{-}\mathrm{FGC} to the minimum-cost rooted (k+1)(k+1)-arborescence problem (see [16], Chapters 52 and 53). We lose a factor of k+1k+1 in this reduction.

Theorem 1.2.

There is a (k+1)(k+1)-approximation algorithm for (1,k)-FGC(1,k)\text{-}\mathrm{FGC}.

In Section 3, we consider the Capacitated kk-Connected Subgraph problem that we denote by Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS}. For notational convenience, let umax:=max{ue:eE}{u}_{\mathrm{max}}:=\max\{u_{e}:e\in E\} denote the maximum capacity of an edge in the given instance of Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS}; similarly, let umin:=min{ue:eE}{{u}_{\mathrm{min}}}:=\min\{u_{e}:e\in E\}. Our main result in Section 3 is a min(k,2umax)\min(k,2{u}_{\mathrm{max}})-approximation algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem, stated in Theorem 1.3. Similar to Theorems 1.1 and 1.2, our proof of Theorem 1.3 is based on a reduction from the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem to the minimum-cost rooted kk-arborescence problem. The factor mm in the min(2k,m)\min(2k,m) approximation factor of Goemans et al. comes from the fact that a simple greedy strategy yields an mm-approximation for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem. Assuming min(k,2umax)m\min(k,2{u}_{\mathrm{max}})\leq m, our result is better, and, in fact, for the standard case of umin=1,umax=km{{u}_{\mathrm{min}}}=1,\;{u}_{\mathrm{max}}=k\ll{m}, no previous result achieves an approximation factor of kk (to the best of our knowledge). Our result above is incomparable to the result in [3]; our approximation factor is independent of the graph size, whereas their result is independent of kk. The algorithm in [3] is probabilistic and its analysis is based on Chernoff tail bounds.

Theorem 1.3.

There is a min(k,2umax)\min(k,2{u}_{\mathrm{max}})-approximation algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem.

In Section 4, we present a 4-approximation algorithm for the (k,1)-FGC(k,1)\text{-}\mathrm{FGC} problem, see Theorem 1.4. Our algorithm in Theorem 1.4 runs in two stages. In the first stage we pretend that all edges are safe. Under this assumption, (k,1)-FGC(k,1)\text{-}\mathrm{FGC} simplifies to the minimum-cost k-ECSSk\text{-}\mathrm{ECSS} problem, for which several 22-approximation algorithms are known, see [12], [10]. We apply one of these algorithms. Let H=(V,F)H=(V,F) be the k-ECSSk\text{-}\mathrm{ECSS} found in Stage 1. In the second stage, our goal is to preserve kk-edge connectivity against the failure of any one unsafe edge. In the graph HH, consider a cut δH(S)\delta_{H}(S), SV\emptyset\neq{S}\subsetneq{V}, that has (exactly) kk edges and that contains at least one unsafe edge. Such a cut, that we call deficient, certifies that FF is not feasible for (k,1)-FGC(k,1)\text{-}\mathrm{FGC}, so it needs to be augmented. The residual problem is that of finding a cheapest augmentation of all deficient cuts w.r.t. (with respect to) FF. It turns out that this augmentation problem can be formulated as the minimum-cost ff-connectivity problem for an uncrossable function ff (to be defined in Section 4). Williamson, Goemans, Mihail and Vazirani [20] present a 22-approximation algorithm for the latter problem.

Theorem 1.4.

There is a 44-approximation algorithm for (k,1)-FGC(k,1)\text{-}\mathrm{FGC}.

In Section 5, we present an O(qlogn)O(q\log{n})-approximation algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}. As above, our approximation algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC} runs in two stages. In the first stage, we construct an instance of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem (that partially models the given (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance), and then we apply our approximation algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem (see Theorem 1.3) to compute a cheap edge-set FF that is nearly feasible for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance. We call a cut δG(S)\delta_{G}(S), SV\emptyset\neq S\subsetneq{V}, deficient (w.r.t. FF) if |FδG(S)𝒮|<p|F\cap\delta_{G}(S)\cap\mathscr{S}|<p and |FδG(S)|<p+q|F\cap\delta_{G}(S)|<p+q; thus, a deficient cut is one that certifies the infeasibility of FF. The second stage of our algorithm applies several iterations. In the first iteration, we find all the deficient cuts of our current subgraph H=(V,F)H=(V,F), and then we apply the greedy algorithm for the (well-known) hitting-set problem to cover all the deficient cuts. We repeat such iterations until our current subgraph is a feasible solution of the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance (i.e., there are no deficient cuts).

Theorem 1.5.

There is an O(qlogn)O(q\log{n})-approximation algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}.

In Section 6, we consider the unweighted version of FGC\mathrm{FGC}, where each edge has unit cost. We design an improved approximation algorithm for this special case. We give two algorithms for obtaining two candidate solutions to an instance of unweighted FGC\mathrm{FGC}; the simpler of these algorithms is discussed by Adjiashvili et al. [1, 2]. Assuming that we have access to an α\alpha-approximation algorithm for the minimum-size (i.e., unweighted) 2-ECSS2\text{-}\mathrm{ECSS} problem, we argue that the cheaper of the two candidate solutions is a 4α2α+1\frac{4\alpha}{2\alpha+1}-approximate solution to the instance of unweighted FGC\mathrm{FGC}. We use a result of Sebö & Vygen [17], and we fix α=4/3\alpha=4/3.

Theorem 1.6.

There is a 1611\frac{16}{11}-approximation algorithm for unweighted FGC\mathrm{FGC}.

Section 2 focuses on (1,k)-FGC(1,k)\text{-}\mathrm{FGC} and gives our (k+1)(k+1)-approximation for this problem (Theorem 1.2); the 22-approximation for FGC\mathrm{FGC} (Theorem 1.1) follows as a special case. Section 3 focuses on the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem, and gives our min(k,2umax)\min(k,2{u}_{\mathrm{max}})-approximation algorithm for this problem (Theorem 1.3). Section 4 focuses on (k,1)-FGC(k,1)\text{-}\mathrm{FGC}, and gives our 44-approximation algorithm for this problem (Theorem 1.4). Section 5 focuses on (p,q)-FGC(p,q)\text{-}\mathrm{FGC}, and gives our O(qlogn)O(q\log{n})-approximation algorithm for this problem (Theorem 1.5). Section 6 focuses on the unweighted version of FGC\mathrm{FGC}, and gives our 1611\frac{16}{11}-approximation algorithm for this problem (Theorem 1.6). This section also has an improved approximation factor for the unweighted version of (k,1)-FGC(k,1)\text{-}\mathrm{FGC}.

2. A (k+1)(k+1)-Approximation Algorithm for (1,k)-FGC(1,k)\text{-}\mathrm{FGC}

We give a (k+1)(k+1)-approximation for (1,k)-FGC(1,k)\text{-}\mathrm{FGC}, where kk is a positive integer. The 22-approximation for FGC\mathrm{FGC} (Theorem 1.1) follows as a special case. Recall that in an instance of (1,k)-FGC(1,k)\text{-}\mathrm{FGC} we have an undirected graph G=(V,E)G=(V,E) (with no self loops), a partition of EE into safe and unsafe edges, E=𝒮˙𝒰E=\mathscr{S}\,\dot{\cup}\,\mathscr{U}, and nonnegative edge-costs c:E0c:E\to\mathbb{R}_{\geq 0}. Our objective is to find a minimum-cost edge-set FEF\subseteq E such that the subgraph (V,F)(V,F) remains connected against the failure of any set of kk unsafe edges.

For a subgraph HH of GG and a vertex-set SVS\subseteq{V}, we use δH(S)\delta_{H}(S) or δE(H)(S)\delta_{E(H)}(S) to denote the set of edges in HH with exactly one end-vertex in SS, i.e., δH(S):={e=uvE(H):|{u,v}S|=1}\delta_{H}(S):=\{e=uv\in E(H):|\{u,v\}\cap S|=1\}. We drop the subscript when the underlying graph is clear from the context.

The following characterization of feasible solutions of (1,k)-FGC(1,k)\text{-}\mathrm{FGC} is straightforward.

Proposition 2.1.

An edge-set FEF\subseteq E is feasible for (1,k)-FGC(1,k)\text{-}\mathrm{FGC} if and only if for all nonempty SVS\subsetneq V, the edge-set Fδ(S)F\cap\delta(S) contains a safe edge or k+1k+1 unsafe edges. Furthermore, in time polynomial in nn, we can test if FF is feasible for (1,k)-FGC(1,k)\text{-}\mathrm{FGC}.

We check the feasibility of FF for (1,k)-FGC(1,k)\text{-}\mathrm{FGC} by creating an auxiliary capacitated graph that has a capacity of k+1k+1 for each safe edge and a capacity of one for each unsafe edge; then, we test whether or not the minimum capacity of a cut of the auxiliary graph is at least k+1k+1. For the rest of this section, we assume that the given instance of (1,k)-FGC(1,k)\text{-}\mathrm{FGC} is feasible.

As mentioned before, our algorithm for (1,k)-FGC(1,k)\text{-}\mathrm{FGC} is based on a reduction to the minimum-cost rooted (k+1)(k+1)-arborescence problem. We state a few standard results on arborescences. Let D=(W,A)D=(W,A) be a digraph and let c:A0c^{\prime}:A\to\mathbb{R}_{\geq 0} be nonnegative costs on the arcs. We remark that DD may have parallel arcs but it has no self-loops. Let rWr\in W be a designated root vertex. For a subgraph HH of DD and a nonempty vertex-set SWS\subsetneq W, we use δHin(S)\delta^{\mathrm{in}}_{H}(S) to denote the set of arcs in HH such that the head of the arc is in SS and the tail of the arc is in WSW\setminus S, i.e., δHin(S):={a=(u,v)A(H):uS,vS}\delta^{\mathrm{in}}_{H}(S):=\{a=(u,v)\in A(H):u\notin S,v\in S\}.

Definition 2.1 (rr-rooted arborescence).

An rr-rooted arborescence (W,T)(W,T) is a subgraph of DD satisfying: (i) the undirected version of TT is acyclic; and (ii) for every vW{r}v\in W\setminus\{r\}, there is a directed path from rr to vv in the subgraph (W,T)(W,T).

In other words, an rr-rooted arborescence is a directed spanning tree such that vertex rr has no incoming arcs and every other vertex has one incoming arc. An rr-rooted kk-arborescence is a union of kk arc-disjoint rr-rooted arborescences.

Definition 2.2 (rr-rooted kk-arborescence).

For a positive integer kk, a subgraph (W,T)(W,T) is an rr-rooted kk-arborescence if TT can be partitioned into kk arc-disjoint rr-rooted arborescences.

The following results on rooted arborescences and the corresponding optimization problem are useful for us.

Proposition 2.2 ([16], Chapter 53.8).

Let D=(W,A)D=(W,A) be a digraph, let rWr\in W be a vertex, and let kk be a positive integer. Then, DD contains an rr-rooted kk-arborescence if and only if |δDin(S)|k|\delta^{\mathrm{in}}_{D}(S)|\geq k for any nonempty vertex-set SV{r}S\subseteq V\setminus\{r\}.

Proposition 2.3 ([16], Theorem 53.10).

In strongly polynomial time, we can obtain an optimal solution to the minimum-cost rr-rooted kk-arborescence problem on (D,c)(D,\,c^{\prime}), or conclude that there is no rr-rooted kk-arborescence in DD.

Claim 2.4.

Let (W,T)(W,T) be an rr-rooted kk-arborescence for an integer k1k\geq 1. Let u,vWu,v\in W be two distinct vertices. Then, the number of arcs in TT that have one end-vertex at uu and the other end-vertex at vv (counting multiplicities) is at most kk.

Proof.

Since an rr-rooted kk-arborescence is a union of kk arc-disjoint rr-rooted 11-arborescences, it suffices to prove the result for k=1k=1. The claim holds for k=1k=1 because the undirected version of TT is acyclic, by definition. ∎

Informally speaking, our proofs map undirected graphs to their directed counterparts by bidirecting edges. We formalize this notion.

Definition 2.3 (Bidirected pair).

For an undirected edge e=uve=uv, we call the arc-set {(u,v),(v,u)}\{(u,v),(v,u)\} a bidirected pair arising from ee.

The following lemma shows how a solution FF to (1,k)-FGC(1,k)\text{-}\mathrm{FGC} can be used to obtain a rooted (k+1)(k+1)-arborescence (in an appropriate digraph) of cost at most (k+1)(k+1) times c(F)c(F).

Lemma 2.5.

Let FF be a (1,k)-FGC(1,k)\text{-}\mathrm{FGC} solution. Consider the digraph D=(V,A)D=(V,A) where the arc-set AA is defined as follows: for each unsafe edge eF𝒰e\in F\cap\mathscr{U}, we include a bidirected pair of arcs arising from ee, and for each safe edge eF𝒮e\in F\cap\mathscr{S}, we include k+1k+1 bidirected pairs arising from ee. Consider the natural extension of the cost vector cc to DD where the cost of an arc (u,v)A(u,v)\in A is equal to the cost of the edge in GG that gives rise to it. Then, there is an rr-rooted (k+1)(k+1)-arborescence in DD with cost at most (k+1)c(F)(k+1)c(F).

Proof.

Let (V,T)(V,T) be a minimum-cost rr-rooted (k+1)(k+1)-arborescence in DD. First, we argue that TT is well-defined. By Proposition 2.2, it suffices to show that for any nonempty SV{r}S\subseteq V\setminus\{r\}, we have |δDin(S)|k+1|\delta^{\mathrm{in}}_{D}(S)|\geq k+1. Fix some nonempty SV{r}S\subseteq V\setminus\{r\}. By feasibility of FF, Fδ(S)F\cap\delta(S) contains a safe edge or k+1k+1 unsafe edges (see Proposition 2.1). If Fδ(S)F\cap\delta(S) contains a safe edge e=uve=uv with vSv\in S, then by our choice of AA, δDin(S)\delta^{\mathrm{in}}_{D}(S) contains k+1k+1 (u,v)(u,v)-arcs. Otherwise, Fδ(S)F\cap\delta(S) contains k+1k+1 unsafe edges, and for each such unsafe edge uvuv with vSv\in S, δDin(S)\delta^{\mathrm{in}}_{D}(S) contains the arc (u,v)(u,v). In both cases we have |δDin(S)|k+1|\delta^{\mathrm{in}}_{D}(S)|\geq k+1, so TT is well-defined.

We use Claim 2.4 to show that TT satisfies the required bound on the cost. For each unsafe edge eFe\in F, TT contains at most 22 arcs from the bidirected pair arising from ee, and for each safe edge eFe\in F, TT contains at most k+1k+1 arcs from the (disjoint) union of k+1k+1 bidirected pairs arising from ee. Thus, c(T)2c(F𝒰)+(k+1)c(F𝒮)(k+1)c(F)c(T)\leq 2\,c(F\cap\mathscr{U})+(k+1)\,c(F\cap\mathscr{S})\leq(k+1)\,c(F). ∎

Lemma 2.5 naturally suggests a reduction from (1,k)-FGC(1,k)\text{-}\mathrm{FGC} to the minimum-cost rr-rooted (k+1)(k+1)-arborescence problem. We prove the main theorem of this section.

Proof of Theorem 1.2.

Fix some vertex rVr\in V as the root vertex. Consider the digraph D=(V,A)D=(V,A) obtained from GG as follows: for each unsafe edge e𝒰e\in\mathscr{U}, we include a bidirected pair arising from ee, and for each safe edge e𝒮e\in\mathscr{S}, we include k+1k+1 bidirected pairs arising from ee. For each edge eEe\in E, let R(e)R(e) denote the multi-set of all arcs in DD that arise from eEe\in E. For any edge eEe\in E (that could be one of the copies of a multiedge) and each of the corresponding arcs eR(e)\vec{e}\in R(e), we define ce:=cec_{\vec{e}}:=c_{e}. Let (V,T)(V,T) denote a minimum-cost rr-rooted (k+1)(k+1)-arborescence in (D,c)(D,\,c). By Lemma 2.5, c(T)(k+1)c(F)c(T)\leq(k+1)c(F^{*}), where FF^{*} denotes an optimal solution to the given instance of (1,k)-FGC(1,k)\text{-}\mathrm{FGC}.

We finish the proof by arguing that TT induces a (1,k)-FGC(1,k)\text{-}\mathrm{FGC} solution FF with cost at most c(T)c(T). Let F:={eE:R(e)T}F:=\{e\in E:R(e)\cap T\neq\emptyset\}. By definition of FF and our choice of arc-costs in DD, we have c(F)c(T)c(F)\leq c(T). It remains to show that FF is feasible for (1,k)-FGC(1,k)\text{-}\mathrm{FGC}. Consider a nonempty set SV{r}S\subseteq V\setminus\{r\}. Since TT is an rr-rooted (k+1)(k+1)-arborescence, by Proposition 2.2 we have |δTin(S)|k+1|\delta^{\mathrm{in}}_{T}(S)|\geq k+1. If δTin(S)\delta^{\mathrm{in}}_{T}(S) contains a safe arc (i.e., an arc that arises from a safe edge), then that safe edge belongs to Fδ(S)F\cap\delta(S). Otherwise, δTin(S)\delta^{\mathrm{in}}_{T}(S) contains some k+1k+1 unsafe arcs (that arise from unsafe edges). Since both orientations of an edge cannot appear in δDin(S)\delta^{\mathrm{in}}_{D}(S), we get that |F𝒰δ(S)|k+1|F\cap\mathscr{U}\cap\delta(S)|\geq k+1. By Proposition 2.1, FF is a feasible solution for the given instance of (1,k)-FGC(1,k)\text{-}\mathrm{FGC} with c(F)(k+1)OPTc(F)\leq(k+1)\cdot\textsc{OPT}, where OPT denotes the optimal value of the instance. ∎

3. The Capacitated kk-Connected Subgraph Problem

In this section we consider the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem. We are given a graph G=(V,E)G=(V,E), nonnegative integer edge-capacities u:E0u:E\to\mathbb{Z}_{\geq 0}, nonnegative edge-costs c:E0c:E\to\mathbb{R}_{\geq 0}, and a positive integer kk. Our goal is to find a spanning subgraph H=(V,F)H=(V,F) such that for all nonempty sets RVR\subsetneq V we have u(δF(R))ku(\delta_{F}(R))\geq k, and the cost c(F)c(F) is minimized.

Given an instance of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem, we may assume without loss of generality that ue{1,,k}u_{e}\in\{1,\dots,k\} for all eEe\in E (we can drop edges with zero capacity and replace edge-capacities k+1\geq{k+1} by kk). We also assume that the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance is feasible. This can be verified in polynomial time by checking if GG has any cut δ(S)\delta(S), SV\emptyset\neq{S}\subsetneq{V}, with capacity u(δ(S))u(\delta(S)) less than kk. Let umax=maxeEue{u}_{\mathrm{max}}=\max_{e\in E}u_{e} denote the maximum capacity of an edge in GG. Our main result in this section is a min(k,2umax)\min(k,2{u}_{\mathrm{max}})-approximation algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem (Theorem 1.3); our algorithm is based on a reduction to the minimum-cost rooted kk-arborescence problem.

Description of our algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem:

Let D=(V,A)D=(V,A) be the directed graph obtained from GG by replacing every edge xyExy\in E by uxyu_{xy} pairs of bidirected arcs (x,y),(y,x)(x,y),(y,x), each with the same cost as the edge xyxy; thus, each edge ee in GG has 2ue2u_{e} corresponding arcs in DD, each of cost cec_{e}. Designate an arbitrary vertex rVr\in V as the root. By feasibility of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance, we know that DD contains an rr-rooted kk-arborescence (see Proposition 2.2). We use Proposition 2.3 on (D,c)(D,c) to obtain a minimum-cost rr-rooted kk-arborescence (V,T)(V,T^{\prime}) in polynomial time. Let FF^{\prime} be the set of all edges eEe\in E such that at least one of the 2ue2u_{e} corresponding arcs in DD appears in TT^{\prime}.

Lemma 3.1.

The edge-set FF^{\prime} obtained by the above algorithm is feasible for the given Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance and it has cost at most c(T)c(T^{\prime}).

Proof.

Let RV{r}R\subsetneq V\setminus\{r\} be a nonempty vertex-set that excludes the root vertex rr. Since (V,T)(V,T^{\prime}) contains kk arc-disjoint rr-rooted arborescences, |δTin(R)|k|\delta^{\mathrm{in}}_{T^{\prime}}(R)|\geq k (by Proposition 2.2). For each edge eEe\in E, at most ueu_{e} of the corresponding arcs in DD can occur in the arc-set δTin(R)\delta^{\mathrm{in}}_{T^{\prime}}(R), by the construction of DD; hence, for any edge eδ(R)Fe\in\delta(R)\cap F^{\prime}, ueu_{e} is an upper bound on the number of corresponding arcs of ee in δTin(R)\delta^{\mathrm{in}}_{T^{\prime}}(R). Therefore, eδ(R)Fue|δTin(R)|k\sum_{e\in\delta(R)\cap F^{\prime}}u_{e}\geq|\delta^{\mathrm{in}}_{T^{\prime}}(R)|\geq k, and FF^{\prime} is a feasible solution for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance, as required. For any edge eEe\in E, we only include a single copy of ee in FF^{\prime} whenever any of the 2ue2u_{e} corresponding arcs appear in TT^{\prime}, so we have c(F)c(T)c(F^{\prime})\leq c(T^{\prime}). ∎

We now prove Theorem 1.3 by showing that the edge-set FF^{\prime} found by the algorithm has cost min(k,2umax)OPT\leq\min(k,2{u}_{\mathrm{max}})\cdot\textsc{OPT}, where OPT denotes the optimal value of the instance.

Proof of Theorem 1.3.

Let (G(V,E),u,c,k)(G(V,E),u,c,k) denote a feasible instance of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem. Let rVr\in V be the root vertex fixed by the algorithm. Let D=(V,A)D=(V,A) be the digraph and let (V,T)(V,T^{\prime}) be the rr-rooted kk-arborescence constructed by our algorithm. Let FF^{*} be an optimal solution to the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance, and let D=(V,A)D^{*}=(V,A^{*}) be the digraph obtained from (V,F)(V,F^{*}) by replacing every edge xyFxy\in F^{*} by uxyu_{xy} pairs of bidirected arcs (x,y),(y,x)(x,y),(y,x) each with the same cost as edge xyxy. By feasibility of FF^{*} (for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance), DD^{*} contains an rr-rooted kk-arborescence. Let (V,T)(V,T^{*}) denote an optimal rr-rooted kk-arborescence in DD^{*}. Since DD^{*} is a subgraph of DD and (V,T)(V,T^{\prime}) is an optimal rr-rooted kk-arborescence in DD, we have c(T)c(T)c(T^{\prime})\leq c(T^{*}). By Lemma 3.1, c(F)c(T)c(F^{\prime})\leq c(T^{\prime}), so to prove the theorem it suffices to argue that c(T)min(k, 2umax)c(F)c(T^{*})\leq\min(k,\,2{u}_{\mathrm{max}})c(F^{*}). To this end, observe that for any edge eFe\in F^{*} there are at most 2ue2u_{e} corresponding arcs in AA^{*} by construction of DD^{*}. Hence, we have c(T)c(A)2umaxc(F)c(T^{*})\leq c(A^{*})\leq 2{u}_{\mathrm{max}}c(F^{*}). Next, by definition, TT^{*} can be partitioned into kk (arc-disjoint) rr-rooted arborescences, each of which can use at most one of the 2ue2u_{e} corresponding arcs of an edge ee of GG; see Claim 2.4. It follows that for each edge eFe\in F^{*} at most kk of the 2ue2u_{e} corresponding arcs can appear in TT^{*}. Hence, c(T)kc(F)c(T^{*})\leq k\,c(F^{*}). This completes the proof. ∎

4. A 44-Approximation Algorithm for (k,1)-FGC(k,1)\text{-}\mathrm{FGC}

Our main result in this section is a 44-approximation algorithm for (k,1)-FGC(k,1)\text{-}\mathrm{FGC} (Theorem 1.4). Recall that in an instance of (k,1)-FGC(k,1)\text{-}\mathrm{FGC}, we have a graph G=(V,E)G=(V,E), with a partition of the edge-set into safe and unsafe edges, E=𝒮𝒰E=\mathscr{S}\cup\mathscr{U}, nonnegative edge-costs c:E0c:E\to\mathbb{R}_{\geq 0}, and a positive integer kk. The objective is to find a minimum-cost subgraph that remains kk-edge connected against the failure of any one unsafe edge. We remark that for the k=1k=1 case, Theorem 1.1 yields a better approximation factor than Theorem 1.4. Let FF^{*} denote an optimal solution to the (k,1)-FGC(k,1)\text{-}\mathrm{FGC} instance. The following result pertains to feasible solutions of (k,1)-FGC(k,1)\text{-}\mathrm{FGC}.

Proposition 4.1.

An edge-set FEF\subseteq E is feasible for (k,1)-FGC(k,1)\text{-}\mathrm{FGC} if and only if for all nonempty SVS\subsetneq V, the edge-set Fδ(S)F\cap\delta(S) contains kk safe edges or k+1k+1 edges. Furthermore, in time polynomial in nn, we can test if FF is feasible for (k,1)-FGC(k,1)\text{-}\mathrm{FGC}.

Proof.

The characterization of feasible solutions of (k,1)-FGC(k,1)\text{-}\mathrm{FGC} follows from the definitions.

We check the feasibility of FF for (k,1)-FGC(k,1)\text{-}\mathrm{FGC} by creating an auxiliary capacitated graph that has a capacity of k+1k+1 for each safe edge and a capacity of kk for each unsafe edge; then, we test whether or not the minimum capacity of a cut of the auxiliary graph is at least k(k+1)k(k+1). ∎

For the rest of this section, we assume that the given instance of (k,1)-FGC(k,1)\text{-}\mathrm{FGC} is feasible.

Proposition 4.1 suggests a two-stage strategy for finding an approximately optimal solution to (k,1)-FGC(k,1)\text{-}\mathrm{FGC}. In the first stage, we do not distinguish between safe edges and unsafe edges, and we compute a cheap k-ECSSk\text{-}\mathrm{ECSS} of G=(V,E)G=(V,E) that we denote by H1=(V,F1)H_{1}=(V,F_{1}). Clearly, for every nonempty set SVS\subsetneq V, we have |δH1(S)|k|\delta_{H_{1}}(S)|\geq{k}; if equality holds, then we call δH1(S)\delta_{H_{1}}(S) a kk-edge-cut. If F1F_{1} is feasible for (k,1)-FGC(k,1)\text{-}\mathrm{FGC}, then we are done. Otherwise, by Proposition 4.1, the infeasibility of F1F_{1} for (k,1)-FGC(k,1)\text{-}\mathrm{FGC} is due to kk-edge-cuts of H1H_{1} that contain at least one unsafe edge. We call such cuts deficient. In the second stage, we address the remaining augmentation problem for the deficient cuts, by casting it as a special case of the minimum-cost ff-connectivity problem (defined below).

An instance of the minimum-cost ff-connectivity problem consists of an undirected graph G=(V,E)G^{\prime}=(V^{\prime},E^{\prime}), nonnegative edge-costs c:E0c^{\prime}:E^{\prime}\to\mathbb{R}_{\geq 0}, and a requirement function f:2V{0,1}f:2^{V^{\prime}}\to\{0,1\} satisfying f()=f(V)=0f(\emptyset)=f(V)=0. We assume access to ff via a value oracle that takes as input a vertex-set SVS\subseteq V and outputs f(S)f(S). An edge-set FEF\subseteq E^{\prime} is feasible if |FδG(S)|f(S)|F\cap\delta_{G^{\prime}}(S)|\geq f(S) for every SVS\subseteq V^{\prime}. In other words, FF is feasible if and only if for every vertex-set SS with f(S)=1f(S)=1 there is at least one FF-edge in the cut δ(S)\delta(S). The objective is to find a feasible FEF\subseteq E^{\prime} that minimizes c(F)c^{\prime}(F). The minimum-cost ff-connectivity problem can be formulated as an integer program whose linear relaxation (P) is stated below. For each edge eEe\in E^{\prime}, the LP (linear program) has a nonnegative variable xex_{e}; informally speaking, xex_{e} quantifies the “usage” of the edge ee in a feasible solution to the LP.

(P) min\displaystyle\quad\min eEcexe\displaystyle\,\sum_{e\in E^{\prime}}c^{\prime}_{e}x_{e}
subject to x(δG(S))f(S)\displaystyle\,x(\delta_{G^{\prime}}(S))\geq f(S) SV\displaystyle\forall\,S\subseteq V^{\prime}
xe0\displaystyle\,x_{e}\geq 0 eE.\displaystyle\forall\,e\in E^{\prime}.

The minimum-cost ff-connectivity problem has received attention since it captures many well-known problems in network design. In particular, it captures the generalized Steiner network problem. Williamson et al. [20] gave a primal-dual framework to obtain approximation algorithms for the minimum-cost ff-connectivity problem when ff is a proper function, and more generally, when ff is an uncrossable function (also see the book chapter by Goemans and Williamson [9]).

Definition 4.1 (Uncrossable function).

A function f:2V{0,1}f:2^{V^{\prime}}\to\{0,1\} is called uncrossable if f(V)=0f(V^{\prime})=0 and ff satisfies the following two conditions:

  1. (i)

    ff is symmetric, i.e., f(S)=f(VS)f(S)=f(V^{\prime}\setminus S) for all SVS\subseteq V^{\prime};

  2. (ii)

    for any two sets A,BVA,B\subseteq V^{\prime} with f(A)=f(B)=1f(A)=f(B)=1, either f(AB)=f(AB)=1f(A\cap B)=f(A\cup B)=1 or f(AB)=f(BA)=1f(A\setminus B)=f(B\setminus A)=1 holds.

Under the assumption that minimal violated sets can be computed efficiently throughout, the primal-dual algorithm of [20] gives a 22-approximation for the minimum-cost ff-connectivity problem with an uncrossable function ff. There is no explicit result in [20] that can be quoted verbatim and applied for our purposes, so we state the most relevant result from [20].

Definition 4.2 (Minimal violated sets).

Let f:2V{0,1}f:2^{V^{\prime}}\to\{0,1\} be a requirement function and FEF\subseteq E^{\prime} be an edge-set. A vertex-set SVS\subseteq V^{\prime} is said to be violated, w.r.t. ff and FF, if f(S)=1f(S)=1 and FδG(S)=F\cap\delta_{G^{\prime}}(S)=\emptyset. We say that SS is a minimal violated set if none of the proper subsets of SS is violated.

Proposition 4.2 ([20], Lemma 2.1).

Let (G,c,f)(G^{\prime},\,c^{\prime},\,f) be an instance of the minimum-cost ff-connectivity problem, where f:2V{0,1}f:2^{V^{\prime}}\to\{0,1\} is an uncrossable function that is given via a value oracle. Suppose that for any FEF\subseteq E^{\prime} we can compute all minimal violated sets (w.r.t. ff and FF) in polynomial time. Then, in polynomial time, we can compute a feasible solution FEF\subseteq E^{\prime} such that c(F)2zc^{\prime}(F)\leq{2\,z^{*}}, where zz^{*} denotes the optimal value of the LP relaxation (P).

We now describe a two-stage algorithm that produces a 44-approximate (k,1)-FGC(k,1)\text{-}\mathrm{FGC} solution in polynomial time, thereby proving Theorem 1.4.

Description of our 44-approximation algorithm for (k,1)-FGC(k,1)\text{-}\mathrm{FGC}:

Our algorithm runs in two stages. In the first stage, we construct an instance of the minimum-cost k-ECSSk\text{-}\mathrm{ECSS} problem from the instance of (k,1)-FGC(k,1)\text{-}\mathrm{FGC}, by ignoring the distinction between the safe edges and the unsafe edges of GG; the resulting instance is feasible because (V,F)(V,F^{*}) is kk-edge connected. Then, we compute a k-ECSSk\text{-}\mathrm{ECSS} H1=(V,F1)H_{1}=(V,F_{1}) of GG by applying a 2-approximation algorithm to the instance of the minimum-cost k-ECSSk\text{-}\mathrm{ECSS} problem; either the algorithm of Khuller & Vishkin [12] or the algorithm of Jain [10] could be used. Clearly, c(F1)2c(F)c(F_{1})\leq{2\,c(F^{*})}. Next, we compute the collection 𝒞:={SV:|δ(S)F1|=k}\mathcal{C}:=\{S\subseteq V:|\delta(S)\cap F_{1}|=k\} of all vertex-sets that correspond to kk-edge-cuts of H1H_{1}. Consider the requirement function f:2V{0,1}f:2^{V}\to\{0,1\} where

(4:1) f(S)=1 if and only if S𝒞 and F1δ(S)𝒰.f(S)=1\text{ if and only if }S\in\mathcal{C}\text{ and }F_{1}\cap\delta(S)\cap\mathscr{U}\neq\emptyset.

Consider an instance of the minimum-cost ff-connectivity problem for the graph G:=GF1G^{\prime}:=G-F_{1} with nonnegative edge-costs c:(EF1)0c:(E\setminus F_{1})\to\mathbb{R}_{\geq 0}; note that FF1F^{*}\setminus F_{1} is feasible for this instance. In the second stage, we use Proposition 4.2 to compute a feasible solution F2EF1F_{2}\subseteq E\setminus F_{1} for this instance such that c(F2)2c(FF1)c(F_{2})\leq 2\,c(F^{*}\setminus F_{1}). We return the solution F=F1˙F2F=F_{1}\,\dot{\cup}\,F_{2}.

We prove Theorem 1.4 via a sequence of lemmas and claims. Lemma 4.3 below shows that ff is uncrossable, and Claim 4.4 below shows that we can compute minimal violated sets (w.r.t. ff and any FEF1F^{\prime}\subseteq E\setminus F_{1}) in polynomial time. These two results together with Proposition 4.2 imply that our algorithm runs in polynomial time. Lemma 4.5 shows the correctness of our algorithm, and proves the approximation factor of four.

Lemma 4.3.

ff is uncrossable.

Proof.

We check that the two properties (i), (ii) of an uncrossable function hold for ff (recall Definition 4.1). The symmetry of ff follows from the symmetry of cuts in undirected graphs. To check the second property, consider nonempty A,BVA,B\subsetneq V satisfying f(A)=f(B)=1f(A)=f(B)=1. By definition of ff, see (4:1), in the subgraph H1=(V,F1)H_{1}=(V,F_{1}), both δF1(A)\delta_{F_{1}}(A) and δF1(B)\delta_{F_{1}}(B) are (minimum) kk-edge-cuts, and there is at least one unsafe edge in each of these cuts. Let e1e_{1} be an unsafe edge in δH1(A)\delta_{H_{1}}(A) and let e2e_{2} be an unsafe edge in δH1(B)\delta_{H_{1}}(B). Let rVr\in V be an arbitrary vertex. By symmetry of the cut function, we may assume without loss of generality that rABr\notin A\cup B. If AB=A\cap B=\emptyset, then f(AB)=f(BA)=1f(A\setminus B)=f(B\setminus A)=1, so we are done. If ABA\subseteq B or ABA\supseteq B, then f(AB)=f(AB)=1f(A\cap B)=f(A\cup B)=1, so we are done. Thus, we may assume that AB,V(AB),AB,BAA\cap B,V\setminus(A\cup B),A\setminus B,B\setminus A are all nonempty. For S,TVS,T\subseteq{V}, let E(S,T)E(S,T) denote the set of edges of GG with exactly one end-vertex in SS and exactly one end-vertex in TT. By submodularity of the function d(S):=|δH1(S)|d(S):=|\delta_{H_{1}}(S)|, see [16], we have:

(4:2) |δH1(AB)|=|δH1(AB)|=|δH1(AB)|=|δH1(BA)|=k.|\delta_{H_{1}}(A\cap B)|=|\delta_{H_{1}}(A\cup B)|=|\delta_{H_{1}}(A\setminus B)|=|\delta_{H_{1}}(B\setminus A)|=k.

Furthermore, we also have:

(4:3) F1E(AB,BA)= and F1E(AB,V(AB))=.F_{1}\cap E(A\setminus B,B\setminus A)=\emptyset\quad\text{ and }\quad F_{1}\cap E(A\cap B,V\setminus(A\cup B))=\emptyset.

We finish the proof by a case analysis on e1e_{1} and e2e_{2}. By (4:3), exactly one of the following cases occurs: (i) e1E(AB,V(AB))e_{1}\in E(A\setminus B,V\setminus(A\cup B)); or (ii) e1E(AB,BA)e_{1}\in E(A\cap B,B\setminus A). If (i) occurs, then f(AB)=f(AB)=1f(A\setminus B)=f(A\cup B)=1. Otherwise, (ii) occurs and f(AB)=f(BA)=1f(A\cap B)=f(B\setminus A)=1. We apply a similar analysis for e2e_{2}. Exactly one of the following occurs: (a) e2E(BA,V(AB))e_{2}\in E(B\setminus A,V\setminus(A\cup B)); or (b) e2E(AB,AB)e_{2}\in E(A\cap B,A\setminus B). If (a) occurs, then f(BA)=f(AB)=1f(B\setminus A)=f(A\cup B)=1. Otherwise, (b) occurs and f(AB)=f(AB)=1f(A\cap B)=f(A\setminus B)=1. It is easy to verify that for each of the four combinations, we either have f(AB)=f(AB)=1f(A\cap B)=f(A\cup B)=1 or we have f(AB)=f(BA)=1f(A\setminus B)=f(B\setminus A)=1. ∎

Claim 4.4.

For any FEF1F^{\prime}\subseteq E\setminus F_{1}, we can compute all minimal violated sets w.r.t. ff and FF^{\prime} in polynomial time.

Proof.

The number of minimum-cuts of a graph on nn vertices is (at most) O(n2)O(n^{2}), see [11], hence, we have |𝒞|=O(|V|2)|\mathcal{C}|=O(|V|^{2}). Using results on network flow algorithms, we can compute 𝒞\mathcal{C} in polynomial time, see [4], [14]. Since we have explicit access to 𝒞\mathcal{C}, we have a value oracle for ff.

Let FEF1F^{\prime}\subseteq E\setminus F_{1} be a given edge-set. By Definition 4.2, any violated set SS w.r.t. FF^{\prime} is in 𝒞\mathcal{C} and has f(S)=1f(S)=1. We can exhaustively check each of the sets in 𝒞\mathcal{C} and find each of the minimal violated sets. ∎

Lemma 4.5.

The edge-set F=F1˙F2F=F_{1}\,\dot{\cup}\,{F_{2}} is feasible for (k,1)-FGC(k,1)\text{-}\mathrm{FGC} and satisfies c(F)4c(F)c(F)\leq 4c(F^{*}).

Proof.

We first argue that FF is feasible. Since F1F_{1} and F2F_{2} are edge-disjoint, we have FEF\subseteq E. We use the characterization of feasible solutions given by Proposition 4.1. Consider an arbitrary nonempty vertex-set SVS\subsetneq V. Since H1=(V,F1)H_{1}=(V,F_{1}) is a kk-edge connected subgraph of GG, we have |F1δ(S)|k|F_{1}\cap\delta(S)|\geq k. If |F1δ(S)|k+1|F_{1}\cap\delta(S)|\geq k+1, then |Fδ(S)|k+1|F\cap\delta(S)|\geq k+1. Otherwise, δ(S)\delta(S) is a kk-edge-cut of H1H_{1}, i.e., S𝒞S\in\mathcal{C}. If F1δ(S)F_{1}\cap\delta(S) contains only safe edges, then Fδ(S)F\cap\delta(S) contains kk safe edges. Otherwise, by definition of ff, see (4:1), f(S)=1f(S)=1. Next, by feasibility of F2F_{2} for the minimum-cost ff-connectivity problem, we have F2δ(S)F_{2}\cap\delta(S)\neq\emptyset. Thus, |Fδ(S)|=|F1δ(S)|+|F2δ(S)|k+1|F\cap\delta(S)|=|F_{1}\cap\delta(S)|+|F_{2}\cap\delta(S)|\geq k+1. We show that c(F)4c(F)c(F)\leq 4\,c(F^{*}) by arguing that each of c(F1)c(F_{1}) and c(F2)c(F_{2}) is 2c(F)\leq 2\,c(F^{*}). The bound on c(F1)c(F_{1}) is immediate from the fact that FF^{*} is feasible for the instance of the minimum-cost k-ECSSk\text{-}\mathrm{ECSS} problem considered in Stage 1, and by the 2-approximation algorithm used in Stage 1. Next, by feasibility of FF1F^{*}\setminus F_{1} for the instance of the minimum-cost ff-connectivity problem, we have c(F2)2c(FF1)2c(F)c(F_{2})\leq 2c(F^{*}\setminus F_{1})\leq 2c(F^{*}). The lemma follows. ∎


Remarks: The function ff is not a proper function (see [20]), and it is not weakly-supermodular (see [10]). Any proper function g:2V{0,1}g:2^{V}\rightarrow\{0,1\} must satisfy the maximality property, that is, g(AB)max{g(A),g(B)}g(A\cup{B})\leq\max\{g(A),g(B)\} must hold for any two disjoint sets A,BVA,B\subseteq V. Suppose that k=2k=2. Consider the graph H1=(V,F1)H_{1}=(V,F_{1}) with V={v1,v2,v3}V=\{v_{1},v_{2},v_{3}\} and with four unsafe edges, namely, two copies of v1v2v_{1}v_{2}, one copy of v1v3v_{1}v_{3}, and one copy of v2v3v_{2}v_{3}. Let ff be defined by (4:1). Then we have f({v1})=0f(\{v_{1}\})=0, f({v2})=0f(\{v_{2}\})=0, and f({v1,v2})=1f(\{v_{1},v_{2}\})=1. Clearly, maximality is violated by the sets A={v1},B={v2}A=\{v_{1}\},B=\{v_{2}\}. Any weakly-supermodular function g:2Vg:2^{V}\rightarrow\mathbb{Z} must satisfy the property that the inequality g(A)+g(B)max(g(AB)+g(BA),g(AB)+g(AB))g(A)+g(B)\leq\max(g(A-B)+g(B-A),\;g(A\cap{B})+g(A\cup{B})) holds for any two sets A,BVA,B\subseteq V. Suppose that k=2k=2. Consider the graph H1=(V,F1)H_{1}=(V,F_{1}) with V={v1,v2,v3,v4}V=\{v_{1},v_{2},v_{3},v_{4}\} and with one unsafe edge, namely, v2v3v_{2}v_{3}, and five safe edges, namely, two copies of v1v2v_{1}v_{2}, two copies of v3v4v_{3}v_{4}, and one copy of v4v1v_{4}v_{1}. Let ff be defined by (4:1). Let A={v1,v2}A=\{v_{1},v_{2}\} and let B={v2,v3}B=\{v_{2},v_{3}\}. Then we have f(A)=1f(A)=1, f(B)=0f(B)=0, f(AB)=f({v1})=0f(A-B)=f(\{v_{1}\})=0, f(BA)=f({v3})=0f(B-A)=f(\{v_{3}\})=0, f(AB)=f({v2})=0f(A\cap{B})=f(\{v_{2}\})=0, and f(AB)=f({v1,v2,v3})=0f(A\cup{B})=f(\{v_{1},v_{2},v_{3}\})=0. Clearly, the required inequality fails to hold for the sets A,BA,B.

5. An O(qlogn)O(q\log{n})-Approximation Algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}

In this section, we present an O(qlogn)O(q\log{n})-approximation algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}. Recall that an instance of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} consists of an undirected graph G=(V,E)G=(V,E), a partition of EE into safe and unsafe edges, E=𝒮˙𝒰E=\mathscr{S}\,\dot{\cup}\,\mathscr{U}, nonnegative edge-costs c:E0c:E\to\mathbb{R}_{\geq 0}, and two integer parameters p1p\geq 1 and q0q\geq 0. The objective is to find a minimum-cost edge-set FEF\subseteq E such that the subgraph (V,F)(V,F) remains pp-edge connected against the failure of any set of at most qq unsafe edges, that is, for any F𝒰F^{\prime}\subseteq\mathscr{U} with |F|q|F^{\prime}|\leq q, the subgraph (V,FF)(V,F\setminus F^{\prime}) is pp-edge connected. We assume that q2q\geq 2, since otherwise our results from Section 4 give a 44-approximation algorithm. The following result pertains to feasible solutions of (p,q)-FGC(p,q)\text{-}\mathrm{FGC}.

Proposition 5.1.

Consider an instance of (p,q)-FGC(p,q)\text{-}\mathrm{FGC}. An edge-set FEF\subseteq E is feasible if and only if for all nonempty SVS\subsetneq V, the edge-set Fδ(S)F\cap\delta(S) contains pp safe edges or p+qp+q edges. Furthermore, in time polynomial in nn, we can test if FF is feasible for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}.

Proof.

The characterization of feasible solutions of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} follows from the definitions.

We check the feasibility of FF for (p,q)-FGC(p,q)\text{-}\mathrm{FGC} by creating an auxiliary capacitated graph that has G=(V,F)G=(V,F) as the underlying graph, and that has a capacity of p+qp+q for each safe edge and a capacity of pp for each unsafe edge. Then, we compute a minimum-capacity cut of the auxiliary graph, call it δF(S)\delta_{F}(S^{*}); note that SS^{*} is nonempty and SVS^{*}\subsetneq{V}. Let μ\mu denote the capacity of δF(S)\delta_{F}(S^{*}); thus, μ=(p+q)|δF(S)𝒮|+p|δF(S)𝒰|\mu=(p+q)\,|\delta_{F}(S^{*})\cap\mathscr{S}|+p\,|\delta_{F}(S^{*})\cap\mathscr{U}|. If μ<p(p+q)\mu<p(p+q), then FF is infeasible. Otherwise, we compute the set 𝒞^\widehat{\mathcal{C}} of all cuts of the auxiliary graph that have capacity between μ\mu and 2μ2\mu, by applying the polynomial-time algorithm of Nagamochi, Nishimura and Ibaraki [14] that enumerates over all 22-approximate minimum-cuts of a capacitated graph. We exhaustively check whether or not each of the cuts in 𝒞^\widehat{\mathcal{C}} has either (p+q)(p+q) edges or has pp safe edges. Clearly, FF is infeasible if 𝒞^\widehat{\mathcal{C}} contains a cut that violates this condition. Otherwise, FF is feasible because any cut δF(S)\delta_{F}(S), SV\emptyset\neq{S}\subsetneq{V}, of the auxiliary graph that is not in 𝒞^\widehat{\mathcal{C}} has capacity 2μ2p(p+q)\geq 2\,\mu\geq 2\,p(p+q), and so either (p+q)|δF(S)𝒮|p(p+q)(p+q)\,|\delta_{F}(S)\cap\mathscr{S}|\geq p(p+q), that is, δF(S)\delta_{F}(S) has p\geq{p} safe edges, or p|δF(S)𝒰|p(p+q)p\,|\delta_{F}(S)\cap\mathscr{U}|\geq p(p+q), that is, δF(S)\delta_{F}(S) has p+q\geq{p+q} (unsafe) edges. ∎

For the rest of this section, we assume that the given instance of (p,q)-FGC(p,q)\text{-}\mathrm{FGC} is feasible. Let FF^{*} denote an optimal solution for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance, and let OPT=c(F)\textsc{OPT}=c(F^{*}) denote the optimal value.

Given an edge-set FF (i.e., a candidate solution), we call a cut δ(S)\delta(S), SV\emptyset\neq S\subsetneq{V}, deficient if |Fδ(S)𝒮|<p|F\cap\delta(S)\cap\mathscr{S}|<p and |Fδ(S)|<p+q|F\cap\delta(S)|<p+q; thus, a deficient cut is one that certifies the infeasibility of FF.

First, we give an overview of our O(qlogn)O(q\log n)-approximation algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}. Our algorithm runs in two stages. In the first stage, we construct an instance of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem (that partially models the given (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance), and then we apply our approximation algorithm for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem (see Theorem 1.3) to compute an edge-set FF of cost O(qOPT)O(q\cdot\textsc{OPT}) that is “nearly feasible” for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance. In more detail, the set of cuts that are deficient w.r.t. FF has size polynomial in nn, and the set is computable in time polynomial in nn. The second stage of our algorithm applies several iterations. In each iteration =1,2,\ell=1,2,\dots, we find all the deficient cuts of our current subgraph H=(V,F)H=(V,F) and then we apply the greedy algorithm for the (well-known) hitting-set problem to find an edge-set FF_{\ell} that covers all the deficient cuts (i.e., each of the deficient cuts contains at least one edge of FF_{\ell}). Then, we update FF to F˙FF\,\dot{\cup}\,F_{\ell}, i.e., we augment FF by the edge-set computed by the greedy algorithm, and then we re-compute the set of deficient cuts w.r.t. the updated subgraph H=(V,F)H=(V,F). We stop iterating when there are no deficient cuts w.r.t. H=(V,F)H=(V,F); thus, at the termination of the second stage, FF is feasible for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance. The greedy algorithm (for the hitting-set instances that arise) achieves an approximation factor of O(logn)O(\log n).

We discuss the hitting-set problem and state the approximation factor of the greedy algorithm for this problem.

Definition 5.1 (Hitting-Set Problem).

Given a ground set ={e1,,en^}\mathcal{E}=\{e_{1},\dots,e_{\hat{n}}\} of elements, a collection ={R1,,Rm^}\mathcal{R}=\{R_{1},\dots,R_{\hat{m}}\} of subsets of \mathcal{E}, and nonnegative costs c:0c:\mathcal{E}\to\mathbb{R}_{\geq 0} on the elements of \mathcal{E}, find a minimum-cost subset FF\subseteq\mathcal{E} such that for every i{1,,||}i\in\{1,\dots,|\mathcal{R}|\}, we have FRiF\cap R_{i}\neq\emptyset.

It is well-known that there is an O(log||)O(\log{|\mathcal{R}|})-approximation algorithm for the hitting-set problem based on the greedy strategy, see [19].

Proposition 5.2 ([19]).

There is an O(log||)O(\log{|\mathcal{R}|})-approximation algorithm for the hitting-set problem that runs in time polynomial in |||\mathcal{E}| and |||\mathcal{R}|.

Constructing an instance of Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS}:

Given an instance of (p,q)-FGC(p,q)\text{-}\mathrm{FGC}, we construct an instance of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} problem on the underlying graph G=(V,E)G=(V,E) with edge costs c:E0c:E\to\mathbb{R}_{\geq 0}.

We consider two cases, one for p>qp>q, and the other for pqp\leq{q}, and we use different values of the edge capacities for the two cases. In the first case, we use unit edge capacities, and in the second case, we use the edge capacities given in the proof of Proposition 5.1. Let us explain our choice of edge capacities. Recall that our plan is to apply the min(k,2umax)\min(k,2{u}_{\mathrm{max}})-approximation algorithm for Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} (Theorem 1.3) to compute an edge-set FF of cost O(qOPT)O(q\cdot\textsc{OPT}) that is “nearly feasible” for the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance. In the first case (p>qp>q, unit edge capacities), the edge-set FF (computed via Theorem 1.3) has cost 2OPT=O(qOPT)\leq 2\cdot\textsc{OPT}=O(q\cdot\textsc{OPT}). In the second case (pqp\leq{q}, edge capacities of pp or p+qp+q), the edge-set FF (computed via Theorem 1.3) has cost 2(p+q)OPT=O(qOPT)\leq 2(p+q)\cdot\textsc{OPT}=O(q\cdot\textsc{OPT}).


Case 1 p>qp>q:

k:=pk:=p, and all edges have unit capacity i.e., ue:=1u_{e}:=1 for all eEe\in{E}.

Case 2 pqp\leq{q}:

k:=p(p+q)k:=p(p+q), each safe edge has capacity (p+q)(p+q), and each unsafe edge has capacity pp, that is, ue=p+qu_{e}=p+q if e𝒮e\in\mathscr{S}, and ue=pu_{e}=p if e𝒰e\in\mathscr{U}.

Let umax=maxeEue{u}_{\mathrm{max}}=\max_{e\in E}u_{e} be the maximum edge capacity.

First, we argue that the instance of Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} is feasible. Recall that FF^{*} denotes an optimal solution for the given (feasible) (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance. By Proposition 5.1, for any nonempty set SVS\subsetneq V, we either have |δ(S)F𝒮|p|\delta(S)\cap F^{*}\cap\mathscr{S}|\geq p or |δ(S)F|p+q|\delta(S)\cap F^{*}|\geq p+q. The feasibility of the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance follows from showing that for all nonempty sets SVS\subsetneq{V}, we have u(δ(S))ku(\delta(S))\geq k. To this end, fix such an SS and recall the choice of edge capacities that depends on the relative values of pp and qq. If p>qp>q, then

(5:1) u(δ(S))=|δ(S)||δ(S)F|p=k.u(\delta(S))=|\delta(S)|\geq|\delta(S)\cap F^{*}|\geq p=k.

On the other hand, if pqp\leq q, then we have:

(5:2) u(δ(S))u(δ(S)F)max((p+q)|δ(S)F𝒮|,p|δ(S)F|)p(p+q)=k.u(\delta(S))\geq u(\delta(S)\cap F^{*})\geq\max((p+q)\cdot|\delta(S)\cap F^{*}\cap\mathscr{S}|,\>p\cdot|\delta(S)\cap F^{*}|)\geq p(p+q)=k.

Let FEF\subseteq{E} be a feasible solution to the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance; thus, every nonempty SVS\subsetneq V has u(δ(S)F)ku(\delta(S)\cap F)\geq k. Let

𝒞:={SV:S,u(δ(S)F)2k,|δ(S)F|<p+q,|δ(S)F𝒮|<p}.\mathcal{C}:=\{S\subsetneq V:S\neq\emptyset,u(\delta(S)\cap F)\leq 2k,|\delta(S)\cap F|<p+q,|\delta(S)\cap F\cap\mathscr{S}|<p\}.

Informally speaking, in the capacitated graph H=(V,F,u)H=(V,\,F,\,u) that corresponds to the edge-set FF, 𝒞\mathcal{C} is the collection of all vertex-sets that correspond to 2-approximate minimum-cuts that violate the feasibility requirement stated in Proposition 5.1.

Description of our two-stage algorithm for (p,q)-FGC(p,q)\text{-}\mathrm{FGC}:

In the first stage of the algorithm, we use Theorem 1.3 to obtain a feasible solution FF for the above Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance such that the cost c(F)c(F) is min(k,2umax)OPT\leq\min(k,2{u}_{\mathrm{max}})\cdot\textsc{OPT}. The second stage of the algorithm consists of several iterations that augment edges to FF until all the deficient cuts w.r.t. FF have been fixed. The th\ell^{\mathrm{th}} iteration (for some =1,2,\ell=1,2,\dots) consists of solving an instance of the hitting-set problem: we want to hit all sets in the collection {δ(S)(EF):S𝒞}\{\delta(S)\cap(E\setminus F)~{}:~{}S\in\mathcal{C}\} by using edge-elements eEFe\in E\setminus F, where the cost of ee is cec_{e} (in the hitting-set instance). Let FF^{\prime}_{\ell} denote a hitting-set computed by the greedy algorithm for the above hitting-set instance. We update FF to F˙FF\,\dot{\cup}\,F^{\prime}_{\ell}, and recompute 𝒞\mathcal{C} using the new FF. As long as 𝒞\mathcal{C} is not empty, we repeat the above iteration. When 𝒞\mathcal{C} becomes empty, we return the current FF as a feasible solution of the given (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance. Assuming that the number of iterations in the second stage is O(q)O(q), the cost of FF is O(qOPT+O(qlogn)OPT)=O(qlogn)OPTO(q\cdot\textsc{OPT}+O(q\log{n})\cdot\textsc{OPT})=O(q\log{n})\cdot\textsc{OPT}.

Observe that each of the hitting-set instances constructed by the algorithm is feasible, because for any deficient cut δ(S)\delta(S) w.r.t. the current solution FF, we have (FF)δ(S)(F^{*}\setminus F)\cap\delta(S)\neq\emptyset, that is, FFF^{*}\setminus F is a feasible hitting-set.

The next result shows that the algorithm finds a feasible solution.

Lemma 5.3.

The edge-set FF returned by the algorithm is feasible for the given (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance.

Proof.

By the design of the second stage of the algorithm, the solution FF is repeatedly augmented as long as 𝒞\mathcal{C} is nonempty, so it suffices to argue that every deficient cut (w.r.t. the current FF) belongs to 𝒞\mathcal{C}. Let δ(S)\delta(S), SV\emptyset\neq{S}\subsetneq{V}, be an arbitrary deficient cut w.r.t. FF. By definition, |δ(S)F𝒮|<p|\delta(S)\cap F\cap\mathscr{S}|<p and |δ(S)F|<p+q|\delta(S)\cap F|<p+q. To show that SS belongs to 𝒞\mathcal{C}, we need to show that u(δ(S)F)2ku(\delta(S)\cap F)\leq 2k holds. If p>qp>q, then

(5:3) u(δ(S)F)=|δ(S)F|<p+q<2p=2k.u(\delta(S)\cap F)=|\delta(S)\cap F|<p+q<2p=2k.

On the other hand, if pqp\leq q, then

(5:4) u(δ(S)F)=p|δ(S)F|+q|δ(S)F𝒮|<p(p+q)+pq<2p(p+q)=2k.u(\delta(S)\cap F)=p\cdot|\delta(S)\cap F|+q\cdot|\delta(S)\cap F\cap\mathscr{S}|<p(p+q)+pq<2p(p+q)=2k.

Thus, in either case, deficient cuts are 2-approximate minimum-cuts in the capacitated graph H=(V,F,u)H=(V,F,u), and they belong to 𝒞\mathcal{C}. ∎

We complete the proof of Theorem 1.5 by arguing that the above algorithm finds a feasible solution of the (p,q)-FGC(p,q)\text{-}\mathrm{FGC} instance of cost O(qlogn)OPTO(q\log{n})\cdot\textsc{OPT} in polynomial time.

Lemma 5.4.

The above two-stage algorithm runs in time polynomial in nn and returns a feasible solution FEF\subseteq{E} for (p,q)-FGC(p,q)\text{-}\mathrm{FGC} such that c(F)O(qlogn)OPTc(F)\leq O(q\log n)\cdot\textsc{OPT}.

Proof.

We argue that the output of the algorithm has cost at most O(qlogn)OPTO(q\log n)\cdot\textsc{OPT}. It is easy to see that the cost of the first-stage solution is O(q)OPTO(q)\cdot\textsc{OPT} because of the approximation factor from Theorem 1.3; as mentioned before, FF^{*} is feasible for the Cap-k-ECSS\mathrm{Cap}\text{-}k\text{-}\mathrm{ECSS} instance, and min(k,umax)2q\min(k,{u}_{\mathrm{max}})\leq 2q, for all relevant values of pp and qq.

We bound the cost incurred in the second stage by arguing that: (i) each iteration leads to an additional cost of at most O(logn)OPTO(\log{n})\cdot\textsc{OPT}; and (ii) there are at most qq iterations.

In the capacitated graph H(V,F,u)H(V,F,u), all deficient cuts are 2-approximate minimum-cuts, i.e., the capacity of each deficient cut is at most two times the capacity of a minimum-cut. Karger’s bound [11] on the number of 22-approximate minimum-cuts implies that |𝒞|=O(n4)|\mathcal{C}|=O(n^{4}). By using the algorithm of Nagamochi et al. [14] we can explicitly compute the collection 𝒞\mathcal{C} in (deterministic) polynomial time. Since FFF^{*}\setminus F is a feasible solution to each of the hitting-set instances constructed in the second stage, Proposition 5.2 implies that the cost of the augmenting edge-set found in each iteration is O(log|𝒞|)c(FF)=O(logn)OPTO(\log|\mathcal{C}|)\cdot c(F^{*}\setminus F)=O(\log n)\cdot\textsc{OPT}, thereby showing (i).

Next, we bound the number of iterations via a case analysis. First, suppose that p>qp>q. Then each iteration increases the capacity of a deficient cut by at least one. By (5:1), every deficient cut has capacity at least pp at the end of the first stage, and due to (5:3), a cut is no longer deficient once its capacity is at least p+qp+q. Next, suppose that pqp\leq q. We use a similar argument for this case. Now, each iteration increases the capacity of a deficient cut by at least pp. By (5:2), every deficient cut has capacity at least p(p+q)p(p+q) at the end of the first stage, and due to (5:4), a cut is longer deficient once its capacity is at least p(p+q)+pqp(p+q)+pq. Overall, we have c(F)(2q+qO(logn))OPT=O(qlogn)OPTc(F)\leq(2q+q\cdot O(\log n))\cdot\textsc{OPT}=O(q\log n)\cdot\textsc{OPT}, as desired.

Lastly, we argue that the entire algorithm runs in polynomial time. The first stage runs in (deterministic) polynomial time, by Theorem 1.3. The second stage also runs in (deterministic) polynomial time because the number of iterations is at most qq (n\leq n), and in each iteration we solve a polynomial-sized hitting-set instance. This completes the proof of the lemma. ∎

6. Unweighted problems: (1,1)-FGC(1,1)\text{-}\mathrm{FGC} and (k,1)-FGC(k,1)\text{-}\mathrm{FGC}

Consider the unweighted version of FGC\mathrm{FGC} where each edge has unit cost, i.e., ce=1c_{e}=1 for all eEe\in E. We present a 1611\frac{16}{11}-approximation algorithm (see Theorem 1.6). To the best of our knowledge, this is the first result that improves on the approximation factor of 32\frac{3}{2} for unweighted FGC\mathrm{FGC}. In fact, we give two algorithms for obtaining two candidate solutions to an instance of unweighted FGC\mathrm{FGC}; the simpler of these algorithms is discussed by Adjiashvili et al. [1, 2]. Assuming that we have access to an α\alpha-approximation algorithm for the minimum-size (i.e., unweighted) 2-ECSS2\text{-}\mathrm{ECSS} problem, we argue that the cheaper of the two candidate solutions is a 4α2α+1\frac{4\alpha}{2\alpha+1}-approximate solution to the instance of unweighted FGC\mathrm{FGC}. Adjiashvili et al. [2] gave an (α2+1)\bigl{(}\frac{\alpha}{2}+1\bigr{)}-approximation algorithm for unweighted FGC\mathrm{FGC}, assuming the existence of an α\alpha-approximation algorithm for the minimum-size (i.e., unweighted) 2-ECSS2\text{-}\mathrm{ECSS} problem; this implies a 53\frac{5}{3}-approximation algorithm for unweighted FGC\mathrm{FGC} by using a result of Sebö and Vygen [17]. The algorithm in [2] starts with a maximal forest of safe edges in the graph. At the end of this section, we give an example showing that the (asymptotic) approximation factor achievable by such an algorithm is at least 32\frac{3}{2}. Our main result in this section is the following.

Theorem 6.1.

Suppose that there is an α\alpha-approximation algorithm for the minimum-size (i.e., unweighted) 2-ECSS2\text{-}\mathrm{ECSS} problem. Then, there is a 4α2α+1\frac{4\alpha}{2\alpha+1}-approximation algorithm for unweighted FGC\mathrm{FGC}.

Theorem 1.6 follows from the above theorem by using the 43\frac{4}{3}-approximation algorithm of Sebö and Vygen [17] for the minimum-size 2-ECSS2\text{-}\mathrm{ECSS} problem. Before delving into the proof of Theorem 6.1, we introduce some basic results on W{W}-joins, which will be useful in our algorithm and its analysis. Let G=(V,E)G^{\prime}=(V^{\prime},E^{\prime}) be an undirected graph with no self-loops and let c:E0c^{\prime}:E^{\prime}\to\mathbb{R}_{\geq 0} be nonnegative costs on the edges.

Definition 6.1 (W{W}-join).

Let WV{W}\subseteq V^{\prime} be a subset of vertices with |W||{W}| even. A subset JEJ\subseteq E^{\prime} of edges is called a W{W}-join if W{W} is equal to the set of vertices of odd degree in the subgraph (V,J)(V^{\prime},J).

The following classical result on finding a minimum-cost W{W}-join is due to Edmonds.

Proposition 6.2 ([16], Theorem 29.1).

Given (G,c)(G^{\prime},\,c^{\prime}), we can either obtain a minimum-cost W{W}-join, or conclude that there is no W{W}-join, in strongly polynomial time.

The W{W}-join polytope is the convex hull of the incidence vectors of W{W}-joins. Edmonds & Johnson showed that the dominant of the W{W}-join polytope has a simple linear description.

Proposition 6.3 ([16], Corollary 29.2b).

The dominant of the W{W}-join polytope is given by {x0E:x(δG(S))1SV s.t. |SW| odd}\{x\in\mathbb{R}_{\geq 0}^{E^{\prime}}:x(\delta_{G^{\prime}}(S))\geq 1\,\forall\,S\subsetneq V^{\prime}\text{ s.t. }|S\cap{W}|\text{ odd}\}.

Consider an instance of unweighted FGC\mathrm{FGC} consisting of a graph G=(V,E)G=(V,E) with a specified partition of EE into a set of safe edges and a set of unsafe edges, E=𝒮˙𝒰E=\mathscr{S}\,\dot{\cup}\,\mathscr{U}. We will assume that GG is connected and has no unsafe bridges, since otherwise the instance is infeasible. Let FF^{*} denote an optimal solution.

Join-based algorithm for unweighted FGC\mathrm{FGC}:

Let TT be a spanning tree in GG that maximizes the number of safe edges. Clearly, for each safe edge e=uve=uv in E(G)TE(G)-T, the (unique) u,v{u,v}-path in TT consists of safe edges; hence, the graph obtained from GG by contracting all the safe edges of TT has no safe edges. If |T𝒮|=|V|1|T\cap\mathscr{S}|=|V|-1, then TT is an optimal FGC\mathrm{FGC} solution for the given instance, and we are done. Otherwise, let T:=T𝒰T^{\prime}:=T\cap\mathscr{U} be the (nonempty) set of unsafe edges in TT. Let G=(V,E)G^{\prime}=(V^{\prime},E^{\prime}) denote the graph obtained from GG by contracting all the (safe) edges in TTT\setminus T^{\prime}. (We remove all self-loops from GG^{\prime}, but retain parallel edges that arise due to edge contractions.) Note that all edges in EE^{\prime} are unsafe (by the discussion above), and TT^{\prime} is a spanning tree of GG^{\prime}. Let WW^{\prime} denote the (nonempty) set of odd degree vertices in the subgraph (V,T)(V^{\prime},T^{\prime}). Using Proposition 6.2, in polynomial time, we compute a minimum-cardinality WW^{\prime}-join in GG^{\prime}, and denote it by JEJ^{\prime}\subseteq E^{\prime}. By our choice, the subgraph (V,T˙J)(V^{\prime},T^{\prime}\,\dot{\cup}\,J^{\prime}) is connected and Eulerian, so it is 22-edge connected in GG^{\prime}. Consider the multiset F1=T˙JF_{1}=T\,\dot{\cup}\,J^{\prime} consisting of edges in EE; if an edge ee appears in both TT^{\prime} and JJ^{\prime}, then we include two copies of ee in F1F_{1}.

If F1F_{1} contains at most one copy of each edge in EE, then F1F_{1} is FGC\mathrm{FGC}-feasible. Otherwise, we modify F1F_{1} to get rid of all duplicates without increasing |F1||F_{1}|. Consider an unsafe edge eEe\in E^{\prime} that appears twice in F1F_{1}, i.e., ee belongs to both TT^{\prime} and JJ^{\prime}. We remove a copy of ee from F1F_{1}. If this does not violate FGC\mathrm{FGC}-feasibility, then we take no further action. Otherwise, the second copy of ee in F1F_{1} is an unsafe bridge in (V,F1)(V,F_{1}) that induces a cut δ(S)\delta(S), SV\emptyset\neq{S}\subsetneq{V}, in GG. By our assumption that GG has no unsafe bridges, there is another edge eEe^{\prime}\in E that is in δ(S)\delta(S) but not in F1F_{1}. We include ee^{\prime} in F1F_{1}. This finishes the description of our first algorithm.

At the end of the de-duplication step, F1F_{1} is FGC\mathrm{FGC}-feasible and it contains at most one copy of any edge eEe\in E. It is also clear that |F1||T|+|J||F_{1}|\leq|T|+|J^{\prime}|. The following claim gives a bound on the quality of our first solution.

Claim 6.4.

We have |J|12|F𝒰||J^{\prime}|\leq\frac{1}{2}|F^{*}\cap\mathscr{U}|. Hence, |F1||F𝒮|+32|F𝒰||F_{1}|\leq|F^{*}\cap\mathscr{S}|+\frac{3}{2}|F^{*}\cap\mathscr{U}|.

Proof.

We prove the claim by constructing a fractional WW^{\prime}-join of small size. Recall that we chose TT such that |T𝒮||T\cap\mathscr{S}| is maximum, and we obtained GG^{\prime} by contracting connected components in (V,TT)(V,T\setminus T^{\prime}). GG^{\prime} consists of only unsafe edges, and moreover, GG^{\prime} is 22-edge connected because GG has no unsafe bridges (by our assumption). Let B:=FEB:=F^{*}\cap E^{\prime} denote the set of unsafe edges in the optimal solution FF^{*} that also belong to GG^{\prime}. Consider the vector z:=12χBz:=\frac{1}{2}\chi^{B} where χB[0,1]E\chi^{B}\in[0,1]^{E^{\prime}} is the incidence vector of BB in GG^{\prime}. Let δ(S)\delta(S^{\prime}), SV(G)\emptyset\neq{S^{\prime}}\subsetneq{V(G^{\prime})}, be an arbitrary cut in GG^{\prime} and let δ(S)\delta(S) be the unique cut in GG that gives rise to δ(S)\delta(S^{\prime}) when we contract (safe) edges in TTT\setminus T^{\prime}. Since FF^{*} is FGC\mathrm{FGC}-feasible and there are no safe edges in δG(S)\delta_{G}(S), we must have |BδG(S)|2|B\cap\delta_{G^{\prime}}(S^{\prime})|\geq 2. Consequently, z(δG(S))=12|BδG(S)|1z(\delta_{G^{\prime}}(S^{\prime}))=\frac{1}{2}|B\cap\delta_{G^{\prime}}(S^{\prime})|\geq 1. By Proposition 6.3, zz lies in the dominant of the WW^{\prime}-join polytope, i.e., zz dominates a fractional WW^{\prime}-join. Since JJ^{\prime} is a min-cardinality WW^{\prime}-join, |J|𝟏Tz12|F𝒰||J^{\prime}|\leq\mathbf{1}^{T}z\leq\frac{1}{2}|F^{*}\cap\mathscr{U}|. We bound the size of F1F_{1} by using the trivial bound |T||F||T|\leq|F^{*}|:

|F1||F|+|J||F𝒮|+32|F𝒰|.|F_{1}|\leq|F^{*}|+|J^{\prime}|\leq|F^{*}\cap\mathscr{S}|+\frac{3}{2}|F^{*}\cap\mathscr{U}|.\qed

Our second algorithm uses the α\alpha-approximation for the minimum-size 2-ECSS2\text{-}\mathrm{ECSS} problem as a subroutine. Informally speaking, the solution returned by this algorithm has the property that its size complements that of F1F_{1}.

2-ECSS2\text{-}\mathrm{ECSS}-based algorithm for unweighted FGC\mathrm{FGC}:

Consider the graph G′′G^{\prime\prime} obtained from GG by duplicating every safe edge in EE. Similarly, let F′′F^{\prime\prime} be the multiedge-set obtained from FF^{*} by duplicating every safe edge in FF^{*}. Clearly, (V,F′′)(V,F^{\prime\prime}) is a 22-edge connected subgraph of G′′G^{\prime\prime} consisting of 2|F𝒮|+|F𝒰|2|F^{*}\cap\mathscr{S}|+|F^{*}\cap\mathscr{U}| edges. Let F2F_{2} be the output of running the α\alpha-approximation algorithm for the minimum-size 2-ECSS2\text{-}\mathrm{ECSS} problem on G′′G^{\prime\prime}. Since F2F_{2} is 22-edge connected and only safe edges can appear more than once in F2F_{2} (because G′′G^{\prime\prime} only has duplicates of safe edges), we can drop the extra copy of all safe edges while maintaining FGC\mathrm{FGC}-feasibility in GG. This finishes the description of our second algorithm.

The following claim is immediate.

Claim 6.5.

We have |F2|2α|F𝒮|+α|F𝒰||F_{2}|\leq 2\alpha|F^{*}\cap\mathscr{S}|+\alpha|F^{*}\cap\mathscr{U}|.

We end this section with the proof of our main result on unweighted FGC\mathrm{FGC}.

Proof of Theorem 6.1.

Given an instance of unweighted FGC\mathrm{FGC}, we compute two candidate solutions F1F_{1} and F2F_{2} as given by the two algorithms described above. The solution F1F_{1} can be computed using algorithms for the MST\mathrm{MST} problem and the minimum-weight WW^{\prime}-join problem, followed by basic graph operations. The solution F2F_{2} can be computed using the given α\alpha-approximation algorithm for the minimum-size 2-ECSS2\text{-}\mathrm{ECSS} problem. We show that the smaller of F1F_{1} and F2F_{2} is a 4α2α+1\frac{4\alpha}{2\alpha+1}-approximate solution for the instance of unweighted FGC\mathrm{FGC}. By Claims 6.4 and 6.5:

min(|F1|,|F2|)2α2α+1|F1|+12α+1|F2|=4α2α+1|F|\min(|F_{1}|,\,|F_{2}|)\leq\frac{2\alpha}{2\alpha+1}|F_{1}|+\frac{1}{2\alpha+1}|F_{2}|=\frac{4\alpha}{2\alpha+1}|F^{*}|\qed

As mentioned earlier, we have an example (see Figure 1 below) such that any algorithm for unweighted FGC\mathrm{FGC} that starts with a maximal forest on safe edges achieves an (asymptotic) approximation factor of 32\frac{3}{2} or more.

\ldotsv1v_{1}v2v_{2}v3v_{3}v4v_{4}v5v_{5}v2n1v_{2n-1}v2nv_{2n}
Figure 1. In this instance we have a graph on 2n2n vertices. The set of unsafe edges, shown using solid lines, forms a Hamiltonian cycle. For each i=1,,n1i=1,\dots,n-1, there is a safe edge, shown using a thick dashed line, between v2iv_{2i} and v2nv_{2n}. The solution consisting of all unsafe edges is feasible, and any feasible solution must contain all unsafe edges, so the value of an optimal integral solution is 2n2n. Any feasible solution that contains a maximal forest on safe edges has size at least 3n13n-1.

Improved approximation factor for unweighted (k,1)-FGC(k,1)\text{-}\mathrm{FGC}:

Finally, we focus on unweighted (k,1)-FGC(k,1)\text{-}\mathrm{FGC} where each edge has unit cost. We can improve on the approximation factor of four of Theorem 1.4, by using the same method (see Section 4), except that in the first stage we apply the best approximation algorithm known for the minimum-size (unweighted) k-ECSSk\text{-}\mathrm{ECSS} problem. Let αk\alpha_{k} denote the best approximation factor known for the latter problem. Note that α2=4/3\alpha_{2}=4/3 (see Sebö & Vygen [17]), α3=1.5\alpha_{3}=1.5 (see Gabow [5]), and, in general, αk<1+1.91k\alpha_{k}<1+\frac{1.91}{k} (see Gabow & Gallagher [6]).


Proposition 6.6.

There is a (2+αk)(2+\alpha_{k})-approximation algorithm for unweighted (k,1)-FGC(k,1)\text{-}\mathrm{FGC}. Thus, the approximation factor is 103\frac{10}{3} for k=2k=2, 72\frac{7}{2} for k=3k=3, and it is less than (3+1.91k)(3+\frac{1.91}{k}) for all integers k4k\geq 4.


Acknowledgements. We thank the anonymous reviewers and PC members of FSTTCS 2021 for their comments.

References

  • [1] D. Adjiashvili, F. Hommelsheim, and M. Mühlenthaler. Flexible Graph Connectivity. In Proceedings of the 21st Integer Programming and Combinatorial Optimization Conference, volume 12125 of Lecture Notes in Computer Science, pages 13–26, 2020.
  • [2] D. Adjiashvili, F. Hommelsheim, and M. Mühlenthaler. Flexible Graph Connectivity. Mathematical Programming, pages 1–33, 2021.
  • [3] D. Chakrabarty, C. Chekuri, S. Khanna, and N. Korula. Approximability of Capacitated Network Design. Algorithmica, 72(2):493–514, 2015.
  • [4] L. Fleischer. Building Chain and Cactus Representations of All Minimum Cuts from Hao-Orlin in the Same Asymptotic Run Time. Journal of Algorithms, 33(1):51–72, 1999.
  • [5] H. N. Gabow. An Ear Decomposition Approach to Approximating the Smallest 3-Edge Connected Spanning Subgraph of a Multigraph. SIAM J. Discret. Math., 18(1):41–70, 2004.
  • [6] H. N. Gabow and S. Gallagher. Iterated Rounding Algorithms for the Smallest k{k}-Edge Connected Spanning Subgraph. SIAM J. Comput., 41(1):61–103, 2012.
  • [7] H. N. Gabow, M. X. Goemans, É. Tardos, and D. P. Williamson. Approximating the Smallest k-Edge Connected Spanning Subgraph by LP-Rounding. Networks, 53(4):345–357, 2009.
  • [8] M. X. Goemans, A. V. Goldberg, S. A. Plotkin, D. B. Shmoys, É. Tardos, and D. P. Williamson. Improved Approximation Algorithms for Network Design Problems. In Proceedings of the 5th Symposium on Discrete Algorithms, pages 223–232, 1994.
  • [9] M. X. Goemans and D. P. Williamson. The Primal-Dual Method for Approximation Algorithms and its Application to Network Design Problems, chapter 4, pages 144–191. PWS Publishing Company, Boston, MA, 1997.
  • [10] K. Jain. A Factor 2 Approximation Algorithm for the Generalized Steiner Network Problem. Combinatorica, 21(1):39–60, 2001.
  • [11] D. R. Karger. Global Min-Cuts in 𝒩𝒞\mathcal{R}\mathcal{N}\mathcal{C}, and Other Ramifications of a Simple Min-Cut Algorithm. In Proceedings of the 4th Symposium on Discrete Algorithms, pages 21––30, 1993.
  • [12] S. Khuller and U. Vishkin. Biconnectivity Approximations and Graph Carvings. Journal of the ACM, 41(2):214–235, 1994.
  • [13] T. L. Magnanti and R. T. Wong. Network Design and Transportation Planning: Models and Algorithms. Transportation Science, 18(1):1–55, 1984.
  • [14] H. Nagamochi, K. Nishimura, and T. Ibaraki. Computing All Small Cuts in an Undirected Network. SIAM Journal on Discrete Mathematics, 10(3):469–481, 1997.
  • [15] P. Rozenshtein, A. Gionis, B. A. Prakash, and J. Vreeken. Reconstructing an Epidemic Over Time. In Proceedings of the 22nd International Conference on Knowledge Discovery and Data Mining, KDD ’16, page 1835–1844, 2016.
  • [16] A. Schrijver. Combinatorial Optimization: Polyhedra and Efficiency, volume 24 of Algorithms and Combinatorics. Springer-Verlag Berlin Heidelberg, 2003.
  • [17] A. Sebö and J. Vygen. Shorter Tours by Nicer Ears: 7/5-Approximation for the Graph-TSP, 3/2 for the Path Version, and 4/3 for Two-Edge-Connected Subgraphs. Combinatorica, 34(5):597–629, 2014.
  • [18] L. V. Snyder, M. P. Scaparra, M. S. Daskin, and R. L. Church. Planning for Disruptions in Supply Chain Networks, pages 234–257. Institute for Operations Research and the Management Sciences (INFORMS), 2014.
  • [19] V. V. Vazirani. Approximation Algorithms. Springer Berlin Heidelberg, 2003.
  • [20] D. P. Williamson, M. X. Goemans, M. Mihail, and V. V. Vazirani. A Primal-Dual Approximation Algorithm for Generalized Steiner Network Problems. Combinatorica, 15(3):435–454, 1995.