Skip to main content
Log in

Improved approximations for buy-at-bulk and shallow-light \(k\)-Steiner trees and \((k,2)\)-subgraph

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

In this paper we give improved approximation algorithms for some network design problems. In the bounded-diameter or shallow-light \(k\)-Steiner tree problem (SL\(k\)ST), we are given an undirected graph \(G=(V,E)\) with terminals \(T\subseteq V\) containing a root \(r\in T\), a cost function \(c:E\rightarrow \mathbb {R}^+\), a length function \(\ell :E\rightarrow \mathbb {R}^+\), a bound \(L>0\) and an integer \(k\ge 1\). The goal is to find a minimum \(c\)-cost \(r\)-rooted Steiner tree containing at least \(k\) terminals whose diameter under \(\ell \) metric is at most \(L\). The input to the buy-at-bulk \(k\)-Steiner tree problem (BB\(k\)ST) is similar: graph \(G=(V,E)\), terminals \(T\subseteq V\) containing a root \(r\in T\), cost and length functions \(c,\ell :E\rightarrow \mathbb {R}^+\), and an integer \(k\ge 1\). The goal is to find a minimum total cost \(r\)-rooted Steiner tree \(H\) containing at least \(k\) terminals, where the cost of each edge \(e\) is \(c(e)+\ell (e)\cdot f(e)\) where \(f(e)\) denotes the number of terminals whose path to root in \(H\) contains edge \(e\). We present a bicriteria \((O(\log ^2 n),O(\log n))\)-approximation for SL\(k\)ST: the algorithm finds a \(k\)-Steiner tree with cost at most \(O(\log ^2 n\cdot \text{ opt }^*)\) where \(\text{ opt }^*\) is the cost of an LP relaxation of the problem and diameter at most \(O(L\cdot \log n)\). This improves on the algorithm of Hajiaghayi et al. (2009) (APPROX’06/Algorithmica’09) which had ratio \((O(\log ^4 n), O(\log ^2 n))\). Using this, we obtain an \(O(\log ^3 n)\)-approximation for BB\(k\)ST, which improves upon the \(O(\log ^4 n)\)-approximation of Hajiaghayi et al. (2009). We also consider the problem of finding a minimum cost \(2\)-edge-connected subgraph with at least \(k\) vertices, which is introduced as the \((k,2)\)-subgraph problem in Lau et al. (2009) (STOC’07/SICOMP09). This generalizes some well-studied classical problems such as the \(k\)-MST and the minimum cost \(2\)-edge-connected subgraph problems. We give an \(O(\log n)\)-approximation algorithm for this problem which improves upon the \(O(\log ^2 n)\)-approximation algorithm of Lau et al. (2009).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Andrews M (2004) Hardness of buy-at-bulk network design. Proceedings of IEEE FOCS, pp 115–124.

  • Andrews M, Zhang L (2002) Approximation algorithms for access network design. Algorithmica 32(2):197–215

    Article  Google Scholar 

  • Antonakopoulos S, Chekuri C, Shepherd B, Zhang L (2011) Buy-at-bulk network design with protection. Mathe Oper Res 36(1):71–87

    Article  MathSciNet  MATH  Google Scholar 

  • Awerbuch B, Azar Y. (1997) Buy-at-bulk network design, In Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS ’97), pp 542–547.

  • Awerbuch B, Azar Y, Blum A, Vempala S (1999) New approximation guarantees for minimum-weight \(k\)-trees and prize-collecting salesmen. SIAM J Comput 28(1):254–262

    Article  MathSciNet  Google Scholar 

  • Bartal Y (1997) On approximating arbitrary metrics by tree metrics. In: Proceedings of ACM STOC, pp 161–168.

  • Bar-Ilan J, Kortsarz G, Peleg D (2001) Generalized submodular cover problems and applications. Theor Comput Sci 250(1):179–200

    Article  MathSciNet  MATH  Google Scholar 

  • Bateni M, Chuzhoy J (2013) Approximation algorithms for the directed \(k\)-Tour and \(k\)-Stroll problems. Algorithmica 65(3):545–561

    Article  MathSciNet  MATH  Google Scholar 

  • Bhaskara A, Charikar M, Chlamtac E, Feige U, Vijayaraghavan A (2010) Detecting high log-densities: an \(O(n^{1/4})\)-approximation for densest \(k\)-subgraph. In: Proceedings of ACM Symposium on the Theory of Computing (STOC), pp 201–210.

  • Blum A, Ravi R, Vempala S (1999) A constant-factor approximation algorithm for the \(k\)-MST problem. J Comput Syst Sci 58(1):101–108

    Article  MathSciNet  MATH  Google Scholar 

  • Chekuri C, Kumar A (2004) Maximum coverage problem with group budget constraints and applications. In: Approximation algorithms for combinatorial optimization, pp 72–83

  • Chekuri C, Khanna S, Naor J (2001) A deterministic approximation algorithm for the cost-distance problem. Short paper in Proceedings of ACM-SIAM SODA, pp 232–233.

  • Chekuri C, Hajiaghayi M, Kortsarz G, Salavatipour M (2006) Approximation algorithms for non-uniform buy-at-bulk network design problems. In: Proceedings of IEEE FOCS, pp 677–686.

  • Chekuri C, Hajiaghayi M, Kortsarz G, Salavatipour M (2009) Approximation algorithms for non-uniform buy-at-bulk network design. SIAM J Comput 39(5):1772–1798

    Article  MathSciNet  Google Scholar 

  • Chuzhoy J, Gupta A, Naor S, Sinha A (2005) On the approximability of some network design problems. Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pp 943–951. Society for Industrial and Applied Mathematics.

  • Even G, Garg N, Konemann J, Ravi R, Sinha A (2004) Covering graphs using trees and stars. Oper Res Lett 32(4):309–315

    Article  MathSciNet  MATH  Google Scholar 

  • Fakcharoenphol J, Rao S, Talwar K (2004) A tight bound on approximating arbitrary metrics by tree metrics. J Comput Syst Sci 69(3):485–497

    Article  MathSciNet  MATH  Google Scholar 

  • Garg N (2005) Saving an epsilon: a 2-approximation for the k-MST problem in graphs. In: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (STOC), pp 396–402.

  • Guha S, Meyerson A, Munagala K (2009) A constant factor approximation for the single sink edge installation problem. SIAM J Comput 38(6):2426–2442

  • Gupta A, Krishnaswamy R, Ravi R (2010) Tree embeddings for two-edge-connected network design. In: Proceedings of of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pp 1521–1538, SODA.

  • Gupta A, Kumar A, Pal M, Roughgarden T (2003) Approximation via cost-sharing: a simple approximation algorithm for the multicommodity rent-or-buy problem. In: Proceedings of the 44rd Symposium on Foundations of Computer Science (FOCS ’03), pp 606–615. IEEE.

  • Gupta A, Kumar A, Roughgarden T. Simpler and better approximation algorithms for network design, In Proceedings of the thirty-fifth ACM symposium on Theory of computing (STOC ’03), pp 365–372. ACM.

  • Hajiaghayi MT, Kortsarz G, Salavatipour MR (2009) Approximating buy-at-bulk and shallow-light \(k\)-steiner tree. Algorithmica 53(1):89–103

    Article  MathSciNet  MATH  Google Scholar 

  • Hassin R (1992) Approximation schemes for the restricted shortest path problem. Math Oper Res 17(1):36–42

    Article  MathSciNet  MATH  Google Scholar 

  • Hassin R, Levin A (2002) Minimum restricted diameter spanning trees. Springer, Berlin, pp 175–184

    Google Scholar 

  • Jain K (2001) A factor 2 approximation algorithm for the generalized steiner network problem. Combinatorica 21(1):39–60

    Article  MathSciNet  MATH  Google Scholar 

  • Khani MR, Salavatipour MR (2011) Approximation algorithms for min-max tree cover and bounded tree cover problems. In: Proceedings of APPROX.

  • Kortsarz G, Nutov Z (2009) Approximating some network design problems with vertex costs. In: Proceedings APPROX-RANDOM, pp 231–243.

  • Kumar A, Gupta A, Roughgarden T (2002) A constant-factor approximation algorithm for the multicommodity rent-or-buy problem. In: Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS ’02), pp 333–342. IEEE.

  • Lau L, Naor S, Salavatipour MR, Singh M (2009) Survivable network design with degree or order constraints. SIAM J Comput 39(3):1062–1087 Special issue for selected papers of STOC.

  • Marathe MV, Ravi R, Sundaram R, Ravi SS, Rosenkrantz D, Hunt HB (1998) Bicriteria network design. J Algorithms 28(1):142–171

  • Meyerson A, Munagala K, Plotkin S (2008) Cost-Distance: Two Metric Network Design. SIAM J. on Computing, 2648–1659.

  • Ravi R, Sundaram R, Marathe MV, Rosenkrants DJ, Ravi SS (1996) Spanning trees short or small. SIAM J Discret Math 9(2):178–200

    Article  MATH  Google Scholar 

  • Safari MA, Salavatipour MR (2011) A constant factor approximation for minimum \(\lambda \)-edge-connected \(k\)-subgraph with metric costs. SIAM J Discrete Math 25(3):1089–1102

    Article  MathSciNet  MATH  Google Scholar 

  • Salman FS, Cheriyan J, Ravi R, Subramanian S (2000) Approximating the single-sink link-installation problem in network design. SIAM J Optim 11(3):595–610

    Article  MathSciNet  MATH  Google Scholar 

  • Schrijver A (2003) Combinatorial optimization: Polyhedra and Efficiency. Springer-Verlag, Berlin

    Google Scholar 

  • Seymour PD (1981) Nowhere-zero 6-flows. J Comb Theory B 30(2):130–135

Download references

Acknowledgments

We would like to thank an anonymous referee for her/his careful reading of this paper and the comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Reza Khani.

Additional information

Research done while M. R. Khani at Department of Computing Science, University of Alberta, Canada. Most of this work was done when the M. R. Salavatipour was visiting Toyota Tech. Inst. at Chicago. Supported by NSERC and an Alberta Innovates New Faculty award.

A preliminary version of this paper appeared in Proceedings of ISAAC 2011.

Other Proofs

Other Proofs

Proof of Lemma 2

The structure of the proof is as follows. We show that the optimal value of the dual of LP-SLST in \(G\) is not less than the optimal value of a dual LP for min-cost perfect matching defined in graph \(F\). Therefore, by LP duality, the value of LP-SLST (\(\text{ opt }^*\)) is equal to the value of its dual and is greater than the value of min-cost perfect matching LP. Then we argue that from a basic feasible solution of the matching LP we can build an integral matching whose cost is not greater than the value of min-cost perfect matching LP and has at least \(|T|/3\) edges. Taking into consideration the fact that graph \(F\) is built with edges that are \((1 + \epsilon )\) approximation of the actual values, we conclude that \(M\) costs at most \((1 + \epsilon ) \text{ opt }^*\).

Consider the following LP for the min-cost perfect matching problem (MMP) in graph \(F\), along with its dual (MMD) in which \(b^*(u,v)\) represents the optimal minimum \(c\)-cost \((u,v)\)-path of length at most \(2L\):

We show that the optimal solution of dual LP for SLST (D-SLST) has value at least as big as the optimal value of MMD which implies the optimal value of MMP is not greater than \(\text{ opt }^*\) using LP duality. The LP D-SLST is the following:

D-SLST:

$$\begin{aligned} \max ~~ \sum \nolimits _{t\in T} \alpha _t&\nonumber \\ \sum \nolimits _{t\in T} \beta ^t_e&\le c(e) \quad e \in E\end{aligned}$$
(14)
$$\begin{aligned} \alpha _t - \sum \nolimits _{e\in p} \beta ^t_e&\le 0 \quad \quad \ t\in T, p\in \mathcal{P}_t \end{aligned}$$
(15)
$$\begin{aligned} \alpha _t, \beta ^t_e&\ge 0 \quad \quad \ e \in E, t\in T \end{aligned}$$
(16)

Let \(y^*_t\) be an optimal solution for MMD and \(d_L(u, v)\) be the shortest path between \(u\) and \(v\) with regard to cost function \(c\) in \(G\) and of length at most \(L\) (note that the bound on length here is \(L\) and not \(2L\) as in computing \(b^*(u,v)\) for MMD). We make a ball \(B_t\) of radius \(y^*_t\) (using \(d_L(u,v)\) function) around each \(t \in T\) in \(G\). More formally, \(B_t\) contains all the nodes \(v\) with \(d_L(v,t) \le y^*_t\). For the edges \(e = (u,v)\) which at least one of \(d_L(u, t) < y^*_t\) or \(d_L(v, t) < y^*_t\) is true, \(g^t(e)\) is the fraction of \(e\) contained in ball \(B_t\) and is defined as: \(g^t(e) = min\{\frac{y^*_t - min\{d_L(u,t), d_L(v,t)\}}{c(e)}, 1\}\). Basically, \(g^t(e)\) is the maximum fraction of edge \(e\) such that there is a path from \(t\) to that point of length at most \(L\) whose cost is no more than \(y^*_t\).

Define \(\hat{\beta }^t_e = g^t(e) \cdot c(e)\) and \(\hat{\alpha }_t = y^*_t\). In the following we prove that \(\hat{\beta }\) and \(\hat{\alpha }\) form a feasible solution to D-SLST. It is clear that \(\hat{\beta }\) and \(\hat{\alpha }\) do not violate Constraints 16. The main observation here is that balls \(\{B_t\}_{t\in T}\) are not overlapping: by way of contradiction suppose that there is an edge \(e\) (or a positive fraction of \(e\)) that belongs to two balls \(B_t\) and \(B_{t'}\). This implies there is a point along that common section of \(e\) such that there is a path from that point to each of \(t\) and \(t'\) whose length is smaller than \(L\) and whose cost is smaller than \(y^*_t\) and \(y^*_{t'}\), respecitvely. Therefore, there is a path from \(t\) to \(t'\) of length at most \(2L\) whose cost is smaller than \(y^*_t+y^*_{t'}\), which violates Constraint \(y_t + y_{t'} \le b^*(t,t')\) in MMD. This observation directly shows that Constraints 14 are not violated. Note that \(r\) is also in \(V(F)\) so the ball \(B_r\) is also disjoint from the other balls. As a result, each path \(p\in \mathcal{P}_t\) consists of at least one part in \(B_t\) and one part in \(B_r\), therefore \(p\) is longer than the radius of \(B_t\) which makes Constraints 15 be tight. Thus, \(\hat{\alpha }\) and \(\hat{\beta }\) are feasible solution to D-SLST with value at least \(\sum _{u \in V(F)} y^*_u\) and hence D-SLST has value at least as big as that of MMD.

Now we show how to find an integral matching containing at least \(|T|/3\) nodes. Notice that there is no odd-set constraints in MMP which makes it integral (the integral LP with odd set constraints is known as Edmond’s matching polytope). It is well known that in a basic feasible solution to MMP all \(x_{u,v}\) are in the set \(\{0, \frac{1}{2}, 1 \}\) and the edges with value \(\frac{1}{2}\) make odd cycles Schrijver (2003). This can be proved from the fact that any basic feasible solution cannot be written as convex combination of two other feasible solutions.

Let \(x^*\) be a basic feasible solution to MMP. We add all the edges \(e\) with \(x^*_e = 1\) to \(M\). Moreover, from each odd cycle \(O\), it is easy to see that we can add at least \(\frac{|O|}{3}\) of its edges to \(M\) such that the total cost of added edges is less than \(\sum _{e \in O} x^*_e \cdot c(e)\) taking into account that \(x^*_e = \frac{1}{2}\) for all \(e \in O\). Therefore, \(M\) has at least \(\frac{V(F)}{3}\) edges whose cost is not more than the MMP’s value. As we showed that the value of MMP is not greater than \(\text{ opt }^*\) and as we are able to find a \((1+\epsilon )\)-approximation to \(b^*(u,v)\) for each edge of \(F\), the proof of lemma follows.\(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khani, M.R., Salavatipour, M.R. Improved approximations for buy-at-bulk and shallow-light \(k\)-Steiner trees and \((k,2)\)-subgraph. J Comb Optim 31, 669–685 (2016). https://doi.org/10.1007/s10878-014-9774-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-014-9774-5

Keywords

Navigation