An optimal monotone contention resolution scheme for bipartite matchings via a polyhedral viewpoint

Relaxation and rounding approaches became a standard and extremely versatile tool for constrained submodular function maximization. One of the most common rounding techniques in this context are contention resolution schemes. Such schemes round a fractional point by first rounding each coordinate independently, and then dropping some elements to reach a feasible set. Also the second step, where elements are dropped, is typically randomized. This leads to an additional source of randomization within the procedure, which can complicate the analysis. We suggest a different, polyhedral viewpoint to design contention resolution schemes, which avoids to deal explicitly with the randomization in the second step. This is achieved by focusing on the marginals of a dropping procedure. Apart from avoiding one source of randomization, our viewpoint allows for employing polyhedral techniques. Both can significantly simplify the construction and analysis of contention resolution schemes. We show how, through our framework, one can obtain an optimal monotone contention resolution scheme for bipartite matchings, which has a balancedness of 0.4762. So far, only very few results are known about optimality of monotone contention resolution schemes. Our contention resolution scheme for the bipartite case also improves the lower bound on the correlation gap for bipartite matchings. Furthermore, we derive a monotone contention resolution scheme for matchings that significantly improves over the previously best one. More precisely, we obtain a balancedness of 0.4326, improving on a prior 0.1997-balanced scheme. At the same time, our scheme implies that the currently best lower bound on the correlation gap for matchings is not tight. Our results lead to improved approximation factors for various constrained submodular function maximization problems over a combination of matching constraints with further constraints.


Introduction
Submodular function maximization problems enjoyed a surge of interest recently, both within the theory community and in application-focused areas.This is due to a wide set of applications in fields as diverse as combinatorial optimization, economics, algorithmic game theory, or machine learning (see, e.g., [35,4,28,8,37,47] and references therein).The breadth of settings where submodular functions are found is not surprising in view of the fact that submodularity formalizes a very natural property, namely the property of diminishing marginal returns.More formally, given a finite ground set E, a function f : 2 E → R ≥0 defined on all subsets of E is submodular if In words, the marginal change in f when adding an element e to a set S is the higher the smaller the set S is.Equivalently, submodularity can also be defined by the following uncrossing property Some well-known examples of submodular functions include cut functions of graphs (undirected or directed), coverage functions, joint entropy, and rank functions of matroids.
Whereas there are some interesting unconstrained submodular maximization problems, as for example the MaximumCut problem, one often wants to maximize a submodular function only over some subfamily F ⊆ 2 E of feasible sets.This leads to the problem of constrained submodular function maximization CSFM max S∈F f (S) . (CSFM) The family F is referred to as the family of feasible subsets of E. For instance, if E is the set of edges of a graph G = (V, E), we could be interested in the family F ⊆ 2 E of all forests or all matchings in G.Moreover, we assume the classical value oracle model, where the submodular function f is given through a value oracle that, for any S ⊆ E, returns the value f (S).Submodular maximization is well-known to be hard to solve exactly, as even MaximumCut-which is an unconstrained submodular maximization problem with an explicitly given submodular function-is APXhard.Moreover, the value oracle model leads to information-theoretic hardnesses, which do not rely on complexity-theoretic assumptions like P = NP.For example, Feige, Mirrokni, and Vondrák [16,17] showed that, in the value oracle model, without an exponential number of value queries it is impossible to obtain an approximation factor better than1 /2 for unconstrained submodular function maximization.Clearly, in these hardness results, submodular functions f are considered that are not monotone, because otherwise the ground set E is trivially an optimal solution to the unconstrained problem. 1 However, the problem remains hard to approximate beyond constant factors even for monotone submodular functions as soon as constraints are involved.Indeed, already for a single cardinality constraint, i.e., F := {S ⊆ E | |S| ≤ k}, Nemhauser and Wolsey [38] proved that, for any ε > 0, an exponential number of oracle calls is needed to obtain a (1 − 1 /e + ε)-approximation for CSFM. 2 Therefore, theoretical research in the area of CSFM is mostly centered around the development of approximation algorithms, with (strong) constant-factor approximations being the gold standard.
The focus in CSFM lies on down-closed feasibility families F. 3 If the function f is monotone, this is without loss of generality.Indeed, we can simply optimize over the down-closure {S ⊆ E | S ⊆ T for some T ∈ F} of F, and then raise the found set to a feasible set by potentially adding additional elements, which can only increase the function value due to monotonicity.For non-monotone f , however, the problem quickly gets very hard to approximate.More precisely, Vondrák [45] showed that exponentially many value oracle queries are needed to get a constant-factor approximation for non-monotone CSFM already over the set of bases of a matroid.Due to this, we assume throughout this work that F is down-closed.
Here we are interested in relaxation and rounding approaches for CSFM, two key advantages of which are the following: First, they are very versatile in terms of constraints they can handle, and, second, they allow for breaking the problem down into clean subproblems.Relaxation and rounding approaches work with a relaxation P of the family of feasible sets F. We call a polytope P a relaxation of F ⊆ 2 E if P ⊆ [0, 1] E and P has the same integral points as the combinatorial polytope P F := conv({χ S | S ∈ F}) ⊆ [0, 1] E corresponding to F,4 i.e., P ∩{0, 1} E = P F ∩{0, 1} E (note that this implies P F ⊆ P ).Moreover, relaxation and rounding approaches require an extension F : [0, 1] E → R ≥0 of f .Having fixed a relaxation P of F and an extension F of f , the following two steps comprise a typical relaxation and rounding approach: Relaxation and rounding for CSFM (with relaxation P of F and extension F of f ) (1) Approximately maximize F over P , i.e., max{F (z) | z ∈ P }, to obtain x ∈ P .
(2) Round x to a point χ S ∈ P and return S.
The by far most successful extension F of f used in CSFM is the so-called multilinear extension F ML .For a point x ∈ [0, 1] E , it is defined by the expected value F ML (x) := E[f (R(x))], where R(x) is a random subset of E containing each element e ∈ E independently with probability x e .The success of the multilinear extension is based on the fact that it has rich structural properties that can be exploited in both steps of a relaxation and rounding approach.
Very general results are known for step (1) when F = F ML .More precisely, Vondrák [44] and Cȃlinescu, Chekuri, Pál, and Vondrák [8] proved the following result that holds for the extension F ML of any monotone submodular function f : 2 E → R ≥0 and any down-closed polytope P ⊆ [0, 1] E that is solvable, which means that any linear function can be optimized efficiently over P .For any ε > 0 and b ∈ [0, 1], one can efficiently compute a point x ∈ bP with F ML (x) ≥ (1 − e −b − ε) • f (OPT), where OPT denotes an optimal solution to our CSFM problem.As shown by Mirrokni, Schapira, and Vondrák [36], this result is essentially optimal as it cannot be improved by any constant factor.
Analogous results hold also for non-monotone f , with a weaker constant approximation guarantee, as first shown by Chekuri, Vondrák, and Zenklusen [12].Better constants were later obtained by Feldman, Naor, and Schwartz [21], Ene and Nguy ẽn [15], and Buchbinder and Feldman [6].More precisely, Feldman, Naor, and Schwartz [21] provide an elegant algorithm that, for any b ∈ [0, 1] and ε > 0, returns a point x ∈ bP with F ML (x) ≥ (b • e −b − ε) • f (OPT).For b = 1, the factor was increased to 0.372 in [15], and subsequently to 0.385 in [6]. 5 The ideas in [15] and [6] also seem to work for b < 1.It is not immediate to see, however, what the corresponding approximation guarantees would be in that case.Obtaining a point x in a down-scaled version bP of P can often be interesting because such points are typically easier to round in step (2).
In summary, constant-factor approximations for step (1) with F = F ML (with respect to OPT) can be obtained for any down-closed solvable polytope P .
For step (2), i.e., the rounding of a fractional point, different techniques have been developed.For example, when F is the family of independent sets of a matroid and P = P F , then lossless rounding with respect to the multilinear extension is possible via pipage rounding [2] or swap rounding [10].However, the currently most versatile rounding technique is based on so-called monotone contention resolution schemes (CR schemes), which were introduced in [12].They also have applications beyond CSFM (see, e.g., [25,1,23]).
The goal of this paper is to introduce a new polyhedral viewpoint on CR schemes that avoids some of its complications.Through this new point of view, we design an optimal monotone CR scheme for the bipartite matching polytope, and also beat the previously strongest monotone CR scheme for the general matching polytope.Before expanding on our contributions, we first present a brief introduction to CR schemes in the next subsection, which also allows us later to clearly highlight the benefits of our new viewpoint.

Contention resolution schemes
The key goal when rounding a point x ∈ P to a feasible set S ∈ F is not to lose too much in terms of objective value, i.e., we would like that f (S) is not much less than F ML (x).In view of the way the multilinear extension F ML is defined, the arguably most natural strategy is to randomly round x to a set R(x) ⊆ E that includes each element e ∈ E independently with probability x e .By definition of the multilinear extension F ML , it immediately follows that E[f (R(x))] = F ML (x), meaning that, at least in expectation, the rounding is lossless.The resulting set R(x), however, will typically not be feasible.Contention resolutions schemes address this issue by carefully dropping elements from R(x) to achieve feasibility.
)-balanced contention resolution scheme π for a relaxation P of F is a procedure that, for every x ∈ bP and A ⊆ supp(x), returns a (possibly random) set π x (A) ⊆ A with π x (A) ∈ F and The scheme is monotone if, for all x ∈ bP , it holds Pr[e ∈ π x (A)] ≥ Pr[e ∈ π x (B)] whenever e ∈ A ⊆ B ⊆ supp(x).Moreover, a (1, c)-balanced CR scheme is also called a c-balanced CR scheme.
Notice that the equality in (1) always holds because e ∈ π x (R(x)) can only happen if e ∈ R(x), and, moreover, Pr[e ∈ R(x)] = x e .Below, we exemplify the notion of contention resolution schemes by considering a matching constraint.
Example 2. We describe a CR scheme for the relaxation The box below describes the CR scheme (see Figure 1 for an illustration).

Given x ∈ P G
deg and A ⊆ supp(x), we construct a matching M A ⊆ A in G as follows: (i) Select each e ∈ A independently with probability 1  2 .Denote the resulting set by A.

(ii) Return all isolated edges M
We recall that an edge is isolated in a graph if it is not touched by any other edge in the graph, i.e., it does not have a common endpoint with another edge.Because we only return isolated edges in some subgraph of G, the CR scheme indeed returns a matching.
Note that for an edge e ∈ A to be included in the resulting matching M A , all its adjacent edges in A must be discarded in step (i) while e needs to be selected.The probability of the latter is 1  2 whenever e ∈ A. Moreover, since the probability that all edges in A neighboring e get discarded in step (i) gets smaller the more such edges there are, the scheme is monotone.
To determine the balancedness, let x ∈ P G deg and fix an edge e = {u, v} ∈ supp(x).Recall that x is first rounded independently to obtain A := R(x), and then, in step (i), each edge in A is selected independently with probability 1  2 to obtain A. Hence, the distribution of A is the same as R( x /2).Using a union bound, the probability that R( x /2) \ {e} contains an edge incident to u is at most where we used that x ∈ P G deg .Clearly, the same bound also holds for the probability that an edge in R( x /2) \ {e} is incident to v.Moreover, these two events are independent because e is the only edge with endpoints u and v (because G is simple), implying that with probability at least (1 − 1 2 ) 2 = 1 4 , no edge in R( x /2) \ {e} has u or v as an endpoint.When the latter happens and e itself is contained in R( x /2), e is included in the final matching M A = M R(x) .We therefore get that which shows that the scheme is 1 8 -balanced.
The key property of monotone CR schemes is that their balancedness translates into an approximation factor for the rounding procedure, as highlighted by the following theorem from [12].

Theorem 3 ([12]
).Let π be a monotone (b, c)-balanced CR scheme for a relaxation P ⊆ where F ML is the multilinear extension of a montone submodular function f : 2 E → R ≥0 .Moreover, if f is non-monotone, then there is an efficient procedure that takes π x (R(x)) and returns a set Note that in the theorem above, we have I x ∈ F because I x ⊆ π x (R(x)) ∈ F and we assume that F is down-closed.
Hence, if we have a solvable relaxation P of F and a monotone (b, c)-balanced CR scheme π for P , then step (1) and (2) of the relaxation and rounding approach can be realized as follows.We first compute a point x ∈ bP with F ML (x) ≥ α(b) • f (OPT), where α(b) is a constant factor depending on b and on whether f is monotone or not (see prior discussion).We then use the monotone (b, c)-balanced contention resolution scheme π with respect to x to obtain a random set I x ∈ F as highlighted in Theorem 3 with expected submodular value thus leading to a constant-factor approximation for the considered CSFM problem.
In summary, to obtain a constant-factor approximation for a CSFM problem, it suffices to find a monotone constant-balanced CR scheme for a relaxation P of F that is solvable.(We recall that F is assumed to be down-closed in this paper.)This reduces the problem to the construction of monotone CR schemes, where the latter is oblivious to the underlying submodular function.Another advantage of monotone CR schemes

Independent rounding
Step (i): Subsampling Step (ii): Keeping isolated edges is their versatility in terms of constraints they can handle, as they allow for combining different constraint families.More precisely, let F 1 ⊆ 2 E and F 2 ⊆ 2 E be two down-closed families, and let P 1 and P 2 be relaxations of F 1 and F 2 , respectively.Then, as shown in [12], a monotone (b, c 1 )-balanced CR scheme for P 1 and a monotone (b, c 2 )-balanced CR scheme for P 2 can easily be combined to yield a monotone (b, c 1 • c 2 )-balanced CR scheme for P 1 ∩ P 2 , which is a relaxation of F 1 ∩ F 2 .In fact, the scheme for P 1 ∩ P 2 simply returns the intersection of the sets obtained by applying both schemes.Thus, one can get a monotone constant-balanced CR scheme for any combination of a constant number of arbitrary constraint types as long as one has a monotone constant-balanced CR scheme for every single constraint type.This construction goes along with a reduction in the balancedness, but especially when constraints of various types get intersected, it is often the only known way to get constant-factor approximations.
Examples of constraint types for which monotone constant-balanced CR schemes are known include matroid constraints, knapsack constraints, column-restricted packing constraints, interval packing constraints, and matching constraints (see [12,18,7]).These schemes are with respect to the polytope P = P F for matroid and bipartite matching constraints, or with respect to a natural linear relaxation for the other constraint types.Unfortunately, the construction and analysis of such schemes can be quite intricate.Moreover, while we do have monotone constant-balanced CR schemes for many constraint types, it seems very difficult to find optimal schemes (and prove their optimality).In fact, the only two schemes for such basic constraints that were proven to be (essentially) optimal are a monotone (1−ε, 1−ε)-balanced CR scheme for the natural linear relaxation of a knapsack constraint and a monotone (b, 1−e −b b )-balanced CR scheme for the matroid polytope (see [12]).The existence of the latter scheme was shown using linear programming duality and a concept called correlation gap, originally introduced by Agrawal, Ding, Saberi, and Ye [3] for set functions in the context of stochastic programming.In [12], the notion was extended to families of subsets F ⊆ 2 E as follows.
Definition 4. For F ⊆ 2 E , the correlation gap of F is defined as where R(x) ⊆ E is a random set containing each element e ∈ E independently with probability x e .
The notion of correlation gap is also used for a relaxation P of F, instead of F. In this case, the correlation gap of P is obtained by replacing P F by P in the above definition.
The correlation gap of a family F can be interpreted as a measure of how amenable a constraint family is to independent randomized rounding, as opposed to correlated rounding, and it has interesting applications beyond submodular maximization, for example in stochastic programming (see [3]).Exploiting linear programming duality, one can show that the correlation gap of a family F is equal to the maximum number c such that P F admits a (1, c)-balanced CR scheme [12]. 6Hence, if one can compute (or find a lower bound for) the correlation gap of a family F, one gets that there exists a CR scheme for P F whose balancedness matches the found number.What is important to point out is that this CR scheme is not guaranteed to be monotone. 7However, to obtain the rounding guarantees claimed by Theorem 3, monotonicity is required.
In the context of bipartite matchings, we present a new approach that addresses both difficulties of getting simple CR schemes on the one hand and (provably) optimal monotone schemes on the other hand simultaneously.Our results have implications for CSFM as well as for the correlation gap of matchings in bipartite graphs.While our technique works especially well for bipartite matching constraints, it is very general and its applicability is not restricted to this setting.Moreover, we also consider matchings in general (i.e., not necessarily bipartite) graphs.In the following, we therefore provide a brief overview of the best known monotone CR schemes and bounds on the correlation gap for bipartite and general matchings, before we compare them with the results we obtain through our approach.

Prior results on contention resolution schemes for matchings
Bounds on the correlation gap for matchings in bipartite and general graphs follow directly or can be derived from results in [29,12,14,27].While work from Karp and Sipser [29] yields an upper bound of 0.544 on the correlation gap for matchings in general graphs, Guruganesh and Lee [27] provide a lower bound of 1−e −2 2 ≥ 0.4323.For matchings in bipartite graphs, they were able to improve the lower bound to 1 − 5 2e + 1 e ≥ 0.4481.Using the highlighted link between correlation gap and CR schemes, this implies that there is a (1, 0.4481)-balanced CR scheme for the bipartite matching polytope and a (1, 0.4323)-balanced CR scheme for the general matching polytope.However, these schemes are not given explicitly, and, even more crucially, they are not guaranteed to be monotone.Theorem 3, which is a crucial result for employing such schemes in the context of CSFM, does therefore not apply to them.
The currently best known monotone CR scheme for bipartite matchings is obtained by observing that a bipartite matching constraint can be interpreted as the intersection of two partition matroid constraints.Thus, one can combine two monotone CR schemes for the (partition) matroid polytope.Using the monotone (b, 1−e −b b )-balanced CR scheme for the matroid polytope from Chekuri, Vondrák, and Zenklusen [12], one obtains a monotone (b, ( 1−e −b b ) 2 )-balanced CR scheme for the bipartite matching polytope.Moreover, there exists an elegant monotone CR scheme for the general matching polytope that is (b, e −2b )-balanced (see [7] for a description of the scheme reported in [21]).This scheme is very similar to the one we described in Example 2, which we showed to be monotone and (1, 1  8 )-balanced.The difference is that the subsampling in step (i) is done in a more clever way, thereby improving the balancedness for b = 1 to e −2 ≥ 0.1353.For values of b that are close to 1, a better balancedness is achieved by doing the following.First, one randomly samples a vertex bipartition of the given graph and only keeps the edges crossing the bipartition, i.e., all edges not having both endpoints in the same part of the bipartition.Since the resulting subgraph is bipartite, one can then apply the scheme for the bipartite matching polytope described above.As one can check, this yields a monotone (b, 1  2 ( 1−e −b b ) 2 )-balanced CR scheme for the general matching polytope, where the additional factor of 1  2 is due to an edge surviving the preliminary sampling step only with probability 1 2 .Interestingly, all the above schemes for the general matching polytope also work for the degree-relaxation P G deg (see Example 2) of the set of all matchings in a not necessarily bipartite graph G, and do not require the stronger description of the non-bipartite matching polytope.

Constraint type
Balancedness of monotone CR scheme
In Table 1, an overview of the above results is given.Especially in the case of general matchings, there is a large gap between the balancedness of the best known monotone CR scheme and the balancedness that is known to be achievable by some (not necessarily monotone) CR scheme (via the correlation gap).Moreover, no result in Table 1 is known to be tight.

Our results
With the help of a new viewpoint that we sketch in Section 2, we are able to significantly improve on the state of the art highlighted in Table 1.More precisely, we provide an improved monotone CR scheme for the bipartite matching polytope, which we later show to be optimal.To state its balancedness in the theorem below, we use the function where Pois 1 (b) and Pois 2 (b) are two independent Poisson random variables with parameter b.
Theorem 5.There is a monotone (b, β(b))-balanced contention resolution scheme for the bipartite matching polytope.
We notice that for b = 1, one obtains β(1) ≥ 0.4762.By exploiting the highlighted link between CR schemes and correlation gap, this implies the following.Corollary 6.The correlation gap for matchings in bipartite graphs is at least β(1) ≥ 0.4762. 8  Moreover, the same polyhedral viewpoint that we use for designing CR schemes also enables us to obtain an upper bound on the best possible monotone CR scheme for bipartite matchings, showing that our monotone (b, β(b))-balanced CR scheme is optimal.Theorem 7. Let π be a monotone (b, c)-balanced contention resolution scheme for the bipartite matching polytope, where b, c ∈ [0, 1].Then, it holds that c ≤ β(b).
Note that Theorem 7 does not rule out the existence of a non-monotone CR scheme with higher balancedness. 9This is also why we cannot conclude that the correlation gap for matchings in bipartite graphs is exactly β(1).
Given a bipartite graph G = (V, E) and a non-monotone submodular function f : 2 E → R ≥0 , we can combine the best known algorithm for approximately maximizing the multilinear extension with our monotone CR scheme to obtain a constant-factor approximation for maximizing f over the bipartite matchings of G.In fact, this yields an α(b) • β(b)-approximation, where α(b) is a constant such that we can approximately maximize F ML over any down-closed solvable polytope P ⊆ [0, 1] E to get a point x ∈ bP satisfying F ML (x) ≥ α(b) • f (OPT).Using the algorithm from Feldman, Naor, and Schwartz [21] to get α(b) = b • e −b − ε (for arbitrary ε > 0) and choosing b = 0.6, the factor we can achieve this way is just slightly above 0.2.Since matchings form a 2-exchange system, another option would be to use the algorithm in [22,18] for k-exchange systems to get a 1 4+ε -approximation if the goal is to maximize f only over a bipartite matching constraint.While the latter yields a better constant, the approach based on relaxation and rounding is much more flexible in the sense that we can combine bipartite matching constraints with many other types of constraints and still get a constant-factor approximation (if there are monotone constant-balanced CR schemes for the other constraint types).
Our result for bipartite matchings also yields a monotone (1, 0.3174)-balanced CR scheme for the general matching polytope, i.e., the matching polytope of a not necessarily bipartite graph.Using further ideas, though, we manage to get a scheme with a stronger balancedness.In the theorem below, we use the function where Pois(2b) is a Poisson random variable with parameter 2b. 10   Theorem 8.There exists a monotone (b, γ(b))-balanced contention resolution scheme for the general matching polytope.
We note that for b = 1, one obtains a balancedness of γ(1) ≥ 0.4323.Compared to the previously best known monotone CR schemes for matchings with balancedness 0.1997 (see Table 1), our scheme represents a significant improvement.Interestingly, the existence of a (1, γ(1))-balanced CR scheme for matchings already followed from the result of Guruganesh and Lee [27] on the correlation gap for matchings in general graphs.It was not known, however, if a monotone scheme exists that attains the same balancedness.Moreover, while Guruganesh and Lee [27] arrive at the bound
One might wonder now whether this number may be the optimal balancedness any monotone CR scheme for the general matching polytope can achieve.By combining our schemes for bipartite and general matchings, however, we show that this is not the case by constructing a scheme whose balancedness is slightly higher than 1−e −2 2 .Since this improved scheme is unlikely to be optimal, and our goal in designing it was focused on showing that 1−e −2 2 is not the optimal balancedness, we only consider the case b = 1 and do not attempt to analyze the balancedness of this scheme exactly.Theorem 9.There exists a monotone (1, γ(1) + 0.0003)-balanced contention resolution scheme for the general matching polytope.
Again exploiting the link between CR schemes and correlation gap, we can immediately infer the following result.
As for bipartite matchings, combining an algorithm for maximizing the multilinear extension with our monotone CR scheme will not give the best known approximation guarantee for maximizing a non-monotone submodular function over a matching constraint alone.The advantage of using CR schemes, however, is again their versatility when it comes to combinations of matching constraints with other constraint types.Such combinations quickly lead to problems where approaches based on monotone CR schemes give the only known constant-factor approximations, and our improvements in terms of monotone CR schemes also improve the approximation factors for CSFM in any such setting.

Constraint type
Balancedness of monotone CR scheme
An overview of our results is provided in Table 2.In particular, we are able to close the gap between the balancedness of monotone CR schemes and the best known lower bounds on the correlation gaps in the context of bipartite and general matchings.The correlation gaps might be larger than our bounds, though.

Organization of the paper
In Section 2, we provide a general discussion of our novel viewpoint on CR schemes, and show how it can be used to derive new CR schemes.Leveraging this viewpoint, Section 3 presents our optimal monotone CR scheme for bipartite matchings and proves its optimality.Finally, our results for matchings in general graphs are discussed in Section 4.

Our techniques
Let F ⊆ 2 E be a down-closed family.For simplicity, we present our technique for the case where we are interested in a CR scheme for P = P F .This also covers all cases considered in the following.
We start by highlighting a viewpoint on CR schemes focusing on marginals.To do so, consider a CR scheme π for P F .For any x ∈ P F and A ⊆ supp(x), the CR scheme returns a (typically random) set , and e ∈ E .
Notice that the above definition of y A x can also be written compactly as y A x := E χ πx(A) , where χ πx(A) ∈ {0, 1} E is the (random) characteristic vector of π x (A).Our goal is to design CR schemes through their marginals y A x , and verify the balancedness and monotonicity properties directly through them.As we will see, despite being merely a change in viewpoint, this can lead to several simplifications when designing strong monotone CR schemes.
First, observe that the marginals y A x need to satisfy for all x ∈ P F and A ⊆ supp(x) that and The first property is a rephrasing of π x (A) ⊆ A, and the second one follows because π x (A) is a (random) set in F. Conversely, it turns out that if, for any x ∈ P F and A ⊆ supp(x), one has an efficient procedure to return a vector y A x ∈ [0, 1] E fulfilling ( 2) and ( 3), then this can easily be transformed into a CR scheme whose marginals are given by y A x .Indeed, it suffices to first decompose y A x into a convex combination of vertices of P F , i.e., where k ∈ Z ≥1 , λ i ≥ 0 and S i ∈ F for i ∈ [k], and k i=1 λ i = 1.Then, a random set among S 1 , . . ., S k is returned, where S i is chosen with probability λ i .One can easily check that this leads to a CR scheme with marginals y A x .We highlight that decomposing the vector y A x ∈ P F into a convex decomposition as described in (4) can be done efficiently through standard techniques whenever P F is solvable (see Corollary 14.1f and Corollary 14.1g in [41]). 11otice that the marginals y A x carry less information than a CR scheme that corresponds to them, because the CR scheme also determines, for a fixed x ∈ P F and A ⊆ supp(x), the precise distribution of the sets π x (A) ∈ F that correspond to the marginals y A x .However, this additional information turns out to be irrelevant for the way CR schemes are applied to CSFM problems, because the two key properties we need from CR schemes in this context are monotonicity and balancedness, both of which can be determined solely from the marginals.Indeed, monotonicity of a CR scheme π translates straightforwardly to the following property on the marginals y A x of π: Similarly, we recall that a CR scheme π for • x e for all x ∈ bP F and e ∈ E. Hence, this property solely depends on the probabilities Pr[e ∈ π x (R(x))], which can be written using the marginals y A x of π as Using the above relation, (b, c)-balancedness of a contention resolution scheme π for P F can be expressed in terms of its marginals as The following proposition summarizes the above discussion.
Proposition 11.Let b, c ∈ [0, 1] and F ⊆ 2 E be a down-closed family such that P F is solvable.Any efficient algorithm that for every x ∈ bP F and A ⊆ supp(x) returns a vector y A x ∈ [0, 1] E such that (CR1) supp(y A x ) ⊆ A, and (CR2) y A x ∈ P F , with the additional property that can be efficiently transformed into a (b, c)-balanced CR scheme π for P F .Moreover, π is monotone if Conversely, the marginals of any monotone (b, c)-balanced CR scheme for P F satisfy (CR1)-(CR4).
Defining CR schemes via marginal vectors y A x has two main advantages.First, contrary to the random sets π x (A), the vectors y A x are deterministic, and, more importantly, we can use polyhedral techniques to find CR schemes through these vectors.When working with marginal vectors y A x , the only source of randomness left in the analysis is due to the random set R(x).The randomization of the CR scheme derived from y A x , through the sampling from the convex decomposition (4), is not relevant for the analysis as discussed above.
We demonstrate these advantages of working directly with marginal vectors y A x in the example below, where we give a simple monotone 0.4481-balanced CR scheme for the bipartite matching polytope.This already improves on the previously best monotone CR scheme, which achieves a balancedness of 0.3995, and matches the previously best known lower bound on the correlation gap for matchings in bipartite graphs (see Table 1).Later, in Section 3, we show how to improve this scheme to obtain an optimal monotone CR scheme for the bipartite matching polytope.
Example 12.For a graph G = (V, E), we denote the family of all matching of G by M(G) ⊆ 2 E .Here, we are interested in obtaining a monotone CR scheme for the matching polytope P M(G) of a bipartite graph G = (V, E).We recall that for bipartite graphs G, the polytope P M(G) is equal to the degree-relaxation P G deg , i.e., it has the following inequality description (see, e.g., [42,30]): For c ∈ [0, 1] to be determined later, we now derive a monotone c-balanced CR scheme for P M(G) via its marginals.Below, we describe how these marginals are defined.An illustration is provided in Figure 2.
Given x ∈ P M(G) and A ⊆ supp(x), we construct a marginal vector y A x ∈ P M(G) with supp(y A x ) ⊆ A as follows: Observe that these vectors y A x clearly satisfy (CR1) and (CR2).Since we want to apply Proposition 11 in order to get a monotone c-balanced CR scheme for P M(G) , we also need to check conditions (CR3) and (CR4), which correspond to balancedness and monotonicity, respectively.
Defining the marginals For the latter, we notice that for any x ∈ P M(G) and e = {u, v} ∈ A ⊆ B ⊆ supp(x), we have

Convex decomposition
thus showing (CR4), i.e., the property on marginal vectors that implies monotonicity.
To determine the balancedness, we fix x ∈ P M(G) and e = {u, v} ∈ supp(x).We expand the expression ) e e ∈ R(x) as follows: One way to get a simple, though loose, lower bound on this expression is through Jensen's inequality: In the last step, we used that x ∈ P M(G) .The above implies that the monotone CR scheme we get from our marginals through Proposition 11 is 1 3 -balanced.A more detailed analysis of expression (7) shows that an even better balancedness than 1  3 is actually obtained.Indeed, Guruganesh and Lee [27,Section 4] also analyze expression (7), which, interestingly, they obtain through a different technique.They show the following sharp lower bound: Thus, our monotone CR scheme for the bipartite matching polytope P M(G) is 0.4481-balanced.Compared to the approach in [27], which uses local distribution schemes, we obtain the expression in (7) in a much simpler and quicker way.More importantly, while the existence of a 0.4481-balanced CR scheme for P M(G) already followed from the result by Guruganesh and Lee [27] on the correlation gap of matchings in bipartite graphs, our approach shows that this balancedness can be achieved with a conceptually very simple scheme that satisfies the crucial monotonicity property (see Table 1 for prior results), which is needed to apply Theorem 3 to do the rounding step in the context of submodular maximization.
3 An optimal monotone contention resolution scheme for bipartite matchings As before, let G = (V, E) be a bipartite graph and P M(G) the corresponding (bipartite) matching polytope.
Since one can show that inequality (9) can be tight, the analysis of the balancedness for the scheme presented in Example 12 is tight as well.New ideas are therefore needed to obtain a CR scheme for P M(G) with a stronger balancedness.
In the following, we first examine why the scheme from Example 12 does not have a higher balancedness.This helps to build up intuition on how to adjust the scheme.Our polyhedral viewpoint then leads to a natural formalization of this intuition and allows for analyzing the resulting scheme.Moreover, our approach also allows for giving a simple proof that the scheme we get is optimal among all monotone CR schemes for bipartite matchings.

Developing the scheme
As shown by Guruganesh and Lee [27], tightness of inequality (9) for an edge e = {u, v} ∈ E is approached for the following graph structure and x-values: The edge e has x-value x e = ε for tiny ε > 0, u has only one other edge e 0 incident to it with x e 0 = 1 − ε, and v has k other edges e 1 , . . ., e k incident to it with where k is large.An illustration of this is provided in Figure 3.In particular, for (9) to be (close to) tight for some edge e ∈ E, the edge e needs to be adjacent to an edge g ∈ E that has x-value close to 1.For any such edge g ∈ E with large x-value, however, it is not difficult to see that the expression in ( 9) is considerably larger than 0.4481.Since the balancedness of a CR scheme is a worst-case measure over all edges, one would suspect that truly hard instances exhibit more symmetry and do not have edges with large x-value.It therefore seems plausible that one should be able to do better on the above described instances by balancing things out, meaning that it is only a feature of the specific scheme given in Example 12 that causes it to have problems rather than an inherent difficulty of these instances.Indeed, the following lemma shows that the hardest instances (independent of a specific scheme) are actually those where all edges have small x-value.Lemma 13.Let c ∈ [0, 1] and ε > 0. If there is a monotone contention resolution scheme for the matching polytope

then there exists a monotone c-balanced contention resolution scheme for the matching polytope of any bipartite graph (without any restriction).
A generalized version of this statement that goes beyond (bipartite) matchings is given in Lemma 22 in Appendix A.1.There, we also provide a full proof.Nevertheless, also here we briefly want to give some intuition why the statement holds since this motivates the construction of the procedure we describe below.If we are given a point x ∈ P M(G) such that there are edges with large x-value, the idea is to do the following.
For every edge e ∈ E, split e into k copies e 1 , . . ., e k and distribute the value x e uniformly among these k edges, i.e., each copy gets an x-value of xe k ≤ ε. 3. Independently round the new point x and apply the scheme for points with small components to the resulting set R(x) to get a bipartite matching I x in the graph with the split edges.4. For each edge e ∈ E, replace any occurrence of a copy of e in I x by e (observe that at most one of e 1 , . . ., e k can be in I x ).
Notice that the above yields a bipartite matching in the original graph G.The issue with this approach, however, is that it will typically not be computationally efficient.We can circumvent this problem by simulating the splitting without actually having to do it.This is achieved by the scheme for P M(G) we describe next.Let x ∈ P M(G) and A ⊆ supp(x).By Proposition 11, all we have to do is to find an (efficient) procedure that returns a vector y A x ∈ [0, 1] E which satisfies (CR1)-(CR4).We start by constructing a random subset A ⊆ A, where each edge e ∈ A is included in A independently with probability (1 − e −xe )/x e .Notice that (1 − e −xe )/x e is almost 1 for small x e ∈ [0, 1] but approaches 1 − e −1 = 0.63212 . . .for large x e ∈ [0, 1].While edges with small x-value are therefore almost unaffected by this step, edges with large x-value get penalized.Next, we define a vector q ∈ Z E ≥0 as follows.For each edge e ∈ A, we let q e ∈ Z ≥1 be an independent realization of a Pois(x e )-random variable conditioned on it being at least 1, and for each edge e ∈ E \ A, we let q e := 0.Then, for each edge e = {u, v} ∈ E, we set x ) e := q e max{ g∈δ(u) q g , g∈δ(v) q g } .
Throughout this work, we use the convention that the latter is equal to 0 if q e = 0, even if the denominator also equals 0. A formal description of this scheme is provided below (Algorithm 1).Clearly, we have that y A x ∈ P M(G) and supp(y A x ) ⊆ A. Moreover, we will show later that via Proposition 11, this procedure yields the monotone (b, β(b))-balanced CR scheme for P M(G) whose existence is claimed in Theorem 5.
Algorithm 1: Contention resolution for P M(G) x ∈ P M(G) with supp(y A x ) ⊆ A. 1 Sample A ⊆ A by including edge e ∈ A independently with probability (1 − e −xe )/x e ; 2 For each edge e ∈ A, let q e ∈ Z ≥1 be an independent realization of a Pois(x e )-random variable conditioned on it being at least 1; 3 For each edge e ∈ E \ A, let q e := 0; 4 For each edge e = {u, v} ∈ E, let (y A x ) e := qe max{ g∈δ(u) qg, g∈δ(v) qg} ; 5 Return y A x ; While a short motivation for the subsampling step was already given above (penalization of edges with large x-value), we also want to explain why the use of (conditioned) Poisson random variables is quite natural.As was mentioned before, the instances which cause most difficulties for the scheme given in Example 12 are those where edges with large x-value are present (see also Figure 3).However, Lemma 13 tells us that by splitting edges we can avoid such instances.In this context, given x ∈ P M(G) , the splitting would work as follows.
1. Let k ∈ Z >0 be large.it is irrelevant which copies e 1 , . . ., e k of a given edge e ∈ E appeared in the independent rounding step; all that matters is how many of them appeared.By construction, this number follows a Bin(k, xe k )-distribution, which, for k → ∞, converges to a Pois(x e )-distribution.Hence, this is where the Poisson random variables naturally emerge.By using them directly, we can avoid the splitting while still getting the same (improved) results we would get by actually doing it.In addition, it makes our analysis much shorter and easier to follow.
Moreover, the subsampling step and the subsequent use of conditioned Pois(x e )-random variables in Algorithm 1 fit together very well.To see why, let x ∈ P M(G) be a point we want to round with the help of the scheme from Algorithm 1. First, we independently round x to get a set R(x) ⊆ supp(x) and then construct a subset R(x) ⊆ R(x) by including each edge e ∈ R(x) independently with probability (1 − e −xe )/x e .Thus, we have that a given edge e ∈ E appears in the random set R(x) independently with probability The above exactly matches the probability that a Pois(x e )-random variable is at least 1 (or, equivalently, does not equal 0).Therefore, independently rounding a point x ∈ P M(G) and then applying Algorithm 1 to the resulting (random) set R(x) actually amounts to do the following. 12  Algorithm 2: Combining independent rounding with Algorithm 1 Input: Point x ∈ P M(G) .
Output: Point y x ∈ P M(G) with supp(y x ) ⊆ supp(x).
1 For each edge e ∈ E, let q e ∈ Z ≥0 be an independent realization of a Pois(x e )-random variable; 2 For each edge e = {u, v} ∈ E, let (y x ) e := qe max{ g∈δ(u) qg, g∈δ(v) qg} ; 3 Return y x ; It is important to note here that the vectors y A x ∈ P M(G) , which are constructed by the scheme described in Algorithm 1, are random.Thus, they only correspond to "conditional" marginals (conditioned on the set A ⊆ A and the values of q e ∈ Z ≥1 for e ∈ A).The true marginals of the scheme are given by E[y A  x ] ∈ P M(G) .Because we do not know of an elegant closed-form expression for these expectations, however, we prefer to work with the conditional marginals y A x .This is simpler both from a conceptual as well as from a computational point of view.Moreover, our polyhedral approach is flexible enough to be applicable in this setting as well.Indeed, using it allows us to give an easy proof that the procedure given in Algorithm 1 satisfies (CR1)-(CR4) and can therefore, via Proposition 11, be efficiently transformed into a monotone (b, β(b))-balanced 13 contention resolution scheme for P M(G) .
Proof of Theorem 5. Consider the procedure described in Algorithm 1.Given x ∈ P M(G) and A ⊆ supp(x), the construction of y A x clearly ensures that supp(y A x ) ⊆ A, meaning that (CR1) is satisfied.Moreover, conditioning on the set A ⊆ A and the vector q ∈ Z E ≥0 , it holds for any vertex v ∈ V that q e g∈δ(v) q g ≤ 1 . 14  Since it also holds that y A x ≥ 0, the above implies y A x ∈ P M(G) .Thus, (CR2) is fulfilled as well.As noted before, the vectors y A x ∈ P M(G) that are constructed by our procedure are random, and therefore correspond to conditional marginals.For x ∈ P M(G) and A ⊆ supp(x), the true marginals are given by E[y A  x ], where the expectation is over the random set A ⊆ A and the realizations q e of the (conditioned) Poisson random variables.Since the vectors y A x satisfy (CR1) and (CR2), so do the true marginals E[y A x ].We now show monotonicity of our procedure by proving that the true marginals satisfy (CR4).To this end, let x ∈ P M(G) and e = {u, v} ∈ A ⊆ B ⊆ supp(x).Moreover, for each edge g ∈ E, we let Q g be an independent Pois(x g )-random variable conditioned on it being at least 1.Since it is possible to couple the random sets A ⊆ A and B ⊆ B, which we get in the subsampling step of Algorithm 1, such that 12 Notice that Algorithm 2 is not a procedure that can directly be transformed into a contention resolution scheme for P M(G) via Proposition 11. 13 We recall that β(b) := E 14 Notice that we interpret, as previously discussed, the fraction qe g∈δ(v) qg as 0 if both numerator and denominator are 0. Due to this, the last inequality may be strict, and can therefore not be replaced by an equality.
where the expectation is taken over the random sets A ⊆ A and B ⊆ B as well as the random variables Q g , g ∈ E. Hence, our procedure also satisfies (CR4).
To prove the claimed balancedness, fix b ∈ [0, 1], x ∈ bP M(G) , and e = {u, v} ∈ supp(x).From the discussion preceding this proof, we get that the distribution of the random vector y

R(x) x
constructed by Algorithm 1 for the independently rounded set R(x) is the same as the distribution of the random vector y x constructed by Algorithm 2. Hence, if we can show that then (CR3) is fulfilled as well.It therefore only remains to show (10).For this purpose, let Q g for g ∈ E be independent random variables, where for each edge g ∈ E, Q g follows a Pois(x g )-distribution.We then have In proving (10).The last inequality holds since the distribution of Pois a (ξ) + max{Pois b (ζ), Pois c (ζ)} is stochastically dominated by the distribution of max{Pois a 1 (ξ) + Pois b (ζ), Pois a 2 (ξ) + Pois c (ζ)}.A formal statement of this claim is given in Lemma 25 in Appendix A.2.Moreover, note that if there was another edge h ∈ E \ {e} with the same endpoints as e = {u, v}, not all random variables in the expression max{ g∈δ(u)\{e} Pois g (x g ), g∈δ(v)\{e} Pois g (x g )} would be independent.However, Lemma 25 (i.e., the statement mentioned above) also shows that we can assume independence of all these random variables since this only makes it more difficult to achieve a high balancedness.
Since the procedure given in Algorithm 1 satisfies (CR1)-(CR4), Proposition 11 states that we can efficiently transform it into a monotone (b, β(b))-balanced CR scheme for P M(G) , which proves Theorem 5.
As mentioned earlier, the procedure described in Algorithm 1 avoids problems with instances that have edges with large x-value by simulating the splitting of such edges.For instances where all edges have small x-value, this is not necessary.Indeed, using Algorithm 1 for such instances basically amounts to the same as applying the very simple procedure described in Example 12.

Optimality
We now use our polyhedral approach to prove that there is no monotone contention resolution scheme for the bipartite matching polytope that achieves a higher balancedness than the monotone scheme we get from the procedure described in Algorithm 1.This shows that our CR scheme for bipartite matchings is optimal when requiring monotonicity, which is crucial when using contention resolution through Theorem 3 in the context of CSFM.
Proof of Theorem 7. Let π be a monotone (b, c)-balanced CR scheme for the bipartite matching polytope.Moreover, for n ∈ Z >0 large, let K n,n = (U ∪ V, E) be the complete bipartite graph on 2n vertices and define x ∈ [0, 1] E by x e := b n for each edge e ∈ E. Clearly, it holds that x ∈ bP M(Kn,n) .In Figure 4, it is shown how this instance looks like from the perspective of a fixed edge e = {u, v}.The reason why we consider such an instance is Lemma 13 which implies that the hardest instances are those where all edges have small x-value.Observe that K n,n and x ∈ bP M(Kn,n) are completely symmetric with respect to permutations of U and permutations of V .Thus, we can assume that the same is true for π x . 15Moreover, since there is nothing to show if b = 0, we only consider the case b > 0. In particular, this means that supp(x) = E.
We now study the marginals y A x := E[χ πx(A) ] for A ⊆ E, and claim that for every e = {u, v} ∈ E and A ⊆ E with e ∈ A, it holds that By (CR3), this implies x where Here, we used that each edge g ∈ E is included in R(x) with probability x g = b n , independently of all other edges.Since ( 12) is true for any n ∈ Z >0 , we can use that a where Pois 1 (b) and Pois 2 (b) are two independent Pois(b)-random variables.This is exactly what we want to show.Hence, in order to finish the proof of Theorem 7, it only remains to show (11).
To do so, let e = {u, v} ∈ A ⊆ E, where u ∈ U and v ∈ V .Defining B := δ(u) ∩ A, the fact that y B x ∈ P M(Kn,n) implies We now use our assumption on the symmetry of π x to get that (y B x ) e = (y B x ) g for each g ∈ B (note that for any two edges g 1 , g 2 ∈ B ⊆ δ(u), there is a permutation of N B (u) := {w ∈ V | {u, w} ∈ B} ⊆ V that leaves B invariant and maps g 1 to g 2 ).Moreover, monotonicity of π implies by (CR4) that the marginals satisfy (y B x ) e ≥ (y A x ) e .Putting everything together, this means that Doing the same for v instead of u, we also get implying together with the previous inequality that The above shows (11), and thereby concludes the proof of Theorem 7. 16 Even though this is not relevant for our derivations, we highlight that the inequality g∈B (y B x )g ≤ g∈δ(u) (y B x )g actually even holds with equality because supp(y B x ) ⊆ B.

A monotone contention resolution scheme for general matchings
We now turn our attention to general matchings.Throughout this section, we consider a graph G = (V, E) and denote the set of all matchings of G by M(G).

Developing the scheme
In order to get a first monotone CR scheme for a matching constraint, we can reuse our scheme for bipartite matchings.Given the graph G and a point x ∈ P M(G) , we first sample a bipartite subgraph G ′ = (U ∪ (V \ U ), E ′ ) by including each vertex v ∈ V in U independently with probability 1 2 and only keeping edges with one endpoint in U and one endpoint in V \ U .Then, we simply apply our monotone CR scheme for bipartite matchings to x| E ′ ∈ P G ′ deg .Since an edge e ∈ E appears in E ′ with probability 1 2 , the resulting monotone scheme for P M(G) is (b, 1  2 • β(b))-balanced. 17This already beats the previously best monotone CR scheme for general matchings (see Table 1).However, using our polyhedral approach again, we can easily do better.We recall that the matching polytope P M(G) can be described as where E[S] ⊆ E denotes the set of all edges with both endpoints in S ⊆ V and In particular, it is well-known and easy to see that 2  3 P G deg ⊆ P M(G) .Hence, given a point x ∈ P M(G) ⊆ P G deg , we can apply the procedure described in Section 3 to get a point y x ∈ P G deg and scale it with 2  3 to obtain a point in P M(G) .This way, we only lose a factor of 1 3 instead of 1 2 , resulting in a monotone (b, 2  3 • β(b))-balanced CR scheme for P M(G) .In the following, we first present a very simple scheme whose balancedness is already higher than 2 3 • β(1) ≈ 0.3174.Understanding which cases cause this scheme to have problems then enables us to give an improved monotone CR scheme for P M(G) that proves Theorem 8.
Example 14.Given a graph G = (V, E), a point x ∈ P M(G) , and a set A ⊆ supp(x), the following procedure yields a matching M A x ⊆ A in G. 1. Choose an order on the edges in A uniformly at random.

Include an edge e = {u, v} ∈ A in M A
x if e is the first one in the order among all edges in (δ(u) ∪ δ(v)) ∩ A, i.e., among all edges in A adjacent to e.
Since the above procedure makes sure that no two adjacent edges get selected, it clearly yields a matching contained in A. Also, the probability of an edge e = {u, v} ∈ A being included in M A x decreases when (δ(u)∪δ(v))∩A gets larger, i.e., when the number of edges in A adjacent to e increases.The above therefore describes a monotone CR scheme for P M(G) .
In order to determine the balancedness of this scheme, we consider its marginals. 18For an edge e = {u, v} ∈ A to be included in M A x , it has to be the first one among all edges in (δ(u) ∪ δ(v)) ∩ A with respect to the random order on A. Since this happens with probability exactly 1 |(δ(u)∪δ(v))∩A| , we obtain that for x ∈ P M(G) and A ⊆ supp(x), the marginal vector y A x of this CR scheme equals An illustration is provided in Figure 5.Note that since y A x is the vector of marginals of a CR scheme for P M(G) , we automatically get that y A x is contained in the matching polytope P M(G) (and that supp(y A x ) ⊆ A, which is trivial to see anyway).
1 /4 1 /5 1 /5 Obtaining the marginals Figure 5: The marginal vector corresponding to the described monotone contention resolution scheme for the matching polytope P M(G) .
To determine the balancedness of our scheme, we fix x ∈ P M(G) and e = {u, v} ∈ supp(x).We then obtain Repeating the calculations in (8), we see that the latter expression is at least 1  3 , meaning that the described scheme is 1  3 -balanced.In contrast to (7), however, the analysis is tight here.This is shown by the example given in Figure 6.
The blue numbers indicate the x-value of each edge.For ε going to 0, the balancedness of the middle edge e = {u, v} converges to 1  3 .This holds since both edges adjacent to e appear in R(x) with probability (1−ε) 2 , meaning that when e = {u, v} appeared in R(x), its two adjacent edges will most likely have appeared in R(x) as well.In that case, e = {u, v} is only selected if it is the first among these three edges in the random order of all edges that appeared in R(x).
While the above already beats the previously best monotone CR scheme for matchings (see Table 1), we can improve it further.Observe that, as in the bipartite setting, the presence of edges having large x-value are crucial to build a worst case for the above analysis.However, as we already discussed in the bipartite case, one can reduce to instances with only small x-values through edge splitting.(This is formally stated by Lemma 22 in Appendix A.1.)Algorithm 3 below describes the scheme that results from applying the splitting technique to the CR scheme described in Example 14.More precisely, analogous to the bipartite case, Algorithm 3 corresponds to splitting each edge into many parallel copies with small equal x-value, then applying the scheme from Example 14, and finally interpreting the result in the original graph.As previously, the Poisson random variables indicate how many of the parallel copies appeared.As we prove in the following, the CR scheme described by Algorithm 3 implies Theorem 8. 2 For each edge e ∈ A, let q e ∈ Z ≥1 be an independent realization of a Pois(x e )-random variable conditioned on it being at least 1; 3 For each edge e ∈ E \ A, let q e := 0; 4 For each edge e = {u, v} ∈ E, let (y A x ) e := qe g∈δ(u)∪δ(v) qg ; 5 Return y A x ; For the ratio qe g∈δ(u)∪δ(v) qg in line 4 of the algorithm, we use the same convention as in the bipartite case, i.e., we consider this ratio to be 0 if both numerator and denominator are 0. To show that Algorithm 3 indeed implies Theorem 8, we need to analyze the returned marginal vector y A x for x ∈ P M(G) and A ⊆ supp(x), and show that it fulfills (CR1)-(CR4) with the balancedness claimed in Theorem 8.
Be definition of the scheme, the returned random marginals y A x clearly fulfill (CR1), i.e., supp(y A x ) ⊆ A. Moreover, the following lemma shows that (CR2) holds, too, i.e., y A x is in the matching polytope P M(G) .Proof.Given w ∈ R E ≥0 , note that we can without loss of generality assume that supp(w) = E.We then define a random matching M ⊆ E as follows.Letting d e for each edge e ∈ E be a realization of an independent Exp(w e )-random variable D e , we select an edge e = {u, v} ∈ E only if its realization d e is strictly smaller than all realizations d g for g ∈ (δ(u) ∪ δ(v)) \ {e}, i.e., we consider all edges sharing (at least) one vertex with e.Clearly, the resulting set M is a matching in G.Moreover, we claim that E[χ M ] = z, which proves z ∈ P M(G) .
For a fixed edge e = {u, v} ∈ E, we have To analyze the above expression, we use the following two properties of exponential random variables.For any two independent exponential random variables Exp 1 (ξ) and Exp 2 (ζ), we have that: Note that, as in Section 3, the vectors y A x ∈ P M(G) produced by Algorithm 3 are random.The true marginals of the scheme are given by E[y A  x ], where the expectation is over the random set A ⊆ A and the realizations q e of the (conditioned) Poisson random variables.Since the vectors y A x satisfy (CR1) and (CR2), so do the true marginals E[y A  x ].We now show that the CR scheme described by Algorithm 3 is monotone, i.e., it fulfills (CR4), which means E[(y A x ) e ] ≥ E[(y B x ) e ] for any x ∈ P M(G) and e ∈ A ⊆ B ⊆ supp(x).
Proof.Let x ∈ P M(G) and e = {u, v} ∈ A ⊆ B ⊆ supp(x).Moreover, for each edge g ∈ E, let Q g be an independent Pois(x g )-random variable conditioned on it being at least 1.Since it is possible to couple the random sets A ⊆ A and B ⊆ B, which we get in the subsampling step of Algorithm 3, such that where the expectation is taken over the random sets A ⊆ A and B ⊆ B as well as the random variables Q g , g ∈ E. This proves that (CR4) is satisfied.
All that remains to be shown to prove Theorem 8 is that the CR scheme defined by Algorithm 3 has a good balancedness, where the scheme has a balancedness of c > 0 if the marginal vector y A x , for A = R(x), fulfills (CR3).To this end, we first present a simpler procedure with the same output distribution as y R(x) x .This procedure, shown below as Algorithm 4, corresponds to merging the step of randomly rounding x to obtain R(x) with Algorithm 3 into a single procedure.Because it merges these two steps, it is not a CR scheme itself, as it does not take R(x) as input to produce a feasible subset.This difference is crucial when we want to combine CR schemes for different constraints.We recall that in this case each CR scheme takes the same random set R(x) as input, and one returns the intersection of the outputs of the different schemes.This is one main reason why Algorithm 3 cannot simply be replaced by the simpler Algorithm 4. Nevertheless, because the output distribution of Algorithm 3 applied to R(x) is the same as the output of Algorithm 4, as we show in Lemma 17 below, we can use the simpler Algorithm 4 to analyze the balancedness of Algorithm 3.

Lemma 17. Let x ∈ P M(G) . Then the random marginal vector obtained by Algorithm 3 when applied to R(x) has the same distribution as the random marginal vector obtained by Algorithm 4.
Algorithm 4: Combining independent rounding with Algorithm 3 Input: Point x ∈ P M(G) .Output: Point y x ∈ P M(G) with supp(y x ) ⊆ supp(x).
1 For each edge e ∈ E, let q e ∈ Z ≥0 be an independent realization of a Pois(x e )-random variable; 2 For each edge e = {u, v} ∈ E, let (y x ) e := qe g∈δ(u)∪δ(v) qg ; 3 Return y x ; Proof.When using Algorithm 3 to round a given point x ∈ P M(G) , we start by independently rounding x to get a set R(x) ⊆ supp(x) and then apply Algorithm 3 to x and A = R(x).In a first step, the latter amounts to sampling a subset A ⊆ A by including each edge e ∈ A = R(x) independently with probability (1 − e −xe )/x e .A given edge e ∈ E therefore appears in the random set A independently with probability which equals the probability that a Pois(x e )-random variables is at least 1 (or, equivalently, does not equal 0).Given A ⊆ A = R(x), Algorithm 3 then sets q e ∈ Z ≥0 to be an independent realization of a Pois(x e )random variable conditioned on it being at least 1 if e ∈ A, and 0 otherwise.Using ( 14), we see that the resulting distribution is indeed the same as the one of a Pois(x e )-random variable.Since all edges are treated independently, we conclude that the random vector y A x obtained by Algorithm 3 when applied to x and A = R(x) has the same distribution as the random vector y x obtained by Algorithm 4 when applied to x.
Finally, we now prove that Algorithm 3 has the balancedness claimed by Theorem 8. Due to Lemma 17, this boils down to showing that for x ∈ bP M(G) , the random marginal vector y x returned by Algorithm 4 fulfills (CR3) for c = γ(b). 19This implies by Proposition 11 that Algorithm 3 can be efficiently transformed into a monotone (b, γ(b))-balanced CR scheme, showing Theorem 8.The line of argument is very similar to the one of the proof of Theorem 5 in Section 3.
, and e = {u, v} ∈ supp(x).As already mentioned above, Theorem 8 follows if we can show that where y x is the random vector returned by Algorithm 4.
To prove (15), we let Q g for g ∈ E be independent random variables, where for each edge g ∈ E, Q g follows a Pois(x g )-distribution.Moreover, we define the set E uv ⊆ E of all edges in E that go from u to v (including the edge e itself), and set x uv := x(E uv ), x u := x(δ(u)), and x v := x(δ(v)).With this, we have that In order to analyze the above expression, we use the same simplified notation that was already helpful in the proof of Theorem 5. We let Bern i (ξ) denote a Bernoulli random variable with parameter ξ and Pois j (ζ) 19 We recall that γ(b) a Poisson random variable with parameter ζ, where we assume that all random variables that appear are independent when they have different subscripts.Recall again that the sum of two independent Poisson random variables Pois 1 (ξ) and Pois 2 (ζ) has a Pois(ξ + ζ)-distribution and that k i=1 Bern i ( ξ k ) approaches a Pois(ξ)-distribution as k → ∞.Using these properties as well as dominated convergence and linearity of expectation, we obtain which shows In particular, it holds that where we used that x ∈ bP M(G) implies x(δ(w)) ≤ b for any vertex w ∈ V .The above proves (15), and therefore shows that Algorithm 3 satisfies (CR3) with c = γ(b).
We remark that even though (17) was sufficient for our purpose above, (16) shows that in some cases, we actually have some slack.This is something we exploit in the next subsection to show that even stronger CR schemes exist for P M(G) .However, we note that our analysis of the balancedness of our scheme is tight.This is true since we can have an edge e = {u, v} ∈ E such that x uv = x(E uv ) is very small while x u = x(δ(u)) and x v = x(δ(v)) are almost equal to b (as depicted, for example, in Figure 6 for b = 1).
The scheme given in Algorithm 3 is inspired by the very simple scheme for P M(G) that is described in [7] (it was first reported in [21]).Given a point x ∈ P M(G) and a set A ⊆ supp(x), this scheme first constructs a random set A ⊆ A by including each edge e ∈ A independently with probability (1 − e −xe )/x e .Then, it only keeps edges in A that share no endpoint with other edges in A (clearly, the resulting set is a matching).While our scheme starts with the same subsampling, we fix the second step which is quite wasteful.Instead of discarding all edges in A that share an endpoint with another edge in A, we only discard an edge e ∈ A if it shares an endpoint with another edge in A that appears before e in some random ordering of A. This idea is exactly what is reflected by our marginals.
Note that in order to turn Algorithm 3 into a monotone (b, γ(b))-balanced CR scheme in the sense of Definition 1, we have to sample a matching according to the returned marginal vector y A x ∈ P M(G) .One way to do this is explicitly decomposing y A x into a convex combination of matchings in G, which, as mentioned in Section 2, can be done efficiently through standard techniques.For the marginals y A x produced by Algorithm 3, however, there is a more direct way.Having constructed the vector q ∈ Z E ≥0 , we sample for each edge e ∈ E an independent realization d e of an Exp(q e )-random variable.Then, we only keep an edge e = {u, v} ∈ E if d e < min{d g | g ∈ (δ(u) ∪ δ(v)) \ {e}}.Clearly, this results in a (random) matching M in G.Moreover, the proof of Lemma 15 shows that By replacing line 4 of Algorithm 3 with the above, we could therefore turn Algorithm 3 into a CR scheme according to Definition 1.Nevertheless, the marginal formulation of Algorithm 3 helped to analyze its balancedness and will also be useful for showing non-optimality of this scheme in the next subsection.

Non-optimality
Since the monotone CR scheme we developed for general matchings is very simple and attains a seemingly "natural" balancedness, the question arises whether it is optimal.The goal of this section is to show that it is not.Before presenting a formal proof, we provide some intuition why it can be improved.
Since our scheme for bipartite matchings achieves a higher balancedness than our scheme for general matchings, one natural way to try to strengthen our CR scheme for general matchings is to combine it with the one for bipartite matchings.More precisely, given a graph G = (V, E), a point x ∈ P M(G) , and a subset A ⊆ supp(x), we would first sample a set A ⊆ A again.Then, we could identify the connected components of G ′ = (V, A) and apply to each component that is bipartite our scheme for bipartite matchings (without the subsampling), and only to the other ones our scheme for general matchings (also without the subsampling).As we show below, this is easily seen to yield a monotone CR scheme for the general matching polytope with no lower balancedness than that of Algorithm 3 (see Theorem 8).Our goal, however, is to prove that it attains a strictly higher balancedness.For completeness, a formal description of this combined scheme is given in Algorithm 5.

Algorithm 5: Contention resolution for P M(G)
2 For each edge e ∈ A, let q e ∈ Z ≥1 be an independent realization of a Pois(x e )-random variable conditioned on it being at least 1; Lemma 18. Algorithm 5 defines a monotone (b, γ(b))-balanced contention resolution scheme for the general matching polytope.
Proof.Given a graph G = (V, E), we consider the procedure described in Algorithm 5 and show that it satisfies (CR1)-(CR4) of Proposition 11.This then implies Lemma 18.
Since we can treat different connected components separately and since the procedures in Algorithm 1 and Algorithm 3 are valid CR schemes for the bipartite and the general matching polytope, respectively, we immediately get that (CR1) and (CR2) are fulfilled.
Moreover, we note that it holds for any q ∈ Z E ≥0 and any e = {u, v} ∈ E that q e max{ g∈δ(u) q g , g∈δ(v) This implies that the marginals constructed by Algorithm 1 always dominate the marginals constructed by Algorithm 3. In particular, the balancedness of this new CR scheme will be no worse than the balancedness of our previous scheme for general matchings (Algorithm 3), which was shown to be (b, γ(b))-balanced.
In order to get monotonicity of our scheme, it only remains to observe that whenever an edge belongs to a bipartite connected component of some graph, then removing some other edges from the graph will not change this (the connected component might get smaller, though).Together with (18) and the fact that Algorithm 1 and Algorithm 3 are monotone schemes, this implies that Algorithm 5 is monotone as well.
In the following, we provide a formal proof that Algorithm 5 actually achieves a strictly higher balancedness than Algorithm 3. First, however, we try to build up intuition why this should indeed be true.Given a graph G = (V, E) and a point x ∈ P M(G) , consider an edge e = {u, v} ∈ supp(x).As an example, assume that after the independent rounding and the subsampling step, e ended up in a connected component consisting of e = {u, v}, one other edge g incident to u (but not v), and one other edge h incident to v (but not u).Moreover, assume that the respective (conditioned) Poisson random variables all realized to 1, i.e., we have q e = q g = q h = 1.As depicted in Figure 7, this can happen in two different ways.For the edge e, the scheme from Algorithm 3 does not distinguish between these two cases and assigns the same value of 1  3 to e. On the other hand, in the case where e, g, and h do not form a triangle, our new scheme from Algorithm 5 applies the scheme for bipartite matchings to this component.This results in e being assigned a value of 1  2 instead of 1 3 .
Case 1 Poisson random variables all realized to 1.For both cases, the realizations of the (conditioned) Poisson variables are shown on the left, while the values set by the schemes from Algorithm 3 and Algorithm 5 are given on the top and bottom right, respectively.Since the component containing e is not bipartite in Case 1, there is no difference between the two schemes.In Case 2, however, Algorithm 5 assigns a value of 1 2 instead of 1 3 to e.
Besides the example described above, there are many more settings in which an edge ends up in a bipartite connected component and gains, to different extents, from applying the bipartite scheme to this component.A sharp analysis of our new procedure would require to consider all these different cases, and therefore seems very difficult.However, as mentioned in the introduction already, the main motivation for studying this scheme is showing that one can improve on the scheme from Algorithm 3. To do this, an exact analysis is not needed; in fact, it is actually enough to only account for the case described above (Case 2 in Figure 7).Moreover, we only consider the balancedness for b = 1.This enables us to show that Algorithm 5 yields a monotone (1, γ(1) + 0.0003)-balanced CR scheme for the matching polytope P M(G) , thereby proving non-optimality of the scheme given in Algorithm 3. 20Proof of Theorem 9. Given a graph G = (V, E), we consider the procedure defined by Algorithm 5. From Lemma 18, we already know that it is a monotone CR scheme for the general matching polytope.Hence, it only remains to consider the balancedness.
To do this, we fix a point x ∈ P M(G) and an edge e = {u, v} ∈ supp(x).We would like to show that conditioned on e appearing in the independently rounded set R(x), the following happens with constant probability (see Case 2 in Figure 7): (C 1 ) e = {u, v} survives the subsampling step, (C 2 ) it ends up in a connected component that is a path of length 3 with e as middle edge, (C 3 ) the realizations of the Poisson random variables of the edges in this path all equal 1.
The last condition is important since the gain from using the bipartite scheme could become smaller when the Poisson random variables take on different values.
For an arbitrary x ∈ P M(G) , however, the above does not happen with constant probability.The good news is that it can only fail for x ∈ P M(G) for which the balancedness of the edge e is higher than γ(1) already, namely in the following cases.If the x-load x u := x(δ(u)) or x v := x(δ(v)) on one of the endpoints of e is bounded away from 1, then (16) shows that the balancedness of e is strictly larger than γ(1) = E 1 1+Pois (2) .The same is also true if the x-load x uv := x(E uv ) between the endpoints of e is bounded away from 0, where E uv again denotes the set of all edges in E that go from u to v (including e).This happens, for example, if x e itself is bounded away from 0. More precisely, if x(δ(u)\E uv ) < 0.99, x(δ(u)\E uv ) < 0.99, or x(E uv ) > 0.01, it follows from (18) and ( 16) that E[(y R(x)   x 1 − e −1.99 1.99 ≥ x e • 0.4338 ≥ x e • (γ(1) + 0.0003) .
For such an x ∈ P M(G) , we can show that conditioned on e ∈ R(x), (C 1 )-(C 3 ) happens with probability at least 0.0018.This is the statement of Lemma 26 in Appendix A.3, where we also provide a formal proof.Thus, using the scheme for bipartite matchings in this case increases the balancedness of e by at least This means that the overall balancedness of e is at least γ(1) + 0.0003, as desired.
As was done with Algorithm 1 and Algorithm 3, we can also combine the independent rounding step with Algorithm 5.The resulting procedure, which is given in Algorithm 6, only takes a point x ∈ P M(G) and returns a random vector y x ∈ P M(G) that has the same distribution as the random vector y R(x) x returned by Algorithm 3 when applied to R(x).One can also interpret Algorithm 6 as the combination of Algorithm 2 and Algorithm 4.Besides being useful for rounding points x ∈ P M(G) , Algorithm 6 also helps to simplify the proof of Lemma 26 in Appendix A.3.
Algorithm 6: Combining independent rounding with Algorithm 5 Input: Point x ∈ P M(G) .Output: Point y x ∈ P M(G) with supp(y x ) ⊆ supp(x).
1 For each edge e ∈ E, let q e ∈ Z ≥0 be an independent realization of a Pois(x e )-random variable; 2 Let E b be the set of edges in bipartite components of G ′ = (V, supp(q));

Conclusion
In this work, we introduced a novel, very general technique for the construction and analysis of contention resolution schemes.The main idea is to take a different viewpoint and consider the marginals rather than the actual sets returned by the scheme, which allows for using polyhedral techniques.We demonstrated the usefulness of this technique by presenting improved monotone contention resolution schemes for the bipartite and the general matching polytope.While our technique allowed for giving simple analyses of our schemes, it moreover enabled us to prove that our scheme for bipartite matchings is optimal among all monotone such schemes.For general matchings, we first presented a new monotone contention resolution scheme whose balancedness significantly improves on prior work and matches the previously best known lower bound on the correlation gap of the matching polytope.While the existence of a (not necessarily monotone) contention resolution scheme attaining this balancedness already followed from the lower bound on the correlation gap, it was not known before whether the same can also be achieved by a monotone scheme.Moreover, we could show that combining our schemes for bipartite and general matchings yields a monotone contention resolution scheme for the general matching polytope with a strictly higher balancedness than that of the scheme for general matchings alone.However, we do not know the exact balancedness that our combined scheme attains.More generally, it is still open what balancedness can be achieved by a monotone contention resolution scheme for general matchings.Both our results on monotone contention resolution schemes for bipartite and general matchings also improved the best known lower bounds on the correlation gap of the bipartite and the general matching polytope, respectively.

A.1 Contention resolution for points with small components
In the following, we prove a generalized version of Lemma 13 which shows that for many constraint types, the existence of a monotone c-balanced contention resolution scheme follows from the existence of such a scheme that is guaranteed to achieve this balancedness for points with small components only.The idea is that whenever we have an element with a large x-value, we "split" this element into so-called "siblings" that have the same properties with respect to feasibility and distribute the x-value uniformly among them.We then apply the CR scheme for this new instance and map the set that we get back to a feasible set of the original instance.Since an element that got split can only be taken once, we have to ensure that the CR scheme selects at most one of the siblings at a time.In the following, we formalize this idea.Definition 19.Consider an independence system (E, F).We call distinct elements e 1 , . . ., e k ∈ E siblings (or siblings of each other) if (i) for any subset S ⊆ E \ {e 1 , . . ., e k } and i, j ∈ [k], it holds that S ∪ {e i } ∈ F if and only if S ∪ {e j } ∈ F, and (ii) every subset S ∈ F contains at most one of the elements e 1 , . . ., e k .
As an example, let G = (V, E) be a graph and let M(G) ⊆ 2 E be the family of all matchings in G.If we have more than one edge between a given pair of vertices, then these edges are easily seen to be siblings according to the above definition.
Definition 20.Consider an independence system (E, F), an element e ∈ E, and k ∈ Z >0 .We define the independence system (E ′ , F ′ ) that is obtained by splitting e into k siblings by This means that k − 1 new elements e 1 , . . ., e k−1 are added to E such that e, e 1 , . . ., e k−1 are siblings.
In the example mentioned above, where we have a graph G = (V, E) and the family of all its matchings M(G), splitting an edge e ∈ E into k siblings is exactly the same as simply adding k − 1 new edges that are parallel to e. Also, the new family that we get from M(G) is simply the family of all matchings in the new graph.Hence, the considered constraint type did not change.This is important for our reduction to work.Definition 21.Consider a family of independence systems (E i , F i ) i∈I .We say that such a family is closed under splitting into siblings if for any independence system (E, F) it contains, any element e ∈ E, and any k ∈ Z >0 , the independence system (E ′ , F ′ ) that is obtained by splitting e into k siblings is also a member of (E i , F i ) i∈I . 21ome examples of families of independence systems that are easily seen to be closed under splitting into siblings are: • The family of all graphic matroids.
• The family of all linear matroids.
• The family of all (general) matroids.
• The family of all bipartite graphs G = (V, E), where the feasible subsets of E are the matchings in G.
• The family of all (general) graphs G = (V, E), where the feasible subsets of E are the matchings in G.For such families of independence systems, the following lemma shows that it is enough to have a monotone contention resolution scheme that is guaranteed to be c-balanced for vectors with small components only.
Lemma 22. Consider a family of independence systems (E i , F i ) i∈I that is closed under splitting into siblings.Moreover, let b, c ∈ [0, 1] and ε > 0. If there is a monotone contention resolution scheme for all combinatorial polytopes P F i , i ∈ I, that is c-balanced for all x ∈ bP F i with x ≤ ε • χ E i , then there exists a monotone (b, c)-balanced contention resolution scheme for all combinatorial polytopes P F j , j ∈ I (without any restriction).
As observed above, the family of all bipartite graphs G = (V, E), where the feasible subsets of E are the matchings in G, is closed under splitting into siblings.Therefore, Lemma 13 is an immediate consequence of Lemma 22.
Instead of proving Lemma 22 directly, we show the statement below.By iteratively applying it, Lemma 22 follows.
Lemma 23.Let b, c ∈ [0, 1] and consider an independence system (E, F).For e ∈ E and k ∈ Z >0 , let (E ′ , F ′ ) be the independence system obtained by splitting e into k siblings e, e 1 , . . ., e k−1 (see Definition 20).Moreover, fix x ∈ bP F and let x ′ ∈ bP F ′ be the point we get from x by uniformly distributing x e onto the elements e, e 1 , . . ., e k−1 , i.e., If there is a monotone contention resolution scheme for P F ′ that is c-balanced for x ′ , then there exists a monotone contention resolution scheme for P F that is c-balanced for x.
While the proof below is constructive, the construction is typically not efficient.This is because we may split an element into many smaller ones, potentially resulting in an exponential increase in the instance size.Therefore, we cannot directly use this construction to get efficient CR schemes, meaning that the statements we prove here are only existential.Nevertheless, as we have seen in the previous sections on (bipartite) matchings, Lemma 22 tells us which instances are inherently hard and thereby helps to find good schemes.Moreover, the CR schemes we provided are heavily motivated by this non-efficient reduction and realize the splitting idea in an efficient way.
Proof of Lemma 23.Let π ′ be a monotone CR scheme for P F ′ that is c-balanced for x ′ .We now have to show that there exists a monotone CR scheme π for P F that is c-balanced for x.
For x ∈ bP F , we want to define π x via π ′ x ′ such that the c-balancedness of π ′ x ′ passes on to π x .Note that to somehow use the c-balancedness property of π ′ x ′ , we need to feed a set into π ′ x ′ that has the same distribution as R(x ′ ) ⊆ E ′ , i.e., the set we get by independently rounding x ′ ∈ bP F ′ .However, because our goal is to define π x such that it is c-balanced, we start with the random set R(x) ⊆ E we get by independently rounding x ∈ bP F .In a first step, we transform the set R(x) into a set R ′ (x) ⊆ E ′ that has the same distribution as R(x ′ ).We can then apply π ′ x ′ and, as we see later, map F ′ -feasible subsets of R ′ (x) back to F-feasible subsets of R(x) in a straightforward way.
We now formally describe how this transformation works for a general set.For A ⊆ supp(x) ⊆ E, we define the random set A ′ ⊆ supp(x ′ ) ⊆ E ′ by .As we will see below, applying this transformation to the random set R(x) ⊆ supp(x) yields a set R ′ (x) ⊆ E ′ that has the same distribution as R(x ′ ) ⊆ supp(x ′ ), as desired.
For A ⊆ supp(x) ⊆ E, we then simply let the new scheme return the feasible set π x (A) := π ′ x ′ (A ′ ).Observe that the set π ′ x ′ (A ′ ) might not be a subset of E. However, since it contains at most one of the elements e, e 1 , . . ., e k−1 , we can just replace that element with e whenever this happens.This way, we can also interpret π ′ x ′ (A ′ ) as a subset of E.Moreover, note that monotonicity of π ′ x ′ ensures that π x is monotone as well.
For the balancedness, we consider the random set R ′ (x) ⊆ E ′ we get by independently rounding x and then applying the above described transformation to the resulting set R(x) ⊆ E. For any element g ∈ E ′ \ {e, e 1 , . . ., e k−1 }, we have Moreover, for e ′ ∈ {e, e 1 , . . ., e k−1 }, it holds that Since one can easily verify that the distribution of D ensures mutual independence of the above events, the distribution of R ′ (x) ⊆ E ′ is indeed exactly the same as the one of the set R(x ′ ) which we get by independently rounding the point x ′ .Consequently, the balancedness of all elements g ∈ E \ {e} remains the same, i.e., we have Pr[g ∈ π x (R(x))] ≥ c • x g .Moreover, for the element e, we obtain for any e ′ ∈ {e, e 1 , . . ., e k−1 }] .
For ease of notation, we now denote the element e ∈ E ′ by e 0 .Using that π ′ x ′ is c-balanced, we then get for the above that where we again used that no feasible set in F ′ contains more than one of the elements e = e 0 , e 1 , . . ., e k−1 .This shows the desired balancedness of π x , and thereby finishes the proof of Lemma 23.
Note that the fractional points x we have to round in the context of CSFM are typically rational (they are the output of some preceding computation).If we restrict ourselves to rational points, then it is easy to see that Lemma 23 actually implies a stronger statement than Lemma 22. Namely, it shows that for a given family of independence systems that is closed under splitting into siblings, the existence of a monotone CR scheme that is guaranteed to be c-balanced for rational points actually follows from the existence of a monotone CR scheme that is guaranteed to be c-balanced only for rational points whose non-zero components are all equal to a single small value.
Corollary 24.Consider a family of independence systems (E i , F i ) i∈I that is closed under splitting into siblings.Moreover, let b, c ∈ [0, 1] and ε > 0. If there is a monotone contention resolution scheme for all combinatorial polytopes P F i , i ∈ I, that is c-balanced for all rational x ∈ bP F i such that there exists N ∈ Z >0 with x e = 1 N ≤ ε for all e ∈ supp(x), then there exists a monotone contention resolution scheme for all combinatorial polytopes P F j , j ∈ I, that is c-balanced for all rational x ∈ bP F j (without any further restriction).
Proof.As Lemma 22, we also obtain Corollary 24 by iteratively applying Lemma 23 for carefully chosen numbers k.More precisely, for an independence system (E, F) of the given family and a rational x ∈ bP F , there exists N ∈ Z >0 such that for every e ∈ E, we have x e = ke N for some k e ∈ Z ≥0 .Moreover, we can choose N such that 1 N ≤ ε.With the help of Lemma 23, we then iteratively split each e ∈ E into k e siblings.

A.2 Stochastic dominance
At the end of the proof of Theorem 5, a claim regarding the stochastic dominance of different distributions was made.Here, we formally state and prove it.
Lemma 25.Let P, Q, X, Y, Z be mutually independent random variables such that • P, Q, X, Y, Z only take values in Z ≥0 , and • X, Y, Z all have the same distribution.It then holds that the distribution of X + max{P, Q} is stochastically dominated by the distribution of max{Y + P, Z + Q}.
We do this by proving that for all p, q ∈ Z ≥0 , we have which is even stronger than (20).
To show (21), fix p, q ∈ Z ≥0 .By symmetry, we can without loss of generality assume that p ≥ q.Moreover, using that the random variables P, Q, X, Y, Z are mutually independent and that X, Y, Z all have the same distribution, proving (21)  This shows (21), and therefore proves Lemma 25.

A.3 Probability of ending up in a good connected component
Let G = (V, E) be a graph, and fix a point x ∈ P M(G) and an edge e = {u, v} ∈ supp(x).In the proof of Theorem 9, it was claimed that under certain conditions, with constant probability the edge e ends up in a specific situation that enables the scheme from Algorithm 5 to assign a larger value to e than the scheme from Algorithm 3 does.The formal statement is given in the following lemma.Lemma 26.Let x ∈ P M(G) and e = {u, v} ∈ supp(x) such that x(δ(u) \ E uv ) ≥ 0.99, x(δ(u) \ E uv ) ≥ 0.99, and x(E uv ) ≤ 0.01, where E uv denotes the set of all edges in E that go from u to v (including e itself).Let C be the event that the following happens when independently rounding x and applying Algorithm 5 to the resulting set R(x): (C 1 ) e = {u, v} survives the subsampling step, (C 2 ) it ends up in a connected component that is a path of length 3 with e as middle edge, (C 3 ) the realizations of the Poisson random variables of the edges in this path all equal 1.
Proof.Note that we cannot replace (C 2 ) by the condition that e ends up in a connected component consisting of e, one other edge g incident to u (but not v), and one other edge h incident to v (but not u).The reason why this does not work is that we could end up with a connected component that is a triangle (see Figure 7).Since the possibility of getting triangles complicates the analysis of Pr[C|e ∈ R(x)], we try to avoid triangles by proving something stronger.
To do this, we first observe that we can partition the vertices in V \ {u, v} into two sets V u and V v such that x(E u,Vu ) ≥ 0.33 and x(E v,Vu ) ≥ 0.33, where for two disjoint sets S 1 , S 2 ⊆ V , we denote the set of all edges in E having one endpoint in S 1 and the other in S 2 by E S 1 ,S 2 (set braces are left out for singletons).In fact, one can obtain such a partition by starting with V u = V v = ∅ and greedily assigning vertices w ∈ V \ {u, v} to V u or V v , depending on whether the total x-load between w and u or w and v is higher.As soon as we have assigned enough vertices for either x(E u,Vu ) ≥ 0.33 or x(E v,Vv ) ≥ 0.33 to hold, we assign all remaining vertices to the other set.When considering the vertices w ∈ V \ {u, v} in decreasing order with respect to x(E w,{u,v} ), then this is easily seen to yield a partition with the desired properties.Using such a partition V \ {u, v} = V u ∪ V v , (C 2 ) is implied by e ending up in a connected component consisting of e, one other edge g going from u to V u , and one other edge h going from v to V v .Using this stronger condition, we do not have to worry about triangles anymore.Instead of C, we therefore consider the event D that the following happens when independently rounding x and applying Algorithm 5 to the resulting set R(x) (see Figure 8): (D 1 ) q e = 1, meaning that e = {u, v} appears in R(x) and its Poisson random variable realizes to 1, (D 2 ) g∈Eu,v\{e} q g = 0, meaning that apart from e, no other edge in E uv appears in R(x), (D 3 ) g∈E u,Vu q g = 1, meaning that exactly one edge e u = {u, u ′ } in E u,Vu appears in R(x) and its Poisson random variable realizes to 1, (D 4 ) g∈E v,Vv q g = 1, meaning that exactly one edge e v = {v, v ′ } in E v,Vv appears in R(x) and its Poisson random variable realizes to 1, (D 5 ) g∈E u,Vv q g + g∈E v,Vu q g = 0, meaning that no edge in E u,Vv and no edge in E v,Vu appears in R(x), (D 6 ) g∈δ(u ′ )\{eu} q g + g∈δ(v ′ )\{ev } q g = 0, meaning that apart from e u = {u, u ′ }, no other edge in δ(u ′ ) appears in R(x), and apart from e v = {v, v ′ }, no other edge in δ(v ′ ) appears in R(x).
Clearly, the event D implies the event C. Our goal is therefore to get a lower bound on the probability of the event D conditioned on e appearing in the independently rounded set R(x).In order to do this, we directly use Algorithm 6, which combines the independent rounding step with Algorithm 5. Recall that in this setting, we can identify R(x) with supp(q).Moreover, we make the following useful observations.
• The event (D 1 ) is the only event that is affected by conditioning on e ∈ R(x).
• The event (D 6 ) depends on the edges which appear in (D 3 ) and (D 4 ).It is possible to use a bound for the probability of this event which is independent of these particular edges, though.• The event (D 6 ) is independent of (D 1 ) and (D 2 ), and it is positively correlated with (D 3 ), (D 4 ), and (D 5 ).• For the events (D 2 )-(D 6 ), the quantities we are interested in follow a Poisson distribution. 22sing Algorithm 6 and the observations from above, we obtain

Figure 1 :
Figure 1: A contention resolution scheme for the relaxation P G deg = x ∈ R E ≥0 | x(δ(v)) ≤ 1 ∀v ∈ V of the family of matchings in a simple graph G = (V, E).

Figure 2 :
Figure 2: Defining marginal vectors in order to get a monotone contention resolution scheme for the bipartite matching polytope P M(G) via Proposition 11. u

Figure 3 :
Figure 3: Bad instance for the CR scheme described in Example 12.

2 . 3 .
For every edge e ∈ E, split e into k copies e 1 , . . ., e k and distribute the value x e uniformly among these k edges, i.e., each copy gets an x-value of xe k .Independently round the new point x and apply the scheme from Example 12 to the resulting set R(x) to get a point y R(x) x in the bipartite matching polytope of the graph with the split edges.4. For each edge e ∈ E, reverse the splitting by reuniting the edges e 1 , . . ., e k and summing up their values in y R(x) x .Notice that the above yields a point y R(x) x ∈ P M(G) for the original graph G since for every edge e ∈ E, all the copies e 1 , . . ., e k have the same endpoints as e.Moreover, for the determination of this final point y R(x) x

Figure 4 :
Figure 4: Hard instance for all monotone CR schemes for the bipartite matching polytope.

Algorithm 3 :
Contention resolution for P M(G) Input: Point x ∈ P M(G) , set A ⊆ supp(x).Output: Point y A x ∈ P M(G) with supp(y A x ) ⊆ A. 1 Sample A ⊆ A by including edge e ∈ A independently with probability (1 − e −xe )/x e ;

Figure 7 :
Figure 7: It can happen in two different ways that the edge e = {u, v} ends up in a component consisting of e, one other edge incident to u (but not v), and one other edge incident to v (but not u), where the respective (conditioned)Poisson random variables all realized to 1.For both cases, the realizations of the (conditioned) Poisson variables are shown on the left, while the values set by the schemes from Algorithm 3 and Algorithm 5 are given on the top and bottom right, respectively.Since the component containing e is not bipartite in Case 1, there is no difference between the two schemes.In Case 2, however, Algorithm 5 assigns a value of1  2 instead of 1 3 to e.

Proof.
In order to prove Lemma 25, we have to show that for any k ∈ Z ≥0 , it holds thatPr[max{Y + P, Z + Q} ≥ k] ≥ Pr[X + max{P, Q} ≥ k] .

Figure 8 :
Figure8: Above, a partition V \ {u, v} = V u ∪ V v and a possible outcome of R(x), i.e., the set of edges we get after the independent rounding and the subsampling step, is shown.Only the connected component of e = {u, v} in G ′ = (V, R(x)) is considered, where dashed edges indicate edges in E which are incident to this component but did not appear in R(x).For the edges in R(x), the realizations of the (conditioned) Poisson random variables are given as well.In the case depicted above, the event D holds.
order to analyze the above expression, we use the following simplified notation.We let Bern i (ξ) denote a Bernoulli random variable with parameter ξ and Pois j (ζ) a Poisson random variable with parameter ζ, where we assume that all random variables that appear are independent when they have different subscripts.
Note that x ∈ bP M(G) implies x(δ(w)) ≤ b for any vertex w ∈ V .Moreover, recall that the sum of two independent Poisson random variables Pois 1 (ξ) and Pois 2 (ζ) has a Pois(ξ + ζ)-distribution and that