Approximation Algorithms Fall Semester , 2003 Lecture 13 : October 20 , 2003
نویسنده
چکیده
In today's lecture, we will present a randomized algorithm that embeds any arbitrary metric into a dominating tree metric such that each edge is distorted, in expectation, in the worst case by a factor of O(log n) and such that each edge is not contracted. Recall that a metric on graph G = (V, E) is a function d : E → R. One can define a metric M = (X, d) on an arbitrary set of vertices X with a distance function d such that the following properties hold: A tree metric is the shortest path metric of a weighted tree. In other words, d(i, j) is the length of the unique shortest path between node i and node j. A metric (V , d) is said to dominate metric (V, d) if ∀u, v ∈ V, d Let ∆ denote the diameter of the metric (V, d). WLOG, ∆ = 2 δ. Let S be a family of metrics over V , and D be a distribution of S. We say that (S, D) α-probabilistically approximates a metric (V, d) if every metric in S dominates d and for every pair of vertices (u, v) ∈ V , E d ∈(S,D) [d (u, v)] ≤ α · d(u, v). Formally, we're interested in O(log n)-probabilistically approximating an arbitrary metric (V, d) by a distribution over tree metrics. For a parameter r, an r-cut decomposition of (V, d) is a partitioning of V into clusters, each centered around a node and having radius at most r. Thus each cluster will have diameter at most 2r.
منابع مشابه
Approximation Algorithms Fall Semester , 2003 Lecture 12 : October 15 , 2003
A spreading metric on the graph G for a given MLA problem instance is an assignment, δ : E → Q, of lengths to the edges of the graph that has the following properties: • The volume of a spreading metric, ∑ (i,j)∈E δi,jwi,j, of graph G in the MLA problem instance provides a lower bound on the value of the optimal solution of the MLA problem. • It “spreads apart” (w.r.t. metric lengths) the nontr...
متن کاملApproximation Algorithms Fall Semester , 2003 Lecture 20 : Nov 17 , 2003
We will look at a greedy algorithm for the uncapacitated facility location problem. It has a similar flavor to the approximation algorithm for set cover, in that it uses the method of dual fitting. The greedy approach yields some of the strongest results for the facility location problem. The algorithm presented here has an approximation factor of 1.61 and is due to Jain et al. [1]. The best kn...
متن کاملApproximation Algorithms Fall Semester , 2003 Lecture 6 : Sept 17 , 2003
i:x̄i∈Cj (1− yi) ≥ zj for all j 0 ≤ yi ≤ 1 for all i 0 ≤ zj ≤ 1 for all j. We were investigating how well the algorithm does, that sets xi to true with probability yi, independently of the other xi’s, where y is an optimal solution to the lp-relaxation. Without loss of generality, consider the clause Cj = (x1 ∨ x2 ∨ · · · ∨ xk): P (Cj is not satisfied) = P ( x1, x2, . . . , xk are not satisfied)...
متن کاملApproximation Algorithms Fall Semester , 2003 Lecture 7 : Sept 22 , 2003
1 Multicut We will now study an example of randomized rounding, where the geometry of the solution space is used in constructing the approximation algorithm. The multicut probem has as input an undirected graph G = (V,E), nonnegative costs associated with each edge (i.e. c : E → Q) and k terminal pairs (s1, t1), (s2, t2), . . ., (sk, tk). A multicut is a subset of edges, F , such that removing ...
متن کامل634 Approximation Algorithms Fall Semester , 2003 Lecture 19 : Nov 12 , 2003
Recall that in the uncapacitated facility location problem we are given a set F of facilities and a set C of clients. There is a specified cost of opening a facility and specified distance between every pair i, j ∈ F ∪C. We assume that the distances satisfy the triangle inequality. The goal is to identify a set of facilities in F to serve all the clients in C such that the total facility and co...
متن کامل