Improved Hardness for Cut, Interdiction, and Firefighter Problems

نویسنده

  • Euiwoong Lee
چکیده

We study variants of the classic s-t cut problem and prove the following improved hardness results assuming the Unique Games Conjecture (UGC). • For any constant k ≥ 2 and ǫ > 0, we show that Directed Multicutwith k source-sink pairs is hard to approximate within a factor k − ǫ. This matches the trivial k-approximation algorithm. By a simple reduction, our result for k = 2 implies that Directed Multiway Cut with two terminals (also known as s-t Bicut) is hard to approximate within a factor 2− ǫ, matching the trivial 2-approximation algorithm. Previously, the best hardness factor for these problems (for constant k) was 1.5− ǫ [EVW13, CM16] under the UGC. • For Length-Bounded Cut and Shortest Path Interdiction, we show that both problems are hard to approximate within any constant factor, even if we allow bicriteria approximation. If we want to cut vertices or the graph is directed, our hardness factor for LengthBounded Cut matches the best approximation ratio up to a constant. Previously, the best hardness factor was 1.1377 for Length-Bounded Cut [BEH10] and 2 for Shortest Path Interdiction [KBB07]. • Assuming a variant of the UGC (implied by another variant of Bansal and Khot [BK09]), we prove that it is hard to approximate Resource Minimization Fire Containmentwithin any constant factor. Previously, the best hardness factor was 2 [KM10]. Our results are based on a general method of converting an integrality gap instance to a lengthcontrol dictatorship test for variants of the s-t cut problem, which may be useful for other problems. Supported by the Samsung Scholarship, the Simons Award for Graduate Students in TCS, and Venkat Guruswami’s NSF CCF-1115525. [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardness and approximation for network flow interdiction

In the Network Flow Interdiction problem an adversary attacks a network in order to minimize the maximum s-t-flow. Very little is known about the approximatibility of this problem despite decades of interest in it. We present the first approximation hardness, showing that Network Flow Interdiction and several of its variants cannot be much easier to approximate than Densest k-Subgraph. In parti...

متن کامل

Parameterized Complexity of Edge Interdiction Problems

We study the parameterized complexity of graph interdiction problems. For an optimization problem on graphs, one can formulate an interdiction problem as a game consisting of two players, namely, an interdictor and an evader, who compete on an objective with opposing interests. In edge interdiction problems, every edge of the input graph has an interdiction cost associated with it and the inter...

متن کامل

Solving the Bi-Objective Maximum-Flow Network-Interdiction Problem

W describe a new algorithm for computing the efficient frontier of the “bi-objective maximum-flow network-interdiction problem.” In this problem, an “interdictor” seeks to interdict (destroy) a set of arcs in a capacitated network that are Pareto-optimal with respect to two objectives, minimizing total interdiction cost and minimizing maximum flow. The algorithm identifies these solutions throu...

متن کامل

Inapproximability Bounds for Shortest-Path Network Interdiction Problems

We consider two network interdiction problems: one where a network user tries to traverse a network from a starting vertex s to a target vertex t along the shortest path while an interdictor tries to eliminate all short s-t paths by destroying as few vertices (arcs) as possible, and one where the network user, as before, tries to traverse the network from s to t along the shortest path while th...

متن کامل

Evader Interdiction and Collateral Damage

In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid sensors pla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017