The Minimum Vulnerability Problem

被引:12
作者
Assadi, Sepehr [1 ]
Emamjomeh-Zadeh, Ehsan [1 ]
Norouzi-Fard, Ashkan [1 ]
Yazdanbod, Sadra [1 ]
Zarrabi-Zadeh, Hamid [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
Network design; Shared edges; Approximation algorithms; Inapproximability;
D O I
10.1007/s00453-014-9927-z
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We revisit the problem of finding paths with a minimum number of shared edges between two vertices of a graph. An edge is called shared if it is used in more than one of the paths. We provide a -approximation algorithm for this problem, improving the best previous approximation factor of . We also provide the first approximation algorithm for the problem with a sublinear approximation factor of , where is the number of vertices in the input graph. For sparse graphs, such as bounded-degree and planar graphs, we show that the approximation factor of our algorithm can be improved to . While the problem is NP-hard, and even hard to approximate to within an factor, we show that the problem is polynomially solvable when is a constant. This settles an open problem posed by Omran et al. regarding the complexity of the problem for small values of . We present most of our results in a more general form where each edge of the graph has a sharing cost and a sharing capacity, and there is a vulnerability parameter that determines the number of times an edge can be used among different paths before it is counted as a shared/vulnerable edge.
引用
收藏
页码:718 / 731
页数:14
相关论文
共 17 条
[1]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
[2]  
Assadi S, 2012, LECT NOTES COMPUT SC, V7676, P382
[3]  
Carr RD, 2000, PROCEEDINGS OF THE ELEVENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P106
[4]  
Chakrabarty Deeparnab, 2013, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. Algorithms and Techniques. 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013. Proceedings: LNCS 8096, P71, DOI 10.1007/978-3-642-40328-6_6
[5]  
Chakrabarty D, 2011, LECT NOTES COMPUT SC, V6655, P78, DOI 10.1007/978-3-642-20807-2_7
[6]   On Network Design Problems: Fixed Cost Flows and the Covering Steiner Problem [J].
Even, Guy ;
Kortsarz, Guy ;
Slany, Wolfgang .
ACM TRANSACTIONS ON ALGORITHMS, 2005, 1 (01) :74-101
[7]  
FRANKLIN M, 1994, THESIS COLUMBIA U
[8]   A polylogarithmic approximation algorithm for the group Steiner tree problem [J].
Garg, N ;
Konjevod, G ;
Ravi, R .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2000, 37 (01) :66-84
[9]   A NEW APPROACH TO THE MAXIMUM-FLOW PROBLEM [J].
GOLDBERG, AV ;
TARJAN, RE .
JOURNAL OF THE ACM, 1988, 35 (04) :921-940
[10]   Beyond the flow decomposition barrier [J].
Goldberg, AV ;
Rao, S .
JOURNAL OF THE ACM, 1998, 45 (05) :783-797