Fast approximation algorithms for the generalized survivable network design problem

Andreas Emil Feldmann, Jochen Könemann, Kanstantsin Pashkovich, Laura Sanità

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

In a standard f-connectivity network design problem, we are given an undirected graph G = (V, E), a cut-requirement function f : 2V → N, and non-negative costs c(e) for all e ∈ E. We are then asked to find a minimum-cost vector x ∈ ℕE such that x(δ(S)) ≥ f(S) for all S ⊆ V. We focus on the class of such problems where f is a proper function. This encodes many well-studied NP-hard problems such as the generalized survivable network design problem. In this paper we present the first strongly polynomial time FPTAS for solving the LP relaxation of the standard IP formulation of the f-connectivity problem with general proper functions f. Implementing Jain's algorithm, this yields a strongly polynomial time (2 + ε)-approximation for the generalized survivable network design problem (where we consider rounding up of rationals an arithmetic operation).

Original languageEnglish
Title of host publication27th International Symposium on Algorithms and Computation, ISAAC 2016
EditorsSeok-Hee Hong
PublisherSchloss Dagstuhl - Leibniz-Zentrum für Informatik
Pages33.1-33.12
ISBN (Electronic)9783959770262
DOIs
Publication statusPublished - 1 Dec 2016
Externally publishedYes
Event27th International Symposium on Algorithms and Computation, ISAAC 2016 - Sydney, Australia
Duration: 12 Dec 201614 Dec 2016

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume64
ISSN (Print)1868-8969

Conference

Conference27th International Symposium on Algorithms and Computation, ISAAC 2016
Country/TerritoryAustralia
CitySydney
Period12/12/1614/12/16

Keywords

  • Generalized survivable network design
  • Primal-dual method
  • Strongly polynomial runtime

Fingerprint

Dive into the research topics of 'Fast approximation algorithms for the generalized survivable network design problem'. Together they form a unique fingerprint.

Cite this