Log in

Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions

  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract

We address long-standing open questions raised by Williamson, Goemans, Vazirani and Mihail pertaining to the design of approximation algorithms for problems in network design via the primal-dual method (Williamson et al. in Combinatorica 15(3):435–454, 1995. https://doi.org/10.1007/BF01299747). Williamson et al. prove an approximation ratio of two for connectivity augmentation problems where the connectivity requirements can be specified by uncrossable functions. They state: “Extending our algorithm to handle non-uncrossable functions remains a challenging open problem. The key feature of uncrossable functions is that there exists an optimal dual solution which is laminar ... A larger open issue is to explore further the power of the primal-dual approach for obtaining approximation algorithms for other combinatorial optimization problems.” Our main result proves that the primal-dual algorithm of Williamson et al. achieves an approximation ratio of \(16\) for a class of functions that generalizes the notion of an uncrossable function. There exist instances that can be handled by our methods where none of the optimal dual solutions has a laminar support. We present three applications of our main result to problems in the area of network design. (1)  A \(16\)-approximation algorithm for augmenting a family of small cuts of a graph G. The previous best approximation ratio was \(O(\log {|V(G)|})\). (2)  A \(16\cdot {\lceil k/u_{min} \rceil }\)-approximation algorithm for the Cap-k-ECSS problem which is as follows: Given an undirected graph \(G = (V,E)\) with edge costs \(c \in {\mathbb {Q}}_{\ge 0}^E\) and edge capacities \(u \in {\mathbb {Z}}_{\ge 0}^E\), find a minimum-cost subset of the edges \(F\subseteq E\) such that the capacity of any cut in (VF) is at least k; \(u_{min}\) (respectively, \(u_{max}\)) denotes the minimum (respectively, maximum) capacity of an edge in E, and w.l.o.g. \(u_{max} \le k\). The previous best approximation ratio was \(\min (O(\log {|V|}), k, 2u_{max})\). (3)  A \(20\)-approximation algorithm for the model of (p, 2)-Flexible Graph Connectivity. The previous best approximation ratio was \(O(\log {|V(G)|})\), where G denotes the input graph.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Kuhn, H.W.: The Hungarian method for the assignment problem. Nav. Res. Logist. Q. 2(1–2), 83–97 (1955). https://doi.org/10.1002/nav.3800020109

    Article  MathSciNet  Google Scholar 

  2. Dantzig, G.B., Jr., L.R.F., Fulkerson, D.R.: A primal-dual algorithm for linear programs. In: Linear Inequalities and Related Systems. Annals of Mathematics Studies, vol. 38, pp. 171–182. Princeton University Press, Princeton, US (1957). https://doi.org/10.1515/9781400881987-008

  3. Agrawal, A., Klein, P., Ravi, R.: When trees collide: an approximation algorithm for the generalized Steiner problem on networks. SIAM J. Comput. 24(3), 440–456 (1995). https://doi.org/10.1137/S0097539792236237

    Article  MathSciNet  Google Scholar 

  4. Goemans, M.X., Williamson, D.P.: A general approximation technique for constrained forest problems. SIAM J. Comput. 24(2), 296–317 (1995). https://doi.org/10.1137/S0097539793242618

    Article  MathSciNet  Google Scholar 

  5. Williamson, D.P., Goemans, M.X., Mihail, M., Vazirani, V.V.: A primal-dual approximation algorithm for generalized Steiner network problems. Combinatorica 15(3), 435–454 (1995). https://doi.org/10.1007/BF01299747

    Article  MathSciNet  Google Scholar 

  6. Lau, L.C., Ravi, R., Singh, M.: Iterative methods in combinatorial optimization. Cambridge Texts in Applied Mathematics. Cambridge University Press, Cambridge, UK (2011). https://doi.org/10.1017/CBO9780511977152

  7. Vazirani, V.V.: Approximation Algorithms. Springer, Berlin Heidelberg New York (2003). https://doi.org/10.1007/978-3-662-04565-7

  8. Williamson, D.P., Shmoys, D.B.: The Design of Approximation Algorithms. Cambridge University Press, Cambridge, UK (2011)

    Book  Google Scholar 

  9. Jain, K.: A factor 2 approximation algorithm for the generalized Steiner network problem. Combinatorica 21(1), 39–60 (2001). https://doi.org/10.1007/s004930170004

    Article  MathSciNet  Google Scholar 

  10. Gabow, H.N., Goemans, M.X., Tardos, É., Williamson, D.P.: Approximating the smallest \(k\)-edge connected spanning subgraph by LP-rounding. Networks 53(4), 345–357 (2009). https://doi.org/10.1002/net.20289

    Article  MathSciNet  Google Scholar 

  11. Gabow, H.N., Gallagher, S.: Iterated rounding algorithms for the smallest \({k}\)-edge connected spanning subgraph. SIAM J. Comput. 41(1), 61–103 (2012). https://doi.org/10.1137/080732572

    Article  MathSciNet  Google Scholar 

  12. Fleischer, L., Jain, K., Williamson, D.P.: Iterative rounding 2-approximation algorithms for minimum-cost vertex connectivity problems. J. Comput. Syst. Sci. 72(5), 838–867 (2006). https://doi.org/10.1016/j.jcss.2005.05.006

    Article  MathSciNet  Google Scholar 

  13. Boyd, S.C., Cheriyan, J., Haddadan, A., Ibrahimpur, S.: Approximation algorithms for flexible graph connectivity. Math. Program. (2023). https://doi.org/10.1007/s10107-023-01961-5

    Article  Google Scholar 

  14. Frederickson, G.N., JáJá, J.F.: Approximation algorithms for several graph augmentation problems. SIAM J. Comput. 10(2), 270–283 (1981). https://doi.org/10.1137/0210019

    Article  MathSciNet  Google Scholar 

  15. Khuller, S., Thurimella, R.: Approximation algorithms for graph augmentation. J. Algorithms 14(2), 214–225 (1993). https://doi.org/10.1006/jagm.1993.1010

    Article  MathSciNet  Google Scholar 

  16. Benczúr, A.A., Goemans, M.X.: Deformable Polygon Representation and Near-Mincuts. In: Building Bridges. Bolyai Society Mathematical Studies, pp. 103–135. Springer, Berlin Heidelberg New York (2008). https://doi.org/10.1007/978-3-540-85221-6_3

  17. Khuller, S., Vishkin, U.: Biconnectivity approximations and graph carvings. J. ACM 41(2), 214–235 (1994). https://doi.org/10.1145/174652.174654

    Article  MathSciNet  Google Scholar 

  18. Goemans, M.X., Goldberg, A.V., Plotkin, S.A., Shmoys, D.B., Tardos, É., Williamson, D.P.: Improved approximation algorithms for network design problems. In: Proceedings of the 5th Symposium on Discrete Algorithms, pp. 223–232 (1994)

  19. Chakrabarty, D., Chekuri, C., Khanna, S., Korula, N.: Approximability of capacitated network design. Algorithmica 72(2), 493–514 (2015). https://doi.org/10.1007/s00453-013-9862-4

    Article  MathSciNet  Google Scholar 

  20. Adjiashvili, D., Hommelsheim, F., Mühlenthaler, M.: Flexible graph connectivity. Math. Program. 192, 409–441 (2022). https://doi.org/10.1007/s10107-021-01664-9

    Article  MathSciNet  Google Scholar 

  21. Chekuri, C., Jain, R.: Approximation algorithms for network design in non-uniform fault models. In: Proceedings of the 50th International Colloquium on Automata, Languages, and Programming, vol. 261, article 36, pp. 1–20 (2023). https://doi.org/10.4230/LIPIcs.ICALP.2023.36

  22. Chekuri, C., Jain, R.: Augmentation based approximation algorithms for flexible network design. CoRR abs/2209.12273 (2022) https://doi.org/10.48550/ar**v.2209.12273

  23. Chekuri, C., Jain, R.: Approximating Flexible Graph Connectivity via Räcke Tree based Rounding. CoRR abs/2211.08324 (2022) https://doi.org/10.48550/ar**v.2211.08324

  24. Goemans, M.X., Williamson, D.P.: The primal-dual method for approximation algorithms and its application to network design problems. In: Approximation Algorithms for NP-Hard Problems, pp. 144–191. PWS Publishing Company, Boston, MA (1996). Chap. 4

  25. Gabow, H.N., Goemans, M.X., Williamson, D.P.: An efficient approximation algorithm for the survivable network design problem. Math. Program. 82, 13–40 (1998). https://doi.org/10.1007/BF01585864

    Article  MathSciNet  Google Scholar 

  26. Johnson, D.S., Minkoff, M., Phillips, S.: The prize collecting Steiner tree problem: theory and practice. In: Shmoys, D.B. (ed.) Proceedings of the 11th Symposium on Discrete Algorithms, pp. 760–769 (2000). https://doi.org/10.5555/338219.338637

  27. Mihail, M., Shallcross, D., Dean, N., Mostrel, M.: A commercial application of survivable network design: ITP/INPLANS CCS network topology analyzer. In: Proceedings of the 7th Symposium on Discrete Algorithms, pp. 279–287 (1996). https://doi.org/10.5555/313852.314074

  28. Williamson, D.P., Goemans, M.X.: Computational experience with an approximation algorithm on large-scale Euclidean matching instances. INFORMS J. Comput. 8(1), 29–40 (1996). https://doi.org/10.1287/ijoc.8.1.29

    Article  Google Scholar 

  29. Bansal, I., Cheriyan, J., Grout, L., Ibrahimpur, S.: Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions. CoRR abs/2209.11209v2 (2022)

  30. Bansal, I.: A constant factor approximation for the \((p,3)\)-flexible graph connectivity problem. CoRR abs/2308.15714 (2023) https://doi.org/10.48550/ARXIV.2308.15714

  31. Nutov, Z.: Improved approximation algorithms for some capacitated \(k\) edge connectivity problems. CoRR abs/2307.01650 (2023) https://doi.org/10.48550/ARXIV.2307.01650

  32. Diestel, R.: Graph Theory. Graduate Texts in Mathematics. Springer, Berlin Heidelberg New York (2017). https://doi.org/10.1007/978-3-662-53622-3

  33. Schrijver, A.: Combinatorial Optimization: Polyhedra and Efficiency. Algorithms and Combinatorics, vol. 24. Springer, Berlin Heidelberg New York (2003)

  34. Naor, D., Gusfield, D., Martel, C.: A fast algorithm for optimally increasing the edge connectivity. SIAM J. Comput. 26(4), 1139–1165 (1997). https://doi.org/10.1137/S0097539792234226

    Article  MathSciNet  Google Scholar 

  35. Frank, A.: Connections in Combinatorial Optimization. Oxford Lecture Series in Mathematics and Its Applications, vol. 38. Oxford University Press, Oxford New York (2011)

  36. Karger, D.R., Stein, C.: A new approach to the minimum cut problem. J. ACM 43(4), 601–640 (1996). https://doi.org/10.1145/234533.234534

    Article  MathSciNet  Google Scholar 

  37. Nagamochi, H., Nishimura, K., Ibaraki, T.: Computing all small cuts in an undirected network. SIAM J. Discrete Math. 10(3), 469–481 (1997). https://doi.org/10.1137/S0895480194271323

    Article  MathSciNet  Google Scholar 

  38. Bansal, I., Cheriyan, J., Grout, L., Ibrahimpur, S.: Improved approximation algorithms by generalizing the primal-dual method beyond uncrossable functions. In: Proceedings of the 50th International Colloquium on Automata, Languages, and Programming, vol. 261, article 15, pp. 1–19 (2023). https://doi.org/10.4230/LIPIcs.ICALP.2023.15

Download references

Acknowledgements

We thank the anonymous reviewers and the ICALP PC for their comments. We are grateful to Cedric Koh and Madison Van Dyk for reading a preliminary version, and for their detailed comments and feedback. A preliminary version of this paper appeared in the Proceedings of the 50th International Colloquium on Automata, Languages, and Programming (ICALP 2023), Ed. K.Etessami, U.Feige, and G.Puppis https://drops.dagstuhl.de/opus/volltexte/2023/18067/ (LIPIcs, Volume 261, Article No. 15, pp. 15:1–15:19), [38].

Funding

The first author is partially supported by Office of Naval Research (ONR) Grant N00014-21-1-2575. The second author is supported in part by NSERC, RGPIN-2019-04197. The fourth author received funding from the following sources: NSERC grant 327620-09 and an NSERC DAS Award, European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement no. ScaleOpt-757481), and Dutch Research Council NWO Vidi Grant 016.Vidi.189.087.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the research and the writing, in varying amounts. All authors reviewed the manuscript.

Corresponding author

Correspondence to Joseph Cheriyan.

Ethics declarations

Conflict of interest

The authors have no Conflict of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Pliable Families: An Example

In Sect. 3, we showed an approximation ratio of O(1) for the WGMV primal-dual method applied to any \(f\text {-connectivity~problem}\) where f is a pliable function satisfying property \((\gamma )\). A natural question arises: Is property \((\gamma )\) essential for this result? In other words, does the WGMV primal-dual method for the \(f\text {-connectivity~problem}\) where f is a pliable function achieve an approximation ratio of O(1)? The next construction shows that the answer is no; thus, property \((\gamma )\) is essential for our results in Sect. 3.

Recall that a family of sets \(\mathcal {F}\subseteq 2^V\) is called a pliable family if \(A, B \in \mathcal {F}\) implies that at least two of the four sets \(A\cup {B}, A\cap {B}, A\setminus {B}, B\setminus {A}\) also belong to \(\mathcal {F}\).

Fig. 3
figure 3

Top: A bad example for the primal-dual method for augmenting a pliable family. Bottom: Edges of type (A) and type (B) in a bad example for the primal-dual method for augmenting a pliable family

Now, we describe the construction: We have node-sets \(C_{ij}\) for \(i=1,2,\ldots ,k\) and \(j=0,1,2,\ldots ,k\). All these C-sets are pair-wise disjoint. Additionally, for \(j'=1,\ldots , k\), we have node-sets \(T_{1j'} \subsetneq T_{2j'}\subsetneq \cdots T_{kj'}\) and each of these are disjoint from all the C-sets. Additionally, we have at least one node \(v_0\) lying outside the union of all these C-sets and T-sets. See Fig. 3. We designate \(\mathcal {F'}\) to be the following family of node-sets that consists of two types of sets:

Informally speaking, the sets \(C_1,C_2,\dots ,C_k\) can be viewed as (pairwise-disjoint) “cylinders”, see Fig. 3, the (first) index i is associated with one of these cylinders, and note that \(C_{i0} = C_i {\setminus } (\cup _{j=1}^k C_{ij})\); the (second) index j is associated with a “layer” (i.e., a horizontal plane), and the sub-family \(T_{1j'} \subsetneq T_{2j'}\subsetneq \cdots T_{kj'}\) forms a nested family on layer \(j'\), see Fig. 3. For notational convenience, let \(T_{0j'}=\emptyset ,\; \forall j'\in [k]\). Observe that a set of type (II) is the union of one set \(T_{i'j'}\) of the nested family of layer \(j'\) together with the sets of an arbitrary sub-family of each of the “cylinder families” \(\{ C_{i0}, C_{i1}, C_{i2}, \dots , C_{ik} \}\) with (first) index \(i < i'\). We claim that the family \(\mathcal {F'}\) satisfies the condition of Lemma 2.3. Indeed consider \(A,B \in \mathcal {F'}\). If A and B are of type (I), then they are disjoint. If A is of type (I) and B is of type (II) such that \(A\cap {B}\not =\emptyset \), then \(A\cup B\) and \(B{\setminus }{A}\) are sets of type (II) so both belong to \(\mathcal {F'}\). If A and B are of type (II) such that both have the same (second) index \(j'\), then both \(A\cup {B}\) and \(A\cap {B}\) are sets of type (II). On the other hand, if A and B are of type (II) such that the (second) index \(j'\) is different for AB, then \(A\setminus {B}\) and \(B\setminus {A}\) are sets of type (II). Thus, by Lemma 2.3, adding in all the complements of the sets of this family gives us a pliable family \(\mathcal {F}\).

The edges of the graph are of two types:

  1. (A)

    For \(i' = 1,\ldots ,k\) and \(j' = 1,\ldots , k\), we have an edge from \(T_{i'j'} \setminus T_{(i'-1)j'}\) to \(C_{ij}\) where \(i=i'\) and \(j=j'\).

  2. (B)

    For \(j=1,\ldots , k\), we have an edge from \(v_0\) to \(T_{1j}\). For \(i=1,\ldots ,k\), we have an edge from \(v_0\) to \(C_{i0}\).

When the primal-dual algorithm is applied to this instance, then it picks all the edges of type (A); note that there are \(k^2\) edges of type (A). Let us sketch the working of the primal-dual algorithm on this instance.

  • Initially, the active sets are the type (I) sets \(C_1,\dots ,C_k\) and the smallest T-sets \(T_{11},\dots ,T_{1k}\). The algorithm increases the dual variables of each of these sets by 1/2 and then picks all the type (A) edges between \(T_{1j}\) and \(C_{1j}\) for \(j\in [k]\).

  • In the next iteration, the (new) active sets are the type (I) sets \(C_2,\dots ,C_k\) and the type (II) sets of the form \(T_{2j} \cup C_{1j}\) for \(j\in [k]\). The algorithm increases the dual variables of each of these sets by 1/4 and then picks all the type (A) edges between \(T_{2j}\) and \(C_{2j}\) for \(j\in [k]\).

  • Similarly, in the \(i^{th}\) iteration, the active sets are the type (I) sets \(C_i,\dots ,C_k\) and the type (II) sets of the form \(T_{ij} \cup C_{1j} \cup \dots \cup C_{(i-1)j}\) for \(j\in [k]\). The algorithm increases the dual variables of each of these sets by \(1/2^i\) and then picks all the type (A) edges between \(T_{ij}\) and \(C_{ij}\) for \(j\in [k]\).

  • Finally, the reverse-delete step does not delete any edge, because the edges of type (A) form an inclusion-wise minimal solution.

On the other hand, all the edges of type (B) form a feasible solution of this instance, and there are \(\le 2k\) such edges. In more detail, each of the type (I) sets \(C_i\) is covered by the type (B) edge between \(v_0\) and \(C_{i0}\), and each of the type (II) sets containing \(T_{i'j'}\) is covered by the type (B) edge between \(v_0\) and \(T_{1j'}\). Thus, the optimal solution picks \(\le 2k\) edges.

Missing Proofs from Sect. 3

This section has several lemmas and proofs from Sect. 3 that are used to prove our main result, Theorem 1.1.

Lemma B.1

Suppose \(S_1\) is a witness for edge \(e_1\) and \(S_2\) is a witness for edge \(e_2\) such that \(S_1\) overlaps \( S_2\). Then there exist \(S_1'\) and \(S_2'\) satisfying the following properties:

  1. (i)

    \(S_1'\) is a valid witness for edge \(e_1\), \(S_2'\) is a valid witness for edge \(e_2\), and \(S_1'\) does not overlap \(S_2'\).

  2. (ii)

    \(S_1',S_2' \in \{S_1,S_2,S_1\cup S_2, S_1\cap S_2, S_1{\setminus } S_2, S_2{\setminus } S_1\}\).

  3. (iii)

    either \(S_1' = S_1\) or \(S_2' = S_2\).

Proof

We prove the lemma via an exhaustive case analysis. Note that at least two of the four sets \(S_1\cup S_2, S_1\cap S_2, S_1{\setminus } S_2, S_2{\setminus } S_1\) must be violated in the current iteration. Moreover, observe that \(e_1\in \delta _E(S_1\setminus {S_2})\) or \(e_1\in \delta _E(S_1\cap {S_2})\), and in the latter case \(e_1\in E(S_1\cap {S_2}, V\setminus (S_1\cup {S_2}))\) or \(e_1\in E(S_1\cap {S_2}, S_2\setminus {S_1})\). We consider the following cases.

  1. 1.

    If \(S_1 \cup S_2\) and \(S_1 \cap S_2\) are violated or \(S_1{\setminus } S_2\) and \(S_2{\setminus } S_1\) are violated, then the proof of Lemma 5.2 in [5] can be applied.

  2. 2.

    Suppose \(S_1 \cap S_2\) is violated, and one of \(S_1\setminus {S_2}\) or \(S_2\setminus {S_1}\) is violated. W.l.o.g. suppose \(S_1 \cap S_2\) and \(S_1\setminus {S_2}\) are violated (the other case is similar). Consider where the end-nodes of the edge \(e_1\) lie. If \(e_1\in \delta _E(S_1\setminus {S_2})\), then fix \(S_1':=S_1\setminus {S_2}\) and \(S_2':=S_2\); otherwise, \(e_1\in \delta _E(S_1\cap {S_2})\), and then fix \(S_1':=S_1\cap {S_2}\) and \(S_2':=S_2\).

  3. 3.

    Suppose \(S_1 \cup S_2\) is violated, and one of \(S_1\setminus {S_2}\) or \(S_2\setminus {S_1}\) is violated. W.l.o.g. suppose \(S_1 \cup S_2\) and \(S_1\setminus {S_2}\) are violated (the other case is similar). Consider where the end-nodes of the edges \(e_1\) and \(e_2\) lie. If \(e_1\in \delta _E(S_1\setminus {S_2})\), then fix \(S_1':=S_1\setminus {S_2}\) and \(S_2':=S_2\); similarly, if \(e_1\in E(S_1\cap {S_2}, V\setminus (S_1\cup {S_2}))\), then fix \(S_1':=S_1\cup {S_2}\) and \(S_2':=S_2\); finally, if \(e_1\in E(S_1\cap {S_2}, S_2\setminus {S_1})\), then fix \(S_1':=S_1\), and then if \(e_2\in \delta _E(S_1\cup {S_2})\), then fix \(S_2':=S_1\cup {S_2}\), otherwise, fix \(S_2':=S_1\setminus {S_2}\).

This completes the proof of the lemma. \(\square \)

Lemma B.2

Suppose a set \(A_1\) overlaps a set \(A_2\) and a third set \(A_3\) does not overlap \(A_1\) nor \(A_2\). Then \(A_3\) does not overlap any of the sets \(A_1\cup A_2, A_1\cap A_2, A_1 {\setminus } A_2, A_2{\setminus } A_1\).

Proof

Note that since \(A_3\) does not overlap \(A_1\) (or \(A_2\)), they are either disjoint or one contains the other. We consider the following cases.

  1. 1.

    Suppose \(A_3 \cap A_1 = \emptyset \). Then \(A_2\not \subseteq A_3\) since \(A_1 \cap A_2 \ne \emptyset \). If \(A_3 \cap A_2 = \emptyset \), then \(A_3 \subseteq V{\setminus } A_1\cup A_2\) and we are done. Finally if \(A_3 \subseteq A_2\), then \(A_3 \subseteq A_2{\setminus } A_1\) and we are done.

  2. 2.

    Suppose \(A_1 \subseteq A_3\). Then \(A_3 \cap A_2 \ne \emptyset \) since \(A_1\cap A_2 \ne \emptyset \). Also, \(A_3\not \subseteq A_2\) since \(A_1\not \subseteq A_2\). If \(A_2 \subseteq A_3\), then \(A_1\cup A_2 \subseteq A_3\) and we are done.

  3. 3.

    Suppose \(A_3 \subseteq A_1\). Then \(A_2\not \subseteq A_3\) since \(A_2\setminus {A_1}\ne \emptyset \). If \(A_3 \subseteq A_2\), then \(A_3\subseteq A_1\cap A_2\) and we are done. Finally if \(A_3\cap A_2 = \emptyset \), then \(A_3 \subseteq A_1 {\setminus } A_2\) and we are done.

\(\square \)

Lemma 3.2. There exists a laminar family of witness sets.

Proof

We show that any witness family can be transformed to a laminar family by repeatedly applying Lemma B.1. We prove this by induction on the size of the witness family \(\ell \).

Base Case: Suppose \(\ell = 2\), then one application of Lemma B.1 is sufficient.

Inductive Hypothesis: If \(S_1,\ldots , S_\ell \) are witness sets for edges \(e_1,\ldots , e_\ell \) respectively with \(\ell \le k\), then, by repeatedly applying Lemma B.1, one can construct witness sets \(S'_1,\ldots , S'_\ell \) for the edges \(e_1,\ldots , e_\ell \) respectively such that \(S'_1,\ldots , S'_\ell \) is a laminar family.

Inductive Step: Consider \(k+1\) witness sets \(S_1,\ldots , S_{k+1}\). By the inductive hypothesis, we can repeatedly apply Lemma B.1 to all the witness sets \(S_1,\ldots , S_k\) and obtain witness sets \(S_1',\ldots , S_k'\) that form a laminar family. We now consider the following cases.

  1. 1.

    If \(S_{k+1}\) does not overlap some \(S_i'\), say \(S_1'\), then we can apply the inductive hypothesis to the k sets \(S_2',\ldots , S_k', S_{k+1}\) and we obtain a laminar family of witness sets, none of which overlap \(S_1'\) either (by Lemma B.2) and so we are done.

  2. 2.

    Suppose \(S_{k+1}\) overlaps all the sets \(S_1',\ldots , S_k'\) and for some \(S_i'\), say \(S_1'\), applying Lemma B.1 to the pair \(S_1',S_{k+1}\) gives \(S_1', S_{k+1}'\). Then \(S_1'\) does not overlap any of the witness sets \(S_2',\ldots , S_{k+1}'\), hence, applying the inductive hypothesis to these k sets gives us a laminar family of witness sets \(S_2^{''},\ldots , S_k^{''}\). By Lemma B.2, \(S_1'\) does not overlap any of the sets \(S_2^{''},\ldots , S_k^{''}\) and so we are done.

  3. 3.

    Suppose \(S_{k+1}\) overlaps all the sets \(S_1',\ldots , S_k'\) and, for every \(S_i'\), applying Lemma B.1 to the pair \(S_i', S_{k+1}\) gives \(S''_i, S_{k+1}\). Then after doing this for every \(S_i'\), we end up with the witness family \(S_1^{''}, \ldots , S_k^{''}, S_{k+1}\) with the property that \(S_{k+1}\) does not overlap any of the other sets. Applying the inductive hypothesis to the k sets \(S_1^{''}, \ldots , S_k^{''}\) gives us a laminar family of witness sets \(S_1^{'''},\ldots , S_k^{'''}\). By Lemma B.2, \(S_{k+1}\) does not overlap any of the sets \(S_1^{'''},\ldots , S_k^{'''}\) and so we are done.

\(\square \)

Proof of Lemma 6.1 from Sect. 6

This section has a proof of Lemma 6.1. This proof is the same as the proof we posted on Arxiv in 2022, [29].

Lemma 6.1. f is a pliable function that satisfies property \((\gamma )\)Moreover, for even p, f is an uncrossable function.

Proof

Consider two violated sets \(A, B \subsetneq V\). W.l.o.g. we may assume that both A and B contain a fixed node \(r \in V\). If AB do not cross, then it is easily seen that \(f(A)+f(B) = \max ( f(A\cap {B})+f(A\cup {B}),\; f(A\setminus {B})+f(B\setminus {A}) )\), hence, the inequality for pliable functions holds for AB. Thus, we may assume that AB cross. The following equations hold, see Frank’s book [35, Chapter 1.2]:

$$\begin{aligned}&|\delta (A)| = |\delta (B)| = p+1 \end{aligned}$$
(2)
$$\begin{aligned}&|\delta (A \cup B)| + |\delta (A \cap B)| + 2|F(A \setminus B, B \setminus A)| = |\delta (A)| + |\delta (B)| \end{aligned}$$
(3)
$$\begin{aligned}&|\delta (A \setminus B)| + |\delta (B \setminus A)| + 2|F(A \cap B, V \setminus (A \cup B))| = |\delta (A)| + | \delta (B)| \end{aligned}$$
(4)
$$\begin{aligned}&|\delta (A \setminus B)| + |\delta (A \cap B)| = |\delta (A)| + 2 |F(A \setminus B, A \cap B)| \end{aligned}$$
(5)

Since \(|\delta (S)|\ge {p}, \forall \emptyset \ne {S}\subsetneq {V}\), equations (2), (3) and (4) imply that \(|\delta (A \cup B)|, |\delta (A \cap B)|, |\delta (A {\setminus } B)|, |\delta (B {\setminus } A)| \in \{p,p+1,p+2\}\), and, moreover, \(|F(A \setminus B, B \setminus A)| \le {1},\, |F(A \cap B, {V\setminus (A \cup B)})| \le {1}\).

Furthermore, the above four equations imply the following parity-equations (equations (6), (7) and (8) follow from equations (3), (4) and (5), respectively).

$$\begin{aligned}&|\delta (A \cup B)| \equiv |\delta (A \cap B)| \quad (\text {mod} \, 2) \end{aligned}$$
(6)
$$\begin{aligned}&|\delta (A \setminus B)| \equiv |\delta (B \setminus A)| \quad (\text {mod} \, 2) \end{aligned}$$
(7)
$$\begin{aligned}&|\delta (A\cap B)| \equiv |\delta (A\setminus B)| + |\delta (A)| \equiv |\delta (B\setminus A)| + |\delta (B)| \quad (\text {mod} \, 2) \end{aligned}$$
(8)

Case 1 (of proof of the lemma): Suppose that p is even. Then the parity-equations (6)–(8) imply that among the two pairs of cuts \(\{\delta (A\cup {B}), \delta (A\cap {B})\}\) and \(\{\delta (A\setminus {B}), \delta (B\setminus {A})\}\), one of the pairs consists of two \((p+1)\)-cuts, and the other pair has at least one cut of size p. Since F is a feasible solution of \((p,1)\textrm{-FGC}\), every p-cut of (VF) consists of safe edges (that is, a p-cut cannot contain any unsafe edge). Since A and B are violated sets, each of the cuts \(\delta (A)\) and \(\delta (B)\) contains at least two unsafe edges.

Claim C.1

Each cut \(\delta (S)\) of the pair of \((p+1)\)-cuts \(\{\delta (A\cup {B}), \delta (A\cap {B})\}\) or \(\{\delta (A\setminus {B}), \delta (B\setminus {A})\}\) (obtained from AB) also contains at least two unsafe edges, and so S is a violated set for each of these cuts.

We prove this claim by a simple case analysis on the end-nodes of the unsafe edges of the cuts \(\delta (A)\) and \(\delta (B)\). W.l.o.g. assume that \(\delta (A\cup {B})\) and \(\delta (A\cap {B})\) are \((p+1)\)-cuts and that \(\delta (A\setminus {B})\) is a p-cut. The other cases are handled similarly. Clearly, \(\delta (A\setminus {B})\) has no unsafe edges. Since A is a violated set, either (i) \(F(A\cap B, B\setminus {A})\) has two unsafe edges or (ii) \(F(A\cap B, B\setminus {A})\) has one unsafe edge and \(F(A\cap B, {V\setminus (A\cup B)})\) has one unsafe edge (recall that the size of the latter edge-set is \(\le 1\)). Since B is a violated set, either (iii) \(F(B\setminus {A}, {V\setminus (A\cup {B})})\) has two unsafe edges or (iv) \(F(B\setminus {A}, {V\setminus (A\cup B)})\) has one unsafe edge and \(F(A\cap B, {V\setminus (A\cup B)})\) has one unsafe edge. Now, observe that both \(A\cap {B}\) and \(A\cup {B}\) are violated sets, because, by (i) or (ii), \(\delta (A\cap {B})\) has at least two unsafe edges, and, by (iii) or (iv), \(\delta (A\cup {B})\) has at least two unsafe edges. (If both \(\delta (A\setminus {B})\) and \(\delta (B\setminus {A})\) are \((p+1)\)-cuts, and there are no unsafe edges in either \(\delta (A\cap {B})\) or \(\delta (A\cup {B})\), then both \(\delta (A\setminus {B})\) and \(\delta (B\setminus {A})\) have \(\ge 2\) unsafe edges, so both \(A\setminus {B}\) and \(B\setminus {A}\) are violated sets.) This proves the claim.

Therefore, when p is even, the function f is an uncrossable function (recall that every uncrossable function is a pliable function that satisfies property \((\gamma )\)).

Case 2 (of proof of the lemma): Suppose that p is odd. Then we have \( |\delta (A \cup B)| \equiv |\delta (A \cap B)| \equiv |\delta (A\setminus {B})| \equiv |\delta (B\setminus {A})| \quad (\text {mod} \, 2)\). Hence, the above equations (2)–(5) and parity-equations (6)–(8) imply that either all four cuts \(\delta (A\cup {B}), \delta (A\cap {B}), \delta (A\setminus {B}), \delta (B\setminus {A})\) are \((p+1)\)-cuts, or at least one cut from each pair \(\{\delta (A\cup {B}), \delta (A\cap {B})\}\) and \(\{\delta (A\setminus {B}), \delta (B\setminus {A})\}\) is a p-cut.

Claim C.2

Suppose that at least one cut from each pair \(\{\delta (A\cup {B}), \delta (A\cap {B})\}\) and \(\{\delta (A\setminus {B}), \delta (B\setminus {A})\}\) is a p-cut. Then either A is not a violated set, or B is not a violated set.

To prove this claim, let us assume that \(|\delta (A\setminus {B})|=p\); similar arguments apply for the other case. The edge-set F is feasible for \((p,1)\textrm{-FGC}\), hence, all edges of \(\delta (A\setminus {B})\) are safe. Moreover, one of the cuts \(\delta (A\cap {B})\) or \(\delta (A\cup {B})\) has size p and consists of safe edges. If \(|\delta (A\cap {B})|=p\), then the cut \(\delta (A)\) consists of safe edges (since \(\delta (A)\subseteq \delta (A\cap {B})\cup \delta (A\setminus {B})\)), hence, A cannot be a violated set. Otherwise, if \(|\delta (A\cup {B})|=p\), then the cut \(\delta (B)\) consists of safe edges (since \(\delta (B)=\delta (V\setminus {B})\subseteq \delta (A\setminus {B})\cup \delta (V\setminus (A\cup {B}))\)), hence, B cannot be a violated set. This proves the claim.

Claim C.2 implies that all four cuts \(\delta (A\cup {B}), \delta (A\cap {B}), \delta (A\setminus {B}), \delta (B\setminus {A})\) are \((p+1)\)-cuts.

Claim C.3

Consider two crossing violated sets \(A, B \subseteq V\).

  1. (i)

    Then each of the four cuts \(\delta (A\cup {B}), \delta (A\cap {B}), \delta (A\setminus {B}), \delta (B\setminus {A})\) has size \((p+1)\), and we have \(|F(A\setminus {B}, B\setminus {A})| = 0 = |F(A\cap {B}, V\setminus (A\cup {B}))|\).

  2. (ii)

    Moreover, each of the four sets \(F(A\cap {B},\,A\setminus {B}),\; F(A\cap {B},\,B\setminus {A}),\; F(A\setminus {B},\,V\setminus (A\cup {B})),\; F(B\setminus {A},\,V\setminus (A\cup {B}))\) has size \((p+1)/2\).

Part (i) of this claim follows from the above arguments (see the discussion before and after Claim C.2). Moreover, we have \(|F(A {\setminus } B, B {\setminus } A)| = 0\) and \(|F(A \cap B, V {\setminus } (A \cup B))| = 0\) by equations (3),(4). Next, consider part (ii) of the claim. Using the first part of the claim together with equation (5), we have \(|F(A\cap {B},\,A\setminus {B})|=(p+1)/2\). Since \(\delta (A\setminus {B})\) is a \((p+1)\)-cut and it is the disjoint union of \(F(A\setminus {B},\,A\cap {B})\) and \(F(A\setminus {B},\,V\setminus (A\cup {B}))\), we have \(|F(A\setminus {B},\,V\setminus (A\cup {B}))|=(p+1)/2\). Similarly, we have \(|F(A\cap {B},\,B\setminus {A})|=(p+1)/2\), \(|F(B\setminus {A},\,V\setminus (A\cup {B}))|=(p+1)/2\). This proves the claim.

Claim C.4

  1. (i)

    At least two of the four cuts \(\delta (A\cup {B}), \delta (A\cap {B}), \delta (A\setminus {B}), \delta (B\setminus {A})\) each contain at least two unsafe edges.

  2. (ii)

    Moreover, if A is a minimal violated set, then \(F(B\setminus {A},\,V\setminus (A\cup {B}))\) has at least two unsafe edges, and each of \(F(A\cap {B},\,B\setminus {A})\) and \(F(A\setminus {B},\,V\setminus (A\cup {B}))\) has exactly one unsafe edge.

We prove this claim by a simple case analysis on the end-nodes of the unsafe edges of the cuts \(\delta (A)\) and \(\delta (B)\). Observe that \(|F(A {\setminus } B, B {\setminus } A)| = 0\) and \(|F(A \cap B, V {\setminus } (A \cup B))| = 0\), by equations (3),(4). Each edge of \(\delta (A)\) is in exactly one of the sets \(F(A\cap {B},\,B\setminus {A})\) or \(F(A\setminus {B},\,V\setminus (A\cup {B}))\); call these edge-sets \(\phi _1, \phi _2\) for notational convenience. Similarly, each edge of \(\delta (B)\) is in exactly one of the sets \(F(A\cap {B},\,A\setminus {B})\) or \(F(B\setminus {A},\,V\setminus (A\cup {B}))\); call these edge-sets \(\phi _3, \phi _4\) for notational convenience. If two of the unsafe edges of \(\delta (A)\) are in the same set (i.e., if \(\phi _1\) or \(\phi _2\) has two unsafe edges), then part (i) of the claim holds, since either \(\delta (A\cap {B}), \delta (B\setminus {A})\) each have two (or more) unsafe edges or else \(\delta (A\cup {B}), \delta (A\setminus {B})\) each have two (or more) unsafe edges. Similarly, if two of the unsafe edges of \(\delta (B)\) are in the same set (i.e., if \(\phi _3\) or \(\phi _4\) has two unsafe edges), then part (i) of the claim holds. There is one remaining case: each of the four sets \(F(A\cap {B},\,B\setminus {A})\), \(F(A\setminus {B},\,V\setminus (A\cup {B}))\), \(F(A\cap {B},\,A\setminus {B})\), \(F(B\setminus {A},\,V\setminus (A\cup {B}))\) has exactly one unsafe edge. In this case, each of the four sets \(\delta (A\cup {B}), \delta (A\cap {B}), \delta (A\setminus {B}), \delta (B\setminus {A})\) has two unsafe edges. This proves part (i) of the claim. To prove part (ii) of the claim, observe that neither of the \((p+1)\)-cuts \(\delta (A\cap {B})\) or \(\delta (A\setminus {B})\) can have two (or more) unsafe edges, otherwise, a proper subset of the minimal violated set A would be violated. Then, the above case analysis shows that each of the two sets \(F(A\cap {B},\,B\setminus {A})\), \(F(A\setminus {B},\,V\setminus (A\cup {B}))\) has exactly one unsafe edge, and the set \(F(B\setminus {A},\,V\setminus (A\cup {B}))\) has two (or more) unsafe edges. This proves part (ii) of the claim.

Clearly, the function f is a pliable function, by Claim C.4, part (i). Next, we argue that the function f satisfies property \((\gamma )\).

Let C be a minimal violated set and let \(S_1,S_2\) be violated sets such that C crosses both \(S_1,S_2\) and \(S_1 \subsetneq S_2\). W.l.o.g. assume that \(S_2 \setminus (S_1\cup C)\) is non-empty. Since C crosses \(S_2\), the edge-set \(F(S_2\setminus {C},\,V\setminus (S_2\cup {C}))\) has size \((p+1)/2\), by Claim C.3. Moreover, by Claim C.4, part (ii), this edge-set contains two unsafe edges. Observe that \(S_1\cup {C}\) crosses \(S_2\); to see this, note that C crosses \(S_2\) so the sets \(C\cap {S_2},\, C\setminus {S_2},\, V\setminus (C\cup {S_2})\) are non-empty, and, by assumption, \(S_2 \setminus (S_1\cup C)\) is non-empty. Applying Claim C.3 to this pair of crossing sets, we see that the edge-set \(F(S_2\setminus (S_1\cup {C}),\,V\setminus (S_2\cup {C}))\) has size \((p+1)/2\). Then we have \(F(S_2\setminus {C},\,V\setminus (S_2\cup {C})) = F(S_2\setminus (S_1\cup {C}),\,V\setminus (S_2\cup {C}))\), because both edge-sets have the same size and one edge-set is a subset of the other edge-set. Hence, \(F(S_2\setminus (S_1\cup {C}),\,V\setminus (S_2\cup {C}))\) contains two unsafe edges. Finally, by Claim C.3, the cut \(\delta (S_2\setminus (S_1\cup {C}))\) has size \((p+1)\). Since this cut has two (or more) unsafe edges, \(S_2\setminus (S_1\cup {C})\) is a violated set. This proves that the function f satisfies property \((\gamma )\).

This completes the proof of Lemma 6.1. \(\square \)

Optimal Dual Solutions with Non-laminar Supports

In this section, we describe an instance of the \(\textrm{AugSmallCuts}\) problem where none of the optimal dual solutions (to the dual LP given in (2.2), Sect. 2) have a laminar support. Recall that the connectivity requirement function f for the \(\textrm{AugSmallCuts}\) problem is pliable and satisfies property \((\gamma )\), as seen in the proof of Theorem 1.2.

Consider the graph \(G = (V,E)\) (shown in Fig. 4 below using solid edges) which is a cycle on 4 nodes 1, 2, 3, 4, in that order. Edge-capacities are given by \(u_{12}=3, u_{23}=4, u_{34}=2, u_{41}=1\). The link-set (shown using dashed edges) is \(L=\{ 12, 23, 34, 41 \}\), which is a disjoint copy of E. Link-costs are given by \(c_{12} = c_{23} = c_{34} = 1\) and \(c_{41} = 2\).

Fig. 4
figure 4

An instance of the \(\textrm{AugSmallCuts}\) problem where every optimal dual solution has non-laminar support

Consider the \(\textrm{AugSmallCuts}\) instance that arises when we choose \(\widetilde{\lambda }= 6\). The family of small cuts (with capacity strictly less than \(\widetilde{\lambda }\)) is given by , where

The associated pliable function f satisfies \(f(S) = 1\) if and only if or holds. Observe that f is not uncrossable since \(f(\{1,2\}) = 1 = f(\{2,3\})\), but \(f(\{1,2\} \cap \{2,3\}) = f(\{2\}) = 0\) and \(f(\{2,3\} \setminus \{1,2\}) = f(\{3\}) =0\). Also note that the minimal violated set \(\{2,3\}\) (w.r.t. \(F = \emptyset \)) crosses the violated set \(\{1,2\}\).

It can be seen that there are three inclusion-wise minimal link-sets that are feasible for the above instance and these are given by

$$\begin{aligned} \mathcal {C}:= \{ \{12,23,34\}, \{12,41\}, \{34,41\} \}. \end{aligned}$$

Since each \(F \in \mathcal {C}\) has cost 3, the optimal value for the instance is 3. Next, since L contains at least two links from every nontrivial cut, the vector \(x\in [0,1]^L\) with \(x_e=\frac{1}{2},\,\forall {e}\in {L}\) is a feasible augmentation for the fractional version of the instance, i.e., x is feasible for the primal LP given in (2.2), Sect. 2. Therefore, the optimal value of the primal LP is at most \(\frac{5}{2}\).

Now, consider the dual LP, which is explicitly stated below. The dual packing-constraints are listed according to the following ordering of the links: 12, 23, 34, 41. For notational convenience, we use the shorthand \(y_1\) to denote the dual variable \(y_{\{1\}}\) corresponding to the set \(\{1\}\). We use similar shorthand to refer to the dual variables of the other sets; thus, \(y_{234}\) refers to the dual variable \(y_{\{2,3,4\}}\), etc.

$$\begin{aligned}&\max&(y_{1} + y_{234})&\quad +&(y_{12} + y_{34})&\quad +&(y_{23} + y_{14})&\quad +&(y_{123} + y_{4})&\qquad&\\&\, \text {subject to:}&(y_{1} + y_{234}){} & {} &\quad +&(y_{23} + y_{14}){} & {} &\; \le 1 \; \\{} & {} {} & {} (y_{12} + y_{34}){} & {} {} & {} &\; \le 1 \; \\{} & {} {} & {} {} & {} (y_{23} + y_{14})&\quad +&(y_{123} + y_{4})&\; \le 1 \; \\{} & {} (y_{1} + y_{234})&\quad +&(y_{12} + y_{34}){} & {} &\quad +&(y_{123} + y_{4})&\; \le 2 \; \\{} & {} {} & {} {} & {} {} & {} y&\; \ge 0. \end{aligned}$$

Observe that adding all packing constraints gives , hence, the optimal value of the dual LP is at most 5/2. Moreover, a feasible dual solution with objective 5/2 must satisfy the following conditions:

$$\begin{aligned} y_{1} + y_{234} = y_{23} + y_{14} = y_{123} + y_{4} = \frac{1}{2} \quad \text { and } \quad y_{12} + y_{34} = 1. \end{aligned}$$

Clearly, there is at least one solution to the above set of equations, hence, by LP duality, the optimal value of both the primal LP and the dual LP is 5/2.

Furthermore, any optimal dual solution \(y^*\) satisfies \(\max (y^*_S,y^*_{V\setminus {S}}) > 0\) for all (by the above set of equations). We conclude by arguing that for any optimal dual solution \(y^*\), its support is non-laminar, because some two sets cross. Since the relation A crosses B is closed under taking set-complements (w.r.t. the ground-set V), we may assume w.l.o.g. that the support contains each set in . The support of \(y^*\) is not laminar because \(\{1,2\}\) and \(\{2,3\}\) cross.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bansal, I., Cheriyan, J., Grout, L. et al. Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions. Algorithmica (2024). https://doi.org/10.1007/s00453-024-01235-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00453-024-01235-2

Keywords

Navigation