From Approximative Kernelization to High Fidelity Reductions joint with Michael Fellows Ariel Kulik Frances Rosamond Technion Charles Darwin Univ. Hadas.

Slides:



Advertisements
Similar presentations
한양대학교 정보보호 및 알고리즘 연구실 이재준 담당교수님 : 박희진 교수님
Advertisements

Advanced Piloting Cruise Plot.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Chapter 1 The Study of Body Function Image PowerPoint
Subspace Embeddings for the L1 norm with Applications Christian Sohler David Woodruff TU Dortmund IBM Almaden.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Analysis of Algorithms
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
ZMQS ZMQS
Reductions Complexity ©D.Moshkovitz.
Comp 122, Spring 2004 Order Statistics. order - 2 Lin / Devi Comp 122 Order Statistic i th order statistic: i th smallest element of a set of n elements.
1 Bart Jansen Polynomial Kernels for Hard Problems on Disk Graphs Accepted for presentation at SWAT 2010.
Randomized Algorithms Randomized Algorithms CS648 1.
Recurrences : 1 Chapter 3. Growth of function Chapter 4. Recurrences.
ABC Technology Project
Basic Laws of Electric Circuits Kirchhoff’s Voltage Law
3D Priors for Scene Learning from a Single View Diego Rother, Kedar Patwardhan, Iman Aganj and Guillermo Sapiro University of Minnesota 1 Search in 3D.
Chapter 9 -- Simplification of Sequential Circuits.
VOORBLAD.
15. Oktober Oktober Oktober 2012.
Quadratic Inequalities
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
CS1022 Computer Programming & Principles Lecture 7.1 Graphs (1)
Abbas Edalat Imperial College London Contains joint work with Andre Lieutier (AL) and joint work with Marko Krznaric (MK) Data Types.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
1 Motion and Manipulation Configuration Space. Outline Motion Planning Configuration Space and Free Space Free Space Structure and Complexity.
Chapter 5 Test Review Sections 5-1 through 5-4.
What You Should Learn • Represent and classify real numbers.
1 On c-Vertex Ranking of Graphs Yung-Ling Lai & Yi-Ming Chen National Chiayi University Taiwan.
Addition 1’s to 20.
25 seconds left…...
Exponential and Logarithmic Functions
Copyright © Cengage Learning. All rights reserved.
Copyright © Cengage Learning. All rights reserved.
Complexity ©D.Moshkovits 1 Where Can We Draw The Line? On the Hardness of Satisfiability Problems.
Copyright © Cengage Learning. All rights reserved.
§5 Minimum Spanning Tree 【 Definition 】 A spanning tree of a graph G is a tree which consists of V( G ) and a subset of E( G ) 〖 Example 〗 A complete.
Week 1.
Abdollah Khodkar Department of Mathematics University of West Georgia Joint work with Arezoo N. Ghameshlou, University of Tehran.
We will resume in: 25 Minutes.
PSSA Preparation.
1 Functions and Applications
Instructor: Shengyu Zhang 1. Content Two problems  Minimum Spanning Tree  Huffman encoding One approach: greedy algorithms 2.
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Interval Graph Test.
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Secret Sharing, Matroids, and Non-Shannon Information Inequalities.
Minimum Vertex Cover in Rectangle Graphs
1 Graphs with Maximal Induced Matchings of the Same Size Ph. Baptiste 1, M. Kovalyov 2, Yu. Orlovich 3, F. Werner 4, I. Zverovich 3 1 Ecole Polytechnique,
1 Almost all cop-win graphs contain a universal vertex Anthony Bonato Ryerson University CanaDAM 2011.
Introduction to Kernel Lower Bounds Daniel Lokshtanov.
Approximative Kernelization: On the Trade-off between Fidelity and Kernel Size joint with Michael Fellows and Frances Rosamond Charles Darwin University.
1 Refined Search Tree Technique for Dominating Set on Planar Graphs Jochen Alber, Hongbing Fan, Michael R. Fellows, Henning Fernau, Rolf Niedermeier, Fran.
Data reduction lower bounds: Problems without polynomial kernels Hans L. Bodlaender Joint work with Downey, Fellows, Hermelin, Thomasse, Yeo.
Fixed Parameter Complexity Algorithms and Networks.
Data Reduction for Graph Coloring Problems Bart M. P. Jansen Joint work with Stefan Kratsch August 22 nd 2011, Oslo.
Kernel Bounds for Path and Cycle Problems Bart M. P. Jansen Joint work with Hans L. Bodlaender & Stefan Kratsch September 8 th 2011, Saarbrucken.
Joint work with Hans Bodlaender
Computability and Complexity
Constrained Bipartite Vertex Cover: The Easy Kernel is Essentially Tight Bart M. P. Jansen June 4th, WORKER 2015, Nordfjordeid, Norway.
Constrained Bipartite Vertex Cover: The Easy Kernel is Essentially Tight Bart M. P. Jansen February 18th, STACS 2016, Orléans, France.
Presentation transcript:

From Approximative Kernelization to High Fidelity Reductions joint with Michael Fellows Ariel Kulik Frances Rosamond Technion Charles Darwin Univ. Hadas Shachnai Technion Workshop on Kernelization, Sept 2011

Approximative Kernelization Traditionally: used as a preprocessing tool in FPT algorithms, which does not harm the classification of the instance (as a ‘yes’ or ‘no’ w.r.t. the parameterized problem). Many FPT algorithms for NP-hard problems use kernels whose sizes are lower bounded by a function f(k) = Ω(poly(k)), where k is the parameter. Suppose that in solving an FPT problem Π, we want to obtain a kernel of smaller size (=better running time), with some compromise on its fidelity when lifting a solution for the kernelized instance back to a solution for the original instance. 2 Can we define a tradeoff between fidelity and kernel size?

Approximative Kernelization Let L be a parameterized problem, i.e., L consists of input pairs (x, k), where x is a problem instance, and k is the parameter. Given α ≥ 1, an α-fidelity kernelization of the problem (i) Transforms in polynomial time the input (x, k) to ‘reduced’ input (x’, k’), such that k’ ≤ k and |x’| ≤ g(k, α), and (ii) If (x, k)  L then (x’, k’)  L (iii) If (x’, k’)  L then (x, α ·k)  L 3 The special case where α = 1 is classic kernelization.

Approximative Kernelization Combine approximation with kernelization: While lifting up to a solution for the original problem, we may get the value k, whereas there exists a solution of value k/α. The definition refers to Minimization problems (similar for maximization problems with k/α replaced by kα). 4

Many 2- approximation polynomial-time algorithms Unless Unique Game Conjecture fails: No factor-(2- ε)- approximation polynomial time algorithm exists [Khot, Regev 2008]. Vertex Cover is in FPT for general graphs: can be solved in time O * (1.28 k ). 5 Application: Vertex Cover Input: An undirected graph G=(V,E), an integer k ≥ 1. Output: A subset of vertices C  V, |C| ≤ k such that each edge in E has at least one endpoint in C (if one exists).

Application: Vertex Cover 6 1.Reduction step: Apply standard reduction rules to obtain (G’, k’). 2. Shrinking step : Select l = ⌊ k (α-1) ⌋ independent edges, I ⊆ E. Let D ⊆ V be the subset of vertices adjacent to I. 3. Omit from G’ the subgraph induced by D; omit isolated vertices. Let G’’ be the resulting graph. 4. The kernel is G’’ with k’’=k’- l. Let G=(V,E), k ≥ 1 and α  [1,2]. GGG G’’ is α -fidelity kernel: 1)G’’ is smaller than G’, therefore the size requirement holds. 2) If (G, k)  L then (G’, k’)  L (i.e., there is a cover C, such that |C| ≤ k’).

Application: Vertex Cover (Cont’d) 7 1.Reduction step: Apply standard reduction rules to obtain (G’, k’). 2. Shrinking step : Select l = k (α-1) independent edges, I ⊆ E. Let D ⊆ V be the subset of vertices adjacent to I. 3. Omit from G’ the subgraph induced by D; omit isolated vertices. Let G’’ be the resulting graph. 4. The kernel is G’’ with k’’=k’- l. GGG Therefore, (G’’, k’’)  L (C\D is a cover of size no greater than k’- l ). 3) If (G’’, k’’)  L then (G, α k )  L (there is a cover C’’ of size k’’ for G’’; then, C’’ U D is a cover of size k’’+2 l = k’+ l For G’. Hence, there is a cover of size k+ l = α k for G). Kernel size is 2k(2- α ).

8 Algorithm : Shrinking step v 17 v 14 v 13 v 19 v2v2 v4v4 v 12 v 18 v6v6 v3v3 v5v5 v7v7 v1v1 v8v8 v9v9 v 11 v 10 v 16 v 15 v 20 l = k( α -1) =6 D={v 1,v 2,v 4,v 6, v 7,v 9,v 12,v 14, v 15,v 16,v 18,v 19 } G’ = ({v 1,…,v 20 }, E’) k=10, α =8/5

9 Algorithm : Shrinking step v 17 v 13 v3v3 v5v5 v8v8 v 11 v 10 v 20

10 Algorithm : Shrinking step v5v5 v8v8 v 11 v 20 G’’= ({v 5, v 8,v 11,v 20 }, E’’)

11 Algorithm : example a z y t u x c b w r v s G=(V,E), k=8

12 Algorithm : example a z y t u x c b w r s v Reduction step: Omit the crown H 1 ={b,c} I 1 ={u,v,w} α =2 l = k(α -1) =8

13 Algorithm : example a z y t x r s Reduction step: Omit the crown H 1 ={b,c} I 1 ={u,v,w} α =2 l = k(α-1) =8

14 Algorithm : example z t s Reduction step: Omit the crown H 1 ={b,c} I 1 ={u,v,w} α =2 l = k(α -1) =8 |I| ‹ l : G’’ is a 2-fidelity kernel of size 0!

15 Algorithm : example a z y t u x c b w r v s G=(V,E), k=8

16 Algorithm : example a z y t u x c b w r s v Reduction step: Omit the crown H 1 ={b,c} I 1 ={u,v,w} α =1 l = k( α-1 ) =0

What Happens If We Switch the Order? Reduction step: Apply standard reduction rules to obtain (G’, k’). 2. Shrinking step : Select l = k (α-1) independent edges, I ⊆ E. Let D ⊆ V be the subset of vertices adjacent to I. 3. Omit from G’ the subgraph induced by D; omit isolated vertices. Let G’’ be the resulting graph. 4. The kernel is G’’ with k’’=k’- l. GGG

What Happens If We Switch the Order? Shrinking step : Select l = k (α-1) independent edges, I ⊆ E. Let D ⊆ V be the subset of vertices adjacent to I. 2. Omit from G the subgraph induced by D; omit isolated vertices. Let G’ be the resulting graph with k’=k- l. 3. Reduction step: Apply standard reduction rules to obtain from G’ a kernel (G’’, k’’). GGG G’’ is α -fidelity kernel. Eliminates the assumption on linearity of kernelization (we previously assumed that a cover of size k’+ l for G’ implies a cover of size k+ l for G).

19 1. Shrinking step : Select l = k (α-1) independent edges, I ⊆ E. Let D ⊆ V be the subset of vertices adjacent to I. 2. Omit from G the subgraph induced by D; omit isolated vertices. Let G’ be the resulting graph with k’=k- l. 3. Reduction step: Apply standard reduction rules to obtain from G’ a kernel (G’’, k’’). A parameterized Approximation Algorithm Replace kernelization by any FPT algorithm.

Main contribution of Steps 1. and 2. is in decreasing the value of k (tradeoff with fidelity) Shrinking step : Select l = k (α-1) independent edges, I ⊆ E. Let D ⊆ V be the subset of vertices adjacent to I. 2. Omit from G the subgraph induced by D; omit isolated vertices. Let G’ be the resulting graph with k’=k- l. 3. Solution step: Run FPT algorithm on G’. A parameterized Approximation Algorithm

Let L be a parameterized problem, i.e., L consists of input pairs (x, k), where x is a problem instance, and k is the parameter. Given α ≥ 1, an α -fidelity shrinking of order h (i) Transforms in polynomial time the input (x, k) to ‘reduced’ input (x’, k’), such that k’ ≤ h(k), (ii) If (x, k)  L then (x’, k’)  L (iii) If (x’, k’)  L then (x, α ·k)  L 21 A Generic Approach: α-fidelity Shrinking Define simple reduction steps as a key building block to obtain α -fidelity shrinking for various problems

Given a parameterized problem L, a transformation r: U ─ > U is (a,b)-reduction step if, for any (x, k)  L, and (x’, k’) = r(x, k): (i) k’ = k - a, (ii) If (x, k)  L then (x’, k’)  L (iii) For any integer n ≥ 0, if (x’, k’+n)  L then (x, k+b+n)  L 22 Obtaining α-fidelity Shrinking Given a parameterized problem L, an (a,b)-reduction step r, and α ≤ 1+b/a, such that r can be evaluated in polynomial time, there is α -fidelity shrinking of order k(b+ a - α a)/b for L.

23 Approximations via α -fidelity Shrinking: Some Examples Problem Kernel sizeRunning timeBest FPT algorithm Vertex cover 2(2- α)k (2- α)k k [CKX’06] Connected vertex cover No poly- kernel 2 k(2- α) 2 k [CN+ 11] 3-Hitting set k [W’07] (All problems parameterized by solution size, k)

24 How Powerful Is The Approach?

25 Related Work FPT approximation Obtain a solution of value g(k) for a problem parameterized by k (e.g., Downey, F, McCartin and R, 2008; Many more..) Parameterized approximations for NP-hard problems by moderately exponential time algorithms Improve best known approximation ratios for subgraph maximization, minimum covering (Bourgeois, Escoffier and Paschos, 2009) β-approximation algorithms for vertex cover, β  (1,2), through accelerated branching (Fernau, Brankovic and Cakic, 2009) β-approximation algorithms for Hitting sets ( Fernau, 2011)

26 Related Work (Cont’d) Links between approximation and kernelization: Exploit polynomial time approximation results in kernelization (Bevern, Moser and Niedermeier, 2010)

27 What’s next?  Explore further the Generic approach for approximations based on α -fidelity shrinking : efficient application for other problems (e.g. Feedback Vertex Set, Edge Dominating Set..) ?  Can non-linear reduction (kernelization) rules be used to obtain better order (i.e., decreased running time)?  Extend the approach to problems with no FPT algorithm.