C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.

Slides:



Advertisements
Similar presentations
Introduction to Algorithms 6.046J/18.401J/SMA5503
Advertisements

The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
C&O 355 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Min-Max Relations, Hall’s Theorem, and Matching-Algorithms Graphs & Algorithms Lecture 5 TexPoint fonts used in EMF. Read the TexPoint manual before you.
C&O 355 Lecture 9 N. Harvey TexPoint fonts used in EMF.
C&O 355 Mathematical Programming Fall 2010 Lecture 9
C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
1 LP Duality Lecture 13: Feb Min-Max Theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum.
1 Matching Polytope x1 x2 x3 Lecture 12: Feb 22 x1 x2 x3.
C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Totally Unimodular Matrices
C&O 355 Lecture 4 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
C&O 355 Mathematical Programming Fall 2010 Lecture 20 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
C&O 355 Mathematical Programming Fall 2010 Lecture 21 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
C&O 355 Lecture 20 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
How should we define corner points? Under any reasonable definition, point x should be considered a corner point x What is a corner point?
Combinatorial Algorithms
Basic Feasible Solutions: Recap MS&E 211. WILL FOLLOW A CELEBRATED INTELLECTUAL TEACHING TRADITION.
Trees and BFSs Page 1 The Network Simplex Method Spanning Trees and Basic Feasible Solutions.
The Stackelberg Minimum Spanning Tree Game Jean Cardinal · Erik D. Demaine · Samuel Fiorini · Gwenaël Joret · Stefan Langerman · Ilan Newman · OrenWeimann.
Approximation Algoirthms: Semidefinite Programming Lecture 19: Mar 22.
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
Semidefinite Programming
1 Introduction to Linear and Integer Programming Lecture 9: Feb 14.
Introduction to Linear and Integer Programming Lecture 7: Feb 1.
Approximation Algorithm: Iterative Rounding Lecture 15: March 9.
1 Perfect Matchings in Bipartite Graphs An undirected graph G=(U  V,E) is bipartite if U  V=  and E  U  V. A 1-1 and onto function f:U  V is a perfect.
Computer Algorithms Integer Programming ECE 665 Professor Maciej Ciesielski By DFG.
Matching Polytope, Stable Matching Polytope Lecture 8: Feb 2 x1 x2 x3 x1 x2 x3.
Job Scheduling Lecture 19: March 19. Job Scheduling: Unrelated Multiple Machines There are n jobs, each job has: a processing time p(i,j) (the time to.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract.
1 Spanning Tree Polytope x1 x2 x3 Lecture 11: Feb 21.
C&O 355 Mathematical Programming Fall 2010 Lecture 17 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
C&O 355 Mathematical Programming Fall 2010 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
C&O 355 Lecture 2 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
C&O 355 Mathematical Programming Fall 2010 Lecture 2 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
C&O 355 Mathematical Programming Fall 2010 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
Design Techniques for Approximation Algorithms and Approximation Classes.
Matrix Completion Problems for Various Classes of P-Matrices Leslie Hogben Department of Mathematics, Iowa State University, Ames, IA 50011
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
C&O 355 Mathematical Programming Fall 2010 Lecture 4 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
Theory of Computing Lecture 13 MAS 714 Hartmut Klauck.
 2004 SDU Lecture 7- Minimum Spanning Tree-- Extension 1.Properties of Minimum Spanning Tree 2.Secondary Minimum Spanning Tree 3.Bottleneck.
C&O 355 Mathematical Programming Fall 2010 Lecture 18 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A Image:
Hon Wai Leong, NUS (CS6234, Spring 2009) Page 1 Copyright © 2009 by Leong Hon Wai CS6234: Lecture 4  Linear Programming  LP and Simplex Algorithm [PS82]-Ch2.
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
C&O 355 Mathematical Programming Fall 2010 Lecture 16 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Updated 21 April2008 Linear Programs with Totally Unimodular Matrices.
C&O 355 Mathematical Programming Fall 2010 Lecture 5 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
EMIS 8373: Integer Programming Combinatorial Relaxations and Duals Updated 8 February 2005.
Hon Wai Leong, NUS (CS6234, Spring 2009) Page 1 Copyright © 2009 by Leong Hon Wai CS6234: Lecture 4  Linear Programming  LP and Simplex Algorithm [PS82]-Ch2.
C&O 355 Lecture 7 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Lecture.6. Table of Contents Lp –rounding Dual Fitting LP-Duality.
C&O 355 Lecture 24 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A.
Hon Wai Leong, NUS (CS6234, Spring 2009) Page 1 Copyright © 2009 by Leong Hon Wai CS6234: Lecture 4  Linear Programming  LP and Simplex Algorithm [PS82]-Ch2.
NP-completeness NP-complete problems. Homework Vertex Cover Instance. A graph G and an integer k. Question. Is there a vertex cover of cardinality k?
Linear Programming Chap 2. The Geometry of LP  In the text, polyhedron is defined as P = { x  R n : Ax  b }. So some of our earlier results should.
Approximation Algorithms based on linear programming.
Polyhedral Optimization Lecture 2 – Part 2 M. Pawan Kumar Slides available online
Lap Chi Lau we will only use slides 4 to 19
Topics in Algorithms Lap Chi Lau.
Analysis of Algorithms
Problem Solving 4.
Kramer’s (a.k.a Cramer’s) Rule
Flow Feasibility Problems
Chapter 2. Simplex method
Presentation transcript:

C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A

Topics Solving Integer Programs Basic Combinatorial Optimization Problems – Bipartite Matching, Minimum s-t Cut, Shortest Paths, Minimum Spanning Trees Bipartite Matching – Combinatorial Analysis of Extreme Points – Total Unimodularity

Mathematical Programs We’ve Seen Linear Program (LP) Convex Program Semidefinite Program (SDP) Integer Program (IP) (where f is convex) (where X is symmetric matrix corresponding to x ) Can be efficiently solved e.g., by Ellipsoid Method Cannot be efficiently solved assuming P  NP

Computational Complexity If you could efficiently (i.e., in polynomial time) decide if every integer program is feasible, then P = NP And all of modern cryptography is broken And you win $1,000,000 … P NP coNP Sorting, string matching, breadth-first search, … NP Å coNP Is LP feasible? Is integer program feasible? Can graph be colored with · k colors? Does every coloring of graph use ¸ k colors? Is integer program infeasible?

Combinatorial IPs are often nice Maximum Bipartite Matching (from Lecture 2) Given bipartite graph G=(V, E) Find a maximum size matching – A set M µ E s.t. every vertex has at most one incident edge in M

Combinatorial IPs are often nice Maximum Bipartite Matching (from Lecture 2) Given bipartite graph G=(V, E) Find a maximum size matching – A set M µ E s.t. every vertex has at most one incident edge in M The blue edges are a matching M

Combinatorial IPs are often nice The natural integer program This IP can be efficiently solved, in many different ways Maximum Bipartite Matching (from Lecture 2) Given bipartite graph G=(V, E) Find a maximum size matching – A set M µ E s.t. every vertex has at most one incident edge in M

Combinatorial IPs are often nice Max-Weight Perfect Matching Given bipartite graph G=(V, E). Every edge e has a weight w e. Find a maximum-weight perfect matching – A set M µ E s.t. every vertex has exactly one incident edge in M

Combinatorial IPs are often nice Max-Weight Perfect Matching Given bipartite graph G=(V, E). Every edge e has a weight w e. Find a maximum-weight perfect matching – A set M µ E s.t. every vertex has exactly one incident edge in M The blue edges are a max-weight perfect matching M

Combinatorial IPs are often nice The natural integer program This IP can be efficiently solved, in many different ways Max-Weight Perfect Matching Given bipartite graph G=(V, E). Every edge e has a weight w e. Find a maximum-weight perfect matching – A set M µ E s.t. every vertex has exactly one incident edge in M

Combinatorial IPs are often nice Minimum s-t Cut in a Graph (from Lecture 12) Let G=(V,E) be a graph. Fix two vertices s,t 2 V. An s-t cut is a set F µ E such that, if you delete F, then s and t are disconnected i.e., there is no s-t path in G\F = (V,E\F). s t

Combinatorial IPs are often nice Minimum s-t Cut in a Graph (from Lecture 12) Let G=(V,E) be a graph. Fix two vertices s,t 2 V. An s-t cut is a set F µ E such that, if you delete F, then s and t are disconnected i.e., there is no s-t path in G\F = (V,E\F). s t These edges are a minimum s-t cut

Combinatorial IPs are often nice Minimum s-t Cut in a Graph (from Lecture 12) Let G=(V,E) be a graph. Fix two vertices s,t 2 V. An s-t cut is a set F µ E such that, if you delete F, then s and t are disconnected. Want to find an s-t cut of minimum cardinality Write a (very big!) integer program. Make variable x e for every e 2 E. Let P be set of all s-t paths. This IP can be efficiently solved, in many different ways

Combinatorial IPs are often nice Shortest Paths in a Digraph Let G=(V,A) be a directed graph. Every arc a has a “length” w a ¸ 0. Given two vertices s and t, find a path from s to t of minimum total length s t

Combinatorial IPs are often nice Shortest Paths in a Digraph Let G=(V,A) be a directed graph. Every arc a has a “length” w a ¸ 0. Given two vertices s and t, find a path from s to t of minimum total length s t These edges form a shortest s-t path

Combinatorial IPs are often nice Shortest Paths in a Digraph Let G=(V,A) be a directed graph. Every arc a has a “length” w a ¸ 0. Given two vertices s and t, find a path from s to t of minimum total length. There is a natural IP for this problem that can be efficiently solved, in many different ways.

Combinatorial IPs are often nice Minimum Spanning Tree in a Graph Let G=(V,E) be a graph. Every edge e has a weight w e. An spanning tree is a set F µ E with no cycles, such that F contains a path between every pair of vertices

Combinatorial IPs are often nice Minimum Spanning Tree in a Graph Let G=(V,E) be a graph. Every edge e has a weight w e. An spanning tree is a set F µ E with no cycles, such that F contains a path between every pair of vertices. s t These edges are a minimum spanning tree There is an s-t path in the tree

Combinatorial IPs are often nice Minimum Spanning Tree in a Graph Let G=(V,E) be a graph. Every edge e has a weight w e. An spanning tree is a set F µ E with no cycles, such that F contains a path between every pair of vertices. There is a natural IP for this problem that can be efficiently solved, in many different ways.

How to solve combinatorial IPs? Two common approaches 1.Design combinatorial algorithm that directly solves IP Often such algorithms have a nice LP interpretation 2.Relax IP to an LP; prove that they give same solution; solve LP by the ellipsoid method Need to show special structure of the LP’s extreme points Sometimes we can analyze the extreme points combinatorially Sometimes we can use algebraic structure of the constraints. For example, if constraint matrix is Totally Unimodular then IP and LP are equivalent We’ll see examples of these approaches

Perfect Matching Problem c Relax integrality constraints, obtain an LP (LP) Theorem: Every BFS of (LP) is actually an (IP) solution! Write an integer program (IP) Let G=(V, E) be a bipartite graph. Every edge e has a weight w e. Find a maximum-weight, perfect matching – A set M µ E s.t. every vertex has exactly one incident edge in M (x e · 1 is implicit)

Combinatorial Analysis of BFSs Lemma: Every BFS of perfect matching (LP) is an (IP) solution. Proof: Let x be BFS, suppose x not integral. Pick any edge e 1 ={v 0,v 1 } with 0 < x e1 < 1. The LP requires ) there is another edge e 2 ={v 1,v 2 } with 0 < x e2 < 1. The LP requires ) there is another edge e 3 ={v 2,v 3 } with 0 < x e3 < 1. Continue finding distinct edges until eventually v i =v k, i<k We have e i+1 ={v i,v i+1 }, e i+2 ={v i+1,v i+2 }, …, e k ={v k-1,v k }. (all edges and vertices distinct, except v i =v k )

Combinatorial Analysis of BFSs Let x be BFS of matching (LP). Suppose x not integral. WLOG, e 1 ={v 0,v 1 }, e 2 ={v 1,v 2 }, …, e k ={v k-1,v k } and v 0 =v k. These edges form a simple cycle, of even length. (Even length since G is bipartite.) Define the vector: Claim: If | ² | is sufficiently small, then x+ ² d is feasible So x is convex combination of x+ ² d and x- ² d, both feasible This contradicts x being a BFS. ¥

How to solve combinatorial IPs? Two common approaches 1.Design combinatorial algorithm that directly solves IP Often such algorithms have a nice LP interpretation 2.Relax IP to an LP; prove that they give same solution; solve LP by the ellipsoid method Need to show special structure of the LP’s extreme points Sometimes we can analyze the extreme points combinatorially Sometimes we can use algebraic structure of the constraints. For example, if constraint matrix is Totally Unimodular then IP and LP are equivalent

c LP Approach for Bipartite Matching Relax integrality constraints, obtain an LP (LP) Theorem: Every BFS of (LP) is actually an (IP) solution! Write an integer program (IP) Let G=(V, E) be a bipartite graph. Every edge e has a weight w e. Find a maximum weight matching – A set M µ E s.t. every vertex has at most one incident edge in M (x e · 1 is implicit)

Total Unimodularity Let A be a real m x n matrix Definition: Suppose that every square submatrix of A has determinant in {0, +1, -1}. Then A is totally unimodular (TUM). – In particular, every entry of A must be in {0, +1, -1} Lemma: Suppose A is TUM. Let b be any integer vector. Then every basic feasible solution of P = { x : Ax · b } is integral. Proof: Let x be a basic feasible solution. Then the constraints that are tight at x have rank n. Let A’ be a submatrix of A and b’ a subvector of b corresponding to n linearly independent constraints that are tight at x. Then x is the unique solution to A’ x = b’, i.e., x = (A’) -1 b’. Cramer’s Rule: If M is a square, non-singular matrix then (M -1 ) i,j = (-1) i+j det M del(j,i) / det M. Submatrix of M obtained by deleting row j and column i

Total Unimodularity Let A be a real m x n matrix Definition: Suppose that every square submatrix of A has determinant in {0, +1, -1}. Then A is totally unimodular (TUM). Lemma: Suppose A is TUM. Let b be any integer vector. Then every basic feasible solution of P = { x : Ax · b } is integral. Proof: Let x be a basic feasible solution. Then the constraints that are tight at x have rank n. Let A’ be the submatrix of A and b’ the subvector of b containing n linearly independent constraints that are tight at x. Then x is the unique solution to A’ x = b’, i.e., x = (A’) -1 b’. Cramer’s Rule: If M is a square, non-singular matrix then (M -1 ) i,j = (-1) i+j det M del(j,i) / det M. Thus all entries of (A’) -1 are in {0, +1, -1}. Since b’ is integral, x is also integral. ¥

Operations Preserving Total Unimodularity Let A be a real m x n matrix Definition: Suppose that every square submatrix of A has determinant in {0, +1, -1}. Then A is totally unimodular (TUM). Lemma: Suppose A is TUM. Let b be any integer vector. Then every basic feasible solution of P = { x : Ax · b } is integral. Claim: Suppose A is TUM. Then is also TUM. Proof: Exercise on Assignment 5. ¤ Corollary: Suppose A is TUM. Let b be any integer vector. Then every basic feasible solution of P = { x : Ax · b, x ¸ 0 } is integral. Proof: By the Claim, is TUM. So apply the Lemma to. ¥

Bipartite Matching & Total Unimodularity Let G=(U [ V, E) be a bipartite graph. – So all edges have one endpoint in U and the other in V. Let A be the “incidence matrix” of G. A has a row for every vertex and a column for every edge. Note: Every column of A has exactly two non-zero entries. Lemma: A is TUM. Proof: Let Q be a k x k submatrix of A. Argue by induction on k. If k=1 then Q is a single entry of A, so det(Q) is either 0 or 1. Suppose k>1. If some column of Q has no non-zero entries, then det(Q)=0. A w,e = 1 if vertex w is an endpoint of edge e 0 otherwise

Let G=(U [ V, E) be a bipartite graph. Define A by Lemma: A is TUM. Proof: Let Q be a k x k submatrix of A. Assume k>1. If some column of Q has no non-zero entries, then det(Q)=0. Suppose j th column of Q has exactly one non-zero entry, say Q t,j  0 Use “Column Expansion” of determinant:, where t is the unique non-zero entry in column j. By induction, det Q del(t,j) in {0,+1,-1} ) det Q in {0,+1,-1}. A v,e = 1 if vertex v is an endpoint of edge e 0 otherwise

Let G=(U [ V, E) be a bipartite graph. Define A by Lemma: A is TUM. Proof: Let Q be a k x k submatrix of A. Assume k>1. If some column of Q has no non-zero entries, then det(Q)=0. If j th column of Q has exactly one non-zero entry, use induction. Suppose every column of Q has exactly two non-zero entries. – For each column, one non-zero is in a U-row and the other is in a V-row. So summing all U-rows in Q gives the vector [1,1,…,1]. Also summing all V-rows in Q gives the vector [1,1,…,1]. So (sum of U-rows) – (sum of V-rows) = [0,0,…,0]. Thus Q is singular, and det Q = 0. ¥ A v,e = 1 if vertex v is an endpoint of edge e 0 otherwise

Let G=(U [ V, E) be a bipartite graph. Define A by Lemma: A is TUM. So every BFS of P = { x : Ax · 1, x ¸ 0 } is integral. We can rewrite the LP max { w T x : x 2 P } as For every objective function w, this LP has an optimal solution at a BFS. (Since P is bounded) So for every vector w, the LP has an integral optimal solution x. – Since 0 · x e · 1, and x is integral, we actually have x e 2 {0,1}. So every optimal LP solution is actually an (optimal) IP solution. ) So we can solve the IP by solving the LP and returning a BFS. (x e · 1 is implicit) A v,e = 1 if vertex v is an endpoint of edge e 0 otherwise

How to solve combinatorial IPs? Two common approaches 1.Design combinatorial algorithm that directly solves IP Often such algorithms have a nice LP interpretation 2.Relax IP to an LP; prove that they give same solution; solve LP by the ellipsoid method Need to show special structure of the LP’s extreme points Sometimes we can analyze the extreme points combinatorially Sometimes we can use algebraic structure of the constraints. For example, if constraint matrix is Totally Unimodular then IP and LP are equivalent