• Aucun résultat trouvé

Combinatorial Optimization and Graph Theory ORCO Applications of submodular functions

N/A
N/A
Protected

Academic year: 2022

Partager "Combinatorial Optimization and Graph Theory ORCO Applications of submodular functions"

Copied!
53
0
0

Texte intégral

(1)

Combinatorial Optimization and Graph Theory ORCO

Applications of submodular functions

Zolt´an Szigeti

(2)

Applications of submodular functions

Planning

1 Definitions, Examples,

2 Uncrossing technique,

3 Splitting off technique,

4 Constructive characterization,

5 Orientation,

6 Augmentation,

7 Submodular function minimization.

(3)

Submodular functions

Definitions

1 A function m: 2S →Ris modular if for allX,YS, m(X) +m(Y) =m(XY) +m(XY).

2 A function b: 2S →R∪ {+∞} issubmodularif for allX,YS, b(X) +b(Y)≥b(XY) +b(XY).

3 A function p: 2S →R∪ {−∞} issupermodular if for allX,YS, p(X) +p(Y)≤p(XY) +p(XY).

(4)

Modular functions

Examples for Modular functions

1 m(X) =k: constant function, where XS,k ∈R,

2 m(X) =|X|: cardinalityfunction on a set S,

3 m(X) =m(∅) +P

v∈Xm(v): whereXS,m(∅),m(v) ∈R ∀v ∈S.

(5)

Submodular functions

Examples for Submodular functions

1 dG(X): degreefunction of an undirected graphG,

(bydG(X) +dG(Y) =dG(X∩Y) +dG(X∪Y) + 2dG(X\Y,Y \X))

2 dD+(X) :out-degree function of a directed graphD,

3 dg+(X) :capacityfunction of a network (D,g),

4 |Γ(X)|:number ofneighborsofX in a bipartite graph, (by modularity of | · |,Γ(X)∪Γ(Y) = Γ(X ∪Y) andΓ(X)∩Γ(Y)⊇Γ(X ∩Y)),

5 r(X) : rankfunction of a matroid,

6 r1(X) +r2(S\X) :for rank functionsr1 andr2 of two matroids on S,

7 g(|X|) : for aconcavefunctiong :R+ →R+.

(6)

Supermodular functions

Examples for Supermodular functions

1 |E(X)|:where E(X) is the set ofedges ofG insideXV, (by |E(X)|= 12(P

v∈X dG(v)−dG(X)),

2 cG(F) :the number of connected componentsof the subgraph of G = (V,E)induced by FE.

(by cG(F) =|V| −rG(F), where rG is the rank function of the forest matroid of G).

(7)

Uncrossing technique: Flows

Theorem

In a network (D,g), the intersection and the union of twominimum capacity(s,t)-cuts are minimum capacity(s,t)-cuts.

Proof:

1 Let X andY be two(s,t)-cuts of capacitymin.

2 Then dg+(X) =min anddg+(Y) =min.

3 Since XY andXY are (s,t)-cuts,

4 dg+(X ∩Y)≥min anddg+(X ∪Y)≥min.

5 min+min=dg+(X) +dg+(Y)≥dg+(X∩Y) +dg+(X ∪Y)

≥min+min by (2), submodularity and (4).

6 Hence equality holds everywhere: dg+(X ∩Y) =minand dg+(X ∪Y) =min.

(8)

Uncrossing technique: Matchings

Theorem (Frobenius)

A bipartite graph B = (U,V;E) has a matching coveringU if and only if (∗) |Γ(X)| ≥ |X|for allXU.

Proof:

1 We show only the difficult direction.

2 We call a setXU tight if |Γ(X)|=|X|.

3 If X andY are tight, then XY andXY are also tight:

1 By the tightness ofX andY, the submodularity of|Γ(·)|,(∗)and the modularity of| · |, we have

|X|+|Y|=|Γ(X)|+|Γ(Y)|

≥ |Γ(XY)|+|Γ(XY)|

≥ |X Y|+|XY|

=|X|+|Y|,

2 hence equality holds everywhere andXY andX Y are tight.

(9)

Uncrossing technique: Matchings

Proof:

4 We may suppose that after deleting any edge of B,(∗)doesn’t hold anymore.

5 Then every edge uv of B enters a tight setXuv such thatu is the only neighbor of v in Xuv:

1 Since after deletinguv fromB,(∗)doesn’t hold,

2 ∃Xuv U:|Xuv| −1≥ |ΓBuv(Xuv)|.

3 Moreover, Buv(Xuv)| ≥ |ΓB(Xuv)| −1, and

4 by(∗), B(Xuv)| −1≥ |Xuv| −1,

5 hence equality holds everywhere, that is

6 Xuv is tight anduis the only neighbor ofv inXuv.

(10)

Uncrossing technique: Matchings

Proof:

6 We show that every vertex ofU is of degree 1 in B.

1 Suppose thatuU is incident to two edgesuv anduw inB.

2 By (5),X:=XuvXuw is tight,uis unique neighbor ofv (ofw) inX.

3 Then, by(∗)and the tightness ofX, we have a contradiction:

|X| −1 =|X\u| ≤ |ΓB(X \u)| ≤ |ΓB(X)| −2 =|X| −2.

7 Two vertices u andu inU can not have a common neighbor since

B({u,u})| ≥2.

8 By (6) and (7), E is a matching ofB coveringU.

(11)

Uncrossing technique: General lemma

Definitions:

1 A graphG coversa function p onV if dG(X)≥p(X) for allXV.

2 XV is tightif dG(X) =p(X).

3 Two sets X and Y ofV are crossing if none ofX \Y,Y \X,XY andV \(X∪Y) is empty.

4 A function iscrossing supermodularif the supermodular inequality holds for any crossing sets X andY.

(12)

Uncrossing technique: General lemma

Uncrossing Lemma

If G covers a crossing supermodular functionp then the intersection and the union of crossing tight sets are tight.

Proof:

1 Let X andY be two crossing tight sets ofV.

2 Since they are tight,dG(·) is submodular,G coversp andp is crossing supermodular, we have

p(X) +p(Y) =dG(X) +dG(Y)

dG(X ∩Y) +dG(X ∪Y)

p(X∩Y) +p(XY)

p(X) +p(Y),

3 hence equality holds everywhere and the lemma follows.

(13)

Uncrossing technique for minimum tight sets

Definitions:

1 A graph G is calledk-edge-connectedifdG(X)≥k ∀∅ 6=XV(G).

2 G isminimallyk-edge-connected if

1 G isk-edge-connected and

2 for each edgee ofG, Ge is notk-edge-connected anymore.

(14)

Uncrossing technique for minimum tight sets

Theorem (Mader)

A minimally k-edge-connected graphG has a vertex of degree k.

Proof:

1 Let p(X):=k if∅ 6=XV and0 otherwise.

2 Then p is crossing supermodular.

3 Since G is k-edge-connected, dG(X)≥k =p(X), so G coversp.

4 By minimality of G, each edge ofG enters a tight set.

5 Let X be a minimal non-empty tight set.

6 Suppose that X is not a vertex.

7 By minimality of X,there exists an edge uv in X.

8 Let Y be a tight set thatuv enters.

(15)

Uncrossing technique for minimum tight sets

Proof:

9 By minimality of X,X andY are crossing.

1 Sinceuv entersY, we may suppose thatuXY andv X\Y.

2 By the minimality ofX,XY is not tight, soY\X 6=∅.

3 By the minimality ofX,X\Y is not tight, soV \(X Y)6=∅.

10 Then, by the Uncrossing Lemma, XY is a tight set that contradicts the minimality of X.

11 Then X =v anddG(v) =p(v) =k.

(16)

Uncrossing technique for minimum tight sets

Definitions:

1 A directed graph D isk-arc-connected ifdD+(X)≥k ∀∅ 6=XV.

2 D isminimallyk-arc-connected if

1 D isk-arc-connected and

2 for each arce ofD,Deis notk-arc-connected anymore.

Theorem (Mader)

A minimally k-arc-connected directed graph has a vertex of in- and out-degree k.

Remark

1 One can easily show that there exists a vertex of in-degree k and a vertex of out-degree k but

2 it is not so easy to see that there exists a vertex with both in- and out-degree k.

(17)

Splitting off technique

Definitions: for G := (V ∪s,E)

1 Operation splitting off at s: for su,svE,we replacesu,sv by an edge uv, that isGuv := (V ∪s,(E\ {su,sv})∪ {uv}).

2 Operation complete splitting off ats:

1 dG(s)is even,

2 dG(s)

2 splitting off atsand

3 deleting the vertexs.

3 The graphG isk-edge-connected inV ifdG(X)≥k ∀∅ 6=XV.

Definitions

s s

u u

v v

G Guv

Splitting off

V V

s s

u u

v v

G G

Splitting offComplete

V V

w z

w z

(18)

Splitting off technique

Theorem (Lov´asz)

If G = (V ∪s,E) isk-edge-connected inV (k ≥2) anddG(s) is even, then there is a complete splitting off ats preserving k-edge-connectivity.

Proof:

1 We show that for every edge suthere exists an edge sv so that Guv is k-edge-connected inV.

2 Then the theorem follows by induction on dG(s).

3 If not, then, for every edge sv, there exists a dangerousset XV such that dG(X)≤k+ 1andu,vX.

1 Indeed, ifGuv is notk-edge-connected inV, then there exists X V such thatk1dGuv(X).

2 SincedGuv(X)dG(X)2 anddG(X)k,X is dangerous.

(19)

Splitting off technique

Proof:

4 By (3), there exists a minimal setMof dangerous sets such that

1 uT

X∈MX and

2 NG(s)S

X∈MX.

5 Any setX of Mcontains at most dG2(s) neighbors of s.

Indeed, k+ 1≥dG(X)

=dG(V \X)−dG(s,V \X) +dG(s,X)

kdG(s) + 2dG(s,X).

(20)

Splitting off technique

Proof:

6 Byu ∈T

X∈MX,NG(s)⊆S

X∈MX and (5), ∃ A,B,C ∈ M.

7 By the minimality ofM,A\(B∪C),B\(A∪C),C \(A∪B)6=∅.

8 Since A,B,C are dangerous, this inequality holds, G is

k-edge-connected,uABC,suE andk ≥2, we have a contradiction:

3(k+ 1)≥dG(A) +dG(B) +dG(C)

dG(A\(B∪C)) +dG(B\(A∪C)) +dG(C \(A∪B)) +dG(A∩BC) + 2dG(A∩BC,(V∪s)\(A∪BC))

k+k+k+k+ 2.

(21)

Splitting off technique

Theorem (Mader)

If D = (V ∪s,A) is k-arc-connected (k ≥1) anddD+(s) =dD(s), then there is a complete directed splitting off ats preserving k-arc-connectivity.

Proof

Similar to previous one.

(22)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(23)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(24)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(25)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(26)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(27)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(28)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(29)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(30)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

(31)

Constructive characterization

Theorem (Lov´asz)

A graph is2k-edge-connected if and only if it can be obtained from K22k by a sequence of the following two operations:

(a) adding a new edge,

(b) pinching k edges: subdivide each of thek edges by a new vertex and identify these new vertices.

Example

Example

(32)

Constructive characterization

Proof:

1 We show that G can be reduced toK22k via 2k-edge-connected graphs by the inverse operations:

1 deleting an edge and

2 complete splitting off at a vertex of degree2k.

2 While G 6=K22k repeat the following.

1 By deleting edges we get a minimally2k-edge-connected graph.

2 By Theorem of Mader, it contains a vertex of degree2k.

3 By Theorem of Lov´asz, there exists a complete splitting off at that vertex that preserves2k-edge-connectivity.

4 LetG be the graph obtained after this complete splitting off.

(33)

Constructive characterization

Theorem (Mader)

For k ≥1,a graph is k-arc-connected if and only if it can be obtained from K2k,k, the directed graph on2 vertices withk arcs between them in both directions, by a sequence of the following two operations:

1 adding a new arc,

2 pinching k arcs.

Proof

Similar to previous one, by applying Mader’s results on

1 minimallyk-arc-connected graphs and,

2 complete directed splitting off.

(34)

Orientation

Theorem (Nash-Williams)

G has a k-arc-connected orientation if and only if G is2k-edge-connected.

(35)

Orientation

Theorem (Nash-Williams)

G has a k-arc-connected orientation if and only if G is2k-edge-connected.

Necessity :

X VX k

k

G~

(36)

Orientation

Theorem (Nash-Williams)

G has a k-arc-connected orientation if and only if G is2k-edge-connected.

Necessity :

X VX 2k

G

(37)

Orientation

Theorem (Nash-Williams)

G has a k-arc-connected orientation if and only if G is2k-edge-connected.

Necessity :

X VX 2k

G

Sufficiency :

(38)

Orientation

Theorem (Nash-Williams)

G has a k-arc-connected orientation if and only if G is2k-edge-connected.

Necessity :

X VX 2k

G

Sufficiency :

(39)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

GraphG andk = 4

(40)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1

Deficient sets, deficiency = 4−dG(X)

(41)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1 2

Deficient sets, deficiency = 4−dG(X)

(42)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1

1

2

Deficient sets, deficiency = 4−dG(X)

(43)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1

1

1

2

Deficient sets, deficiency = 4−dG(X)

(44)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1

1

1

2

Opt ≥ ⌈52⌉= 3

(45)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1

1

1

2

Graph G +F is 4-edge-connected and|F|= 3

(46)

Augmentation

Edge-connectivity augmentation problem:

Given a graph G = (V,E) andk ∈Z+, what is the minimum numberγ of new edges whose addition results in ak-edge-connected graph?

Theorem (Watanabe-Nakamura)

Let G = (V,E) be a graph and k≥2an integer.

min{|F|: (V,EF) isk-edge-conn.}=1

2maxP

X∈X(k−dG(X)) , where X is a subpartition of V.

1

1

1

2

Opt =⌈12maximum deficiency of a subpartition of V

(47)

Augmentation

Proof:

1 First we provide the lower bound onγ.

2 Suppose that G is not k-edge-connected.

3 This is because there is a set X of degreedG(X) less thank.

4 Then the deficiency ofX iskdG(X),that is, we must add at least kdG(X) edges between X andV \X.

5 Let {X1, . . . ,X} be a subpartition of V.

6 The deficiency of {X1, . . . ,X} is the sum of the deficiencies of Xi’s.

7 By adding a new edge we may decrease the deficiency of at most two Xi’s so we may decrease the deficiency of{X1, . . . ,X}by at most2,

8 hence we obtain the following lower bound:

γ ≥α:=⌈half of the maximum deficiency of a subpartition of V⌉.

(48)

Augmentation

Frank’s algorithm

1 Minimal extension,

1 Add a new vertex s,

2 Add a minimum number of new edges incident tos to satisfy the edge-connectivity requirements,

3 If the degree ofsis odd, then add an arbitrary edge incident to s.

2 Complete splitting off preserving the edge-connectivity requirements.

G = (V,E)

w Extension

s

Minimal v

u z

GandG′′arek-e-c inV

Complete Splitting off v

u w z

Gisk-e-c

(49)

Augmentation

Minimal extension:

1 Add a new vertex s toG and connect it to each vertex ofG by k edges. The resulting graph is k-edge-connected inV.

2 Delete as many new edges as possible preserving k-edge-connectivity in V to getG = (V ∪s,EF).

3 If dG(s) is odd, then add an arbitrary new edge incident tos to get G′′= (V ∪s,EF′′) that is k-edge-connected inV anddG′′(s) is even.

G = (V,E)

w Extension

s

Minimal v

u z

GandG′′arek-e-c inV

Complete Splitting off v

u w z

Gisk-e-c

(50)

Augmentation

Splitting off:

1 By Theorem of Lov´asz, there exists in G′′a complete splitting off ats that preserves k-edge-connectivity.

2 This way we obtain a k-edge-connected graphG= (V,EF) with

|F|= |F2′′| =⌈|F2|⌉.

G = (V ,E)

w Extension

s

Minimal v

u z

GandG′′arek-e-c inV

Complete Splitting off v

u w z

Gisk-e-c

(51)

Augmentation

Optimality:

1 In G,no edge incident tos can be deleted without violating k-edge-connectivity inV, so each edgeeF enters a maximal proper subsetXe in V of degree k,that is, dG(Xe) +dF(Xe) =k.

2 ByUncrossing Lemma,these sets form a subpartition{X1, . . . ,X}ofV.

1 Suppose thatXiXj 6=∅.

2 Then, by Uncrossing Lemma and the maximality ofXi,XiXj =V.

3 Byk+k =dG(Xi) +dG(Xj)

=dG(Xi\Xj) +dG(Xj\Xi) + 2dG(XiXj,XiXj)

k+k+ 0,

4 dG(Xi\Xj) =k=dG(Xj\Xi)and every edge incident tos enters eitherXi\Xj orXj\Xi, that is{Xi\Xj,Xj\Xi}is the required subpartition.

3 γ ≤ |F|=⌈|F2|⌉=⌈12P

1dF(Xi)⌉=⌈12P

1(k−dG(Xi))⌉ ≤α ≤γ.

(52)

Augmentation

Theorem (Frank)

Let D= (V,A) be a directedgraph andk ≥1an integer.

min{|F|: (V,AF) is k-arc-connected}= max{P

X∈X(k−dD+(X)),P

X∈X(k−dD(X))}

where X is a subpartition of V.

Proof

Similar to previous one, by applying Mader’s directed splitting off theorem.

Generalizations

1 localedge-connectivity; polynomially solvable,

2 hypergraphs; polynomially solvable,

3 partition constrained; polynomially solvable,

4 weighted; NP-complete even fork = 2.

(53)

Submodular function minimization

Theorem (Gr¨otschel-Lov´asz-Schrijver, Fujishige-Fleicher-Iwata, Schrijver) The minimum value of a submodular function can be found in poly. time.

Corollary: One can decide in polynomial time whether

1 a graphG isk-edge-connected

(by minimizing dG(X ∪u)XVv ∀u,vV),

2 a network (D,g) has a feasible flow of valuek (by minimizing dg+(Z∪s) ZV \ {s,t}),

3 a bipartite graph G has a perfect matching (by minimizing |Γ(X)| − |X|),

4 two matroids have a common independent set of size k (by minimizing r1(X) +r2(S−X)),

5 a digraph D has a packing of k spannings-arborescences (by minimizing dD(X∪u) XVs ∀u∈Vs).

Références

Documents relatifs

Indeed, the rich structure of submodular functions and their link with convex analysis through the Lov´asz extension [135] and the various associated polytopes makes them par-

In Section 6, we consider separable optimization problems associated with the Lov´asz extension; these are reinterpreted in Section 7 as separable optimization over the submodular

Among the three conditions, the second one is the easiest to interpret, as it reduces to having constant sets which are inseparable for certain submodular functions, and for cuts in

1 Since the algorithm BFS is executed in Step 2, the algorithm always augments the flow on a shortest (s, t)-path in G x. 2 If the algorithm BFS is replaced in Step 2 by an

Advantage: local operation, not like flow augmentation. Disadvantage: does not preserve

Zolt´

Maximum weight matchings in bipartite graphs Linear Programming background. Hungarian method Execution

Matchings in bipartite graphs Execution of the Hungarian Method. Zolt´