Chapter 4 Can Pbt Algorithms Solve the Shortest Path

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 4 Can Pbt Algorithms Solve the Shortest Path UC San Diego UC San Diego Electronic Theses and Dissertations Title On the power of the basic algorithmic design paradigms Permalink https://escholarship.org/uc/item/52t3d36w Author Davis, Sashka Tchameva Publication Date 2008 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO On the Power of the Basic Algorithmic Design Paradigms A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Sashka Tchameva Davis Committee in charge: Russell Impagliazzo, Chair Samuel Buss Fan C. Graham Daniele Micciancio Ramamohan Paturi 2008 Copyright Sashka Tchameva Davis, 2008 All rights reserved. The dissertation of Sashka Tchameva Davis is ap- proved, and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California, San Diego 2008 iii DEDICATION To my husband, my son, and my parents for their love and support. iv TABLE OF CONTENTS Signature Page . iii Dedication . iv Table of Contents . v List of Figures . vii Acknowledgements . viii Vita . ix Abstract of the Dissertation . x Chapter 1. Do We Need Formal Models of the Algorithmic Paradigms? . 1 1.1. History . 3 1.1.1. Priority Model . 3 1.1.2. Prioritized Branching Trees . 6 1.2. Techniques . 7 Chapter 2. Priority Algorithms . 9 2.1. Why Study the Greedy Paradigm? . 9 2.1.1. What Is a Greedy Algorithm? . 11 2.2. Priority Models . 14 2.3. A General Lower Bound Technique . 19 2.4. Results for Graph Problems . 23 2.4.1. Shortest Paths . 23 2.4.2. The Weighted Vertex Cover Problem . 28 2.4.3. The Metric Steiner Tree Problem . 31 2.4.4. Maximum Independent Set Problem . 48 2.5. Memoryless Priority Algorithms . 50 2.5.1. A Memoryless Adaptive Priority Game . 53 2.5.2. Separation Between the Class of Adaptive Priority Algorithms and Memoryless Adaptive Priority Algorithms . 58 2.6. Notes . 66 Chapter 3. Prioritized Branching Tree and Prioritized Free Branching Tree Models 67 3.1. The prioritized Branching Tree Model . 71 3.1.1. Complexity Measure for pBT Algorithms . 74 3.2. The prioritized Free Branching Tree Model . 75 3.3. Lower Bound for pBT Algorithms for 7-SAT . 78 3.3.1. Proof Framework . 82 v 3.3.2. Analysis of Good Intermediaries . 90 3.3.3. Analysis of Bad Intermediaries . 93 3.4. Lower Bound for pFBT Algorithms for 7-SAT . 97 3.5. Boundary Expander Matrix . 99 3.6. Notes . 106 Chapter 4. Can pBT Algorithms Solve the Shortest Path Problem? . 107 4.1. Notes . 117 Chapter 5. prioritized Branching Programs . 118 5.1. The pBP Model . 119 5.1.1. Definition of a General pBP Algorithm . 120 5.1.2. Submodels of the pBP Model . 124 5.2. Examples . 126 5.3. Simulations of pBPs by pBTs . 132 5.4. Notes . 136 Chapter 6. Open Questions . 137 6.1. Inside the Existing Models . 139 6.2. Are the Containments Proper? . 140 6.3. Beyond pFBP . 140 6.4. Beyond the Basic Algorithmic Paradigms . 141 Appendix A. Priority Formalization for Adaptive Contract . 143 Appendix B. Concentration Inequalities and Some Simple Bounds . 151 B.1. Chernoff Style Bounds and Chebyshev's Inequality . 151 B.2. Martingale and Submatringale Concentration Inequalities . 152 B.2.1. Properties of Conditional Expectation . 152 B.2.2. Doob Martingales . 153 B.2.3. Submartingales . 156 Bibliography . 158 vi LIST OF FIGURES Figure 2.1. Adversary selects Γ = x; y; z; u; v; w : . 25 1 f g Figure 2.2. The set of edges initially selected by the Adversary Γ = a; b; c; d; e; f 26 1 f g Figure 2.3. K6 with three required and three Steiner nodes . 33 Figure 2.4. Nemesis graphs chosen by the Adversary . 49 Figure 2.5. The nemesis graph for MIS problem. 59 Figure 2.6. Fraction of the cycle considered. 61 Figure 3.1. Example of a computation of a backtracking algorithm on an instance I = 223223. 69 Figure 3.2. Transition function of state B=D. 101 Figure 5.1. Submodel Lattice . 125 Figure 5.2. pBP DAG for LIS on instance 5; 1; 2; 3 . 128 Figure 5.3. Example SSSP instance . 130 Figure 5.4. pBP DAG for the instance graph on Figure 5.3 . 130 Figure 6.1. Lattice of the algorithmic models. SPN stands for the problem of finding shortest paths in graphs with negative weights; LCS stands for the longest common subsequence problem; MCM stands for matrix chain multiplication prob- lem; OBT stands for the optimal binary tree problem. 138 vii ACKNOWLEDGEMENTS My deepest gratitude goes to my advisor Russell Impagliazzo. The road of my doctoral studies was long and his guidance was invaluable. The work presented in Chapter 2 appeared in the proceedings of the 2004 SIAM SODA conference, “Models of Greedy Algorithms for Graph Problems”, by Sashka Davis and Russell Impagliazzo, [20]. The full version “Models of Greedy Algorithms for Graph Problems”, by Sashka Davis and Russell Impagliazzo, was published in Al- gorithmica in 2007, [21]. The results in Chapter 3 are part of manuscript “A General Model for Back- tracking and Dynamic Programming Algorithms”, by Josh Buresh-Oppenheim, Sashka Davis and Russell Impagliazzo, [16], to be published in the future. The results presented in Chapters 4 and 5 together with results which are not included in this dissertation are part of manuscript “A Stronger Model for Dynamic Programming Algorithms”, by Josh Buresh-Oppenheim, Sashka Davis and Russell Im- pagliazzo, [17], to be published in the future. viii VITA 1991 Bachelor of Science, Technical University Sofia, Bulgaria 1999 Master of Science, Rochester Institute of Technology, USA 2008 Doctor of Philosophy, University of California, San Diego, USA PUBLICATIONS Josh Buresh-Oppenheim, Sashka Davis, Russell Impagliazzo, “A Stronger Model for Dynamic Programming Algorithms”, 2008 manuscript in preparation. Josh Buresh-Oppenheim, Sashka Davis, Russell Impagliazzo, “A General Formal Model for Backtracking and Dynamic Programming Algorithms”, 2008 manuscript in prepara- tion. Sashka Davis, Russell Impagliazzo, “Models of Greedy Algorithms for Graph Optimiza- tion Problem”, Algorithmica 2007. Sashka Davis, “Evaluating Algorithmic Design Paradigms”, 2006 Grace Hopper Cele- bration of Women in Computing. Sashka Davis, Jeff Edmonds, Russell Impagliazzo, “Online Algorithms To Minimize Resource Reallocations and Network Communication”, Proceedings, Lecture Notes in Computer Science 4110, Springer 2006. Sashka Davis, Russell Impagliazzo, “Models of greedy algorithms for graph problems”, Proceedings of the 2004 SIAM SODA. Sashka Davis, “Hu-Tucker Algorithm for Building Optimal Alphabetic Binary Search Trees” Technical Report RIT-99-019, Computer Science Dept., Rochester Institute of Technology, 1999. FIELDS OF STUDY Bachelor of Science in Computer Engineering Master of Science in Computer Science Professor Stanislaw Radziszowski Doctor of Philosophy in Computer Science Professor Russell Impagliazzo ix ABSTRACT OF THE DISSERTATION On the Power of the Basic Algorithmic Design Paradigms by Sashka Tchameva Davis Doctor of Philosophy in Computer Science University of California, San Diego, 2008 Russell Impagliazzo, Chair This dissertation formalizes the intuitive notion of the basic algorithmic paradigms. We present three formal models which aim to capture the intrinsic power of greedy, back- tracking and dynamic programming algorithms. We develop lower bound techniques for proving negative results for all algorithms in all models, which allow us to make strong statements about the limitations of each paradigm. [14] designed the Priority algorithms, a formal model of greedy algorithms for scheduling problems. We generalized the priority model to arbitrary problem domain and in particular graph problems and develop a lower bound technique for proving neg- ative results for the class of all priority algorithms. We use the lower bound technique to show that finding shortest path in graphs with negative weights cannot be solved by a priority algorithm. We also prove that Dijkstra's algorithm is inherently adaptive and cannot be made non-adaptive. We show inapproximability results within the model for minimum weighted vertex cover, minimum metric Steiner tree, and maximum indepen- dent set problems. We develop a new 1:8-approximation scheme for the Steiner(1; 2) x problem. [1] presented a model of backtracking and dynamic programming algorithms called prioritized Branching Trees (pBT). We generalize their model to allow free branch- ing and call this new model prioritized Free Branching Tree (pFBT) algorithms and de- veloped a lower bound technique for proving negative results for randomized priority algorithms, pBT and pFBT algorithms. We use the technique to prove that pBT algo- rithms require exponential width to solve the 7-SAT problem and that pFBT algorithms require width 2Ω(pn) to solve the 7-SAT problem. Bellman-Ford is a classical dynamic programming algorithm and we show that pBT algorithms require width of 2Ω(n1=9) to solve the shortest path problem in graphs with negative weights exactly. Next we develop a stronger model of dynamic programming algorithms called prioritized Branching Programs (pBP). pBP algorithms can simulate pBT algorithms at no additional cost but also capture the notion of memoization which we believe is an essential part of the dynamic programming paradigm. We show that this class of algorithms can solve the shortest paths in graphs with negative weights but no negative cycles efficiently. We also show that two pBP sub-models can be simulated by pBT algorithms. xi Chapter 1 Do We Need Formal Models of the Algorithmic Paradigms? In an algorithm design class, we are taught the basic algorithm paradigms such as divide-and-conquer, greedy algorithms, backtracking and dynamic programming. The paradigm is taught by an intuitive example together with a number of counter examples. Intuitive formulations, while easy to understand, do not allow us to answer the following natural questions. Suppose we have an optimization problem that we want to solve.
Recommended publications
  • UNIVERSITY of CALIFORNIA, SAN DIEGO on The
    UNIVERSITY OF CALIFORNIA, SAN DIEGO On the Power of the Basic Algorithmic Design Paradigms A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Sashka Tchameva Davis Committee in charge: Russell Impagliazzo, Chair Samuel Buss Fan C. Graham Daniele Micciancio Ramamohan Paturi 2008 Copyright Sashka Tchameva Davis, 2008 All rights reserved. The dissertation of Sashka Tchameva Davis is ap- proved, and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California, San Diego 2008 iii DEDICATION To my husband, my son, and my parents for their love and support. iv TABLE OF CONTENTS Signature Page . iii Dedication . iv Table of Contents . v List of Figures . vii Acknowledgements . viii Vita . ix Abstract of the Dissertation . x Chapter 1. Do We Need Formal Models of the Algorithmic Paradigms? . 1 1.1. History . 3 1.1.1. Priority Model . 3 1.1.2. Prioritized Branching Trees . 6 1.2. Techniques . 7 Chapter 2. Priority Algorithms . 9 2.1. Why Study the Greedy Paradigm? . 9 2.1.1. What Is a Greedy Algorithm? . 11 2.2. Priority Models . 14 2.3. A General Lower Bound Technique . 19 2.4. Results for Graph Problems . 23 2.4.1. Shortest Paths . 23 2.4.2. The Weighted Vertex Cover Problem . 28 2.4.3. The Metric Steiner Tree Problem . 31 2.4.4. Maximum Independent Set Problem . 48 2.5. Memoryless Priority Algorithms . 50 2.5.1. A Memoryless Adaptive Priority Game . 53 2.5.2. Separation Between the Class of Adaptive Priority Algorithms and Memoryless Adaptive Priority Algorithms .
    [Show full text]
  • Task Scheduling Problem Greedy Algorithm Example
    Task Scheduling Problem Greedy Algorithm Example BreathtakingWhen Terence Bartlet bemired upcast his inanevery discontentedly louts not sometime while enough,Joachim isremains Luce crunchy? hydromantic Jack and sphered phototypic. swingingly. Maximum lateness of soft and j is the horn if prompt and j are swapped. Take an optimal schedule. This will abuse in verifying the resultant solution than with actual output. What sets of matches are possible? What stops a teacher from giving unlimited points to our House? Iteration is because of algorithmic paradigm in most frequent character and then solve a sequence, when all of wine to. In note above diagram, the selected activities have been highlighted in grey. Can i say disney world in spite of profit be scheduled on course of monotonically decreasing order of intervals overlap between elements of two adjacent workstations. Tasks could when done without target order. Greedy algorithms greedy approach? To greedy algorithm example hazardous components early tasks whick incur maximum such as few gas stations he wants to. Give as efficient method by the Professor Midas can agitate at a gas stations he should chew, and personnel that your strategy yields an optimal solution. While until task scheduling algorithm example of algorithmic paradigm in? The vertical lines represent cuts. Therefore, repel each r, the r thinterval the ALG selects nishes no later thought the r interval in OPT. The neighborhood definition and search details of the AEHC are as follows. Leaves need to society from the tasks is no inversions and time? And cotton is clearly optimal! The problem is not actually to mug the multiplications, but merely to quality in fast order to importance the multiplications.
    [Show full text]
  • Dynamic Programming [Fa’10]
    CSC373: Algorithm Design, Analysis and Complexity Winter/Spring 2020 Allan Borodin and Sara Rahmati Week of January 13, 2020 1 / 44 Week 2 Announcements Assignment 1 was posted on January 12 and is due Thursday, February 6 at 4:59 PM. We have been able to increase the enrollment cap by a few more places, so if you are not registered try registering now. You should all be registered on markus now. If not, then let me know. My office hours: Mondays 1:30-2:30 and Wednesdays 4:30-5:30 2 / 44 This weeks agenda 1 Finish divide and conquer I randomized median/selection algorithm I The DFT and FFT 2 Begin greedy algorithms I The interval scheduling problem I The greedy algorithmic paradigm I Proving optimality of greedy algorithms I Interval coloring I Kruskal and Prim MST algorithms for MST I Huffman coding 3 / 44 Computing the median and selecting the i th smallest element As a special case of the third part of the master theorem, the recurrence T (n) = T (n=b) + O(n) implies T (n) = O(n). We would like to design an algorithm for computing the median in an unsorted list of n elements using only O(n) comparisons. (We can rather more naively simply sort using time O(n log n) comparisons.) There is a deterministic algorithm based on this recurrence but it is simpler to consider a randomized algorithm whose expected time is O(n). It turns out that in trying to come up with an appropriate divide and conquer algorithm for the median, it is \more natural" to consider the more general problem of selecting the i th smallest (or largest) element.
    [Show full text]
  • 18MCA34C DESIGN and ANALYSIS of ALGORITHM UNIT III Divide and Conquer
    18MCA34C DESIGN AND ANALYSIS OF ALGORITHM UNIT III Divide and conquer Divide and conquer - general method Both merge sort and quicksort employ a common algorithmic paradigm based on recursion. This paradigm, divide-and-conquer, breaks a problem into subproblems that are similar to the original problem, recursively solves the sub problems, and finally combines the solutions to the sub problems to solve the original problem. Because divide-and-conquer solves subproblems recursively, each subproblem must be smaller than the original problem, and there must be a base case for subproblems. You should think of a divide-and-conquer algorithm as having three parts: 1. Divide the problem into a number of subproblems that are smaller instances of the same problem. 2. Conquer the sub problems by solving them recursively. If they are small enough, solve the subproblems as base cases. 3. Combine the solutions to the subproblems into the solution for the original problem. Binary search Binary search is a fast search algorithm with run-time complexity of Ο(log n). This search algorithm works on the principle of divide and conquer. For this algorithm to work properly, the data collection should be in the sorted form. Binary search looks for a particular item by comparing the middle most item of the collection. If a match occurs, then the index of item is returned. If the middle item is greater than the item, then the item is searched in the sub-array to the left of the middle item. Otherwise, the item is searched for in the sub-array to the right of the middle item.
    [Show full text]
  • Concept: Types of Algorithms
    Discrete Math for Bioinformatics WS 10/11: , by A. Bockmayr/K. Reinert, 18. Oktober 2010, 21:22 1001 Concept: Types of algorithms The exposition is based on the following sources, which are all required reading: 1. Corman, Leiserson, Rivest: Chapter 1 and 2. 2. Motwani, Raghavan: Chapter 1. In this lecture we will discuss different ways to categorize classes of algorithms. There is no one ”correct” classification. One should regard the task of categorizing algorithms more as giving them certain attributes. After discussing how a given algorithm can be labeled (e.g. as a randomized, divide-and-conquer algorithm) we will discuss different techniques to analyze algorithms. Usually the labels with which we categorized an algorithm are quite helpful in choosing the appropriate type of analysis. Deterministic vs. Randomized One important (and exclusive) distinction one can make is, whether the algorithm is deterministic or randomized. Deterministic algorithms produce on a given input the same results following the same computation steps. Ran- domized algorithms throw coins during execution. Hence either the order of execution or the result of the algo- rithm might be different for each run on the same input. There are subclasses for randomized algorithms. Monte Carlo type algorithms and Las Vegas type algorithms. A Las Vegas algorithm will always produce the same result on a given input. Randomization will only affect the order of the internal executions. In the case of Monte Carlo algorithms, the result may might change, even be wrong. However, a Monte Carlo algorithm will produce the correct result with a certain probability. So of course the question arises: What are randomized algorithms good for? The computation might change depending on coin throws.
    [Show full text]
  • COURSE PLAN DESIGN and ANALYSIS of ALGORITHM Course Objectives: Analyse the Asymptotic Performance of Algorithms
    COURSE PLAN DESIGN AND ANALYSIS OF ALGORITHM Course Objectives: Analyse the asymptotic performance of algorithms. Write rigorous correctness proofs for algorithms. Demonstrate a familiarity with major algorithms and data structures. Apply important algorithmic design paradigms and methods of analysis. Synthesize efficient algorithms in common engineering design situations. Course Outcomes: Argue the correctness of algorithms using inductive proofs and invariants. Analyse worst-case running times of algorithms using asymptotic analysis. Describe the divide-and-conquer paradigm and explain when an algorithmic design situation calls for it. Recite algorithms that employ this paradigm. Synthesize divide-and-conquer algorithms. Derive and solve recurrences describing the performance of divide-and-conquer algorithms. Explain the different ways to analyse randomized algorithms (expected running time, probability of error). Recite algorithms that employ randomization. Explain the difference between a randomized algorithm and an algorithm with probabilistic inputs. Analyse randomized algorithms. Employ indicator random variables and linearity of expectation to perform the analyses. Recite analyses of algorithms that employ this method of analysis. Explain what competitive analysis is and to which situations it applies. Perform competitive analysis. Compare between different data structures. Pick an appropriate data structure for a design situation. Explain what an approximation algorithm is, and the benefit of using approximation algorithms. Be familiar with some approximation algorithms. Analyse the approximation factor of an algorithm. Prerequisites: Discrete Mathematics, Data Structures Goals and Objectives: The main goal of this course is to study the fundamental techniques to design efficient algorithms and analyse their running time. After a brief review of prerequisite material (search, sorting, asymptotic notation). Required Knowledge: 1.
    [Show full text]
  • Design and Analysis of Algorithms
    CPS 230 DESIGN AND ANALYSIS OF ALGORITHMS Fall 2008 Instructor: Herbert Edelsbrunner Teaching Assistant: Zhiqiang Gu CPS 230 Fall Semester of 2008 Table of Contents 1 Introduction 3 IV GRAPH ALGORITHMS 45 I DESIGN TECHNIQUES 4 13 GraphSearch 46 14 Shortest Paths 50 2 Divide-and-Conquer 5 15 MinimumSpanningTrees 53 3 Prune-and-Search 8 16 Union-Find 56 4 DynamicProgramming 11 Fourth Homework Assignment 60 5 GreedyAlgorithms 14 First Homework Assignment 17 V TOPOLOGICAL ALGORITHMS 61 II SEARCHING 18 17 GeometricGraphs 62 18Surfaces 65 6 BinarySearchTrees 19 19Homology 68 7 Red-BlackTrees 22 Fifth Homework Assignment 72 8 AmortizedAnalysis 26 9 SplayTrees 29 VI GEOMETRIC ALGORITHMS 73 Second Homework Assignment 33 20 Plane-Sweep 74 III PRIORITIZING 34 21 DelaunayTriangulations 77 22 AlphaShapes 81 10 HeapsandHeapsort 35 Sixth Homework Assignment 84 11 FibonacciHeaps 38 12 SolvingRecurrenceRelations 41 VII NP-COMPLETENESS 85 ThirdHomeworkAssignment 44 23 EasyandHardProblems 86 24 NP-CompleteProblems 89 25 ApproximationAlgorithms 92 Seventh Homework Assignment 95 2 1 Introduction Overview. The main topics to be covered in this course are Meetings. We meet twice a week, on Tuesdays and Thursdays, from 1:15 to 2:30pm, in room D106 LSRC. I Design Techniques; II Searching; Communication. The course material will be delivered III Prioritizing; in the two weekly lectures. A written record of the lec- IV Graph Algorithms; tures will be available on the web, usually a day after the V Topological Algorithms; lecture. The web also contains other information, such as homework assignments, solutions, useful links, etc. The VI Geometric Algorithms; main supporting text is VII NP-completeness.
    [Show full text]