3/2-Approximation for the Matching Augmentation Problem
Abstract
We describe a-approximation algorithm for the Matching Augmentation Problem, which is a special case of the weighted 2-edge-connected spanning subgraph problem. This improves upon the previous best ratio.
1Introduction
The following is a well-studied problem in network design: Given an undirected simple graph,find a 2-edge-connected spanning subgraph (2-ECSS) ofwith minimum number of edges. We denote this problem briefly as2-ECSS.It remainsNP-hard andAPX-hard even for subcubic graphs[10].After a series of improvements beyond the trivial approximation factor[8,18,21,26],the current best approximation factor for the problem isfor some constant[14].The generalization of this problem in which there is a cost function,which we denote byWeighted 2-ECSS,admits-approximation algorithms[19,21].Intermediate problems between2-ECSSandWeighted 2-ECSShave received tremendous attention in the last decade. The most difficult of them is the Forest Augmentation Problem (FAP) in which the cost function is defined as,and the zero-cost edges form a forest. A recent result[16]improves the approximation ratio toforFAP.
Improving the factorforWeighted 2-ECSSis a major open problem. In particular, a result by Cheriyan et al.[7]implies that the integrality gap of the natural LP relaxation for the problem is lower bounded by,and it is likely that there is an approximation algorithm with the same ratio. As the problem is wide open however, even further special cases beyondFAPhave been considered. One of them is the Matching Augmentation Problem (MAP) in which the zero-cost edges form a matching. This problem admits approximation ratios[4],[3],and[15].A further special case is the Tree Augmentation Problem (TAP)in which the zero-cost edges form a tree. Several results with ratios better thanhave appeared in the literature including[1,5,6,9,11,12,13,17,20,22,23,24,25,27,28].The current best approximation ratio attained is[2].The purpose of this paper is to prove the following theorem.
Theorem 1.
There exists a polynomial-time-approximation algorithm forMAP.
2Preliminaries
We will use the lower bound derived from the dual of the natural LP relaxation forMAP.Here,denotes the set of edges with one end in the cutand the other not in.
minimize | (MAP) | ||||
subject to | |||||
The following is the dual of (MAP).
maximize | (MAP-D) | ||||
subject to | |||||
We assume that the input graphis 2-connected, since the value of an optimal solution forMAPis the sum of those of blocks (maximal 2-connected subgraphs), and one can argue the approximation ratio only within a block. Given a set of edges,we define.Given a vertexand a 2-ECSS,the degree ofonis denoted by.The vertexis called adegree-vertexonif,and ahigh-degree vertexonif.For a path,andare theend verticesof,and all the other vertices are theinternal verticesof.In particular,andare theside verticesof.A path whose internal vertices are all degree-vertices onis called aplain pathon.A maximal plain path is called asegment.The length of a segment is the number of edges on the segment. If the length of a segment is,it is called an-segment.A-segment is also called atrivial segment.If a 2-ECSS remains feasible upon removal of the edge of a trivial segment, the edge is calledredundant.Given a 2-vertex-connected spanning subgraph (2-VCSS),if the removal of a segment fromviolates feasibility, it is called aweak segmenton,otherwise astrong segmenton.A set of edgesis called aspecial maximal setinif it satisfies the following: (1) It consists of zero-cost edges; (2) Contracting the edges indoes not introduce a trivial segment on;(3)is maximal.
3The Algorithm forMAP
Thefirst stepof the algorithm computes an inclusion-wise minimal 2-VCSS(Recall that we assumeis-connected). In thesecond step,the algorithm contracts all the zero-cost edges inand a special maximal set of edges into form the graph.The rest of the algorithm is assumed to run on the blocks of,as we did for.Given this,is updated to an inclusion-wise minimal 2-VCSS ofcomputed as follows: Start fromand perform deletion of edges one by one starting from the unit-cost edges, followed by zero-cost edges, as long as feasibility is maintained. In thethird step,the algorithm recursively modifies the running solutionviaimprovement processes.Given a strong-segmentonand its internal vertex,letdenote the set of edges incident toin.An improvement process first tries to replacebywhile maintaining feasibility, whereis a set ofedges called acritical edge set,andis a set ofedges,.We seek suchto be a subset of.If there is such,the described operation is called animprovement operation.Two improvement operations and the corresponding critical edge sets are given in Figure1and Figure2,where all the included and the excluded edges are of unit-cost.
If no improvement operation can be performed, fixing a critical edge setincident to,the algorithm checks ifcontains new strong-segments that do not exist on.If it does, it calls the procedure described above forandrecursivelyon the internal vertices of the newly appearing strong-segments provided that no improvement process has been previously called on the internal vertex of a given segment. These calls are performed for allonand for each.If there is an improvement operation in one of the recursive calls, the called function returns and the caller performs a specificdeletion operationas follows. It attempts to delete the edges fromin the order,.Specifically, it deletes an edge as long as the residual graph remains feasible. This enforces to keep the edges inin the solution. An examples of this operation is given in Figure3,where all the included and excluded edges are of cost,and the depth of the recursion tree isAfter the reverse-delete operation, the current function call returns. If after all the recursive calls fromthere is no improvement operation performed, the solutionis restored back to the original one before the function call on.The main iterations continue until there is noandon which we can perform an improvement process.
The fourth step of the algorithm excludes all the redundant edges, i.e., edges whose removal does not violate 2-edge-connectivity. The result of this operation is denoted by.
Proposition 2.
There exists a feasible solutionforsuch that
-
•
.
-
•
can be obtained fromin linear time.
-
•
The union ofand the set of contracted edges in the second step of the algorithm is a feasible solution for.
Proof.
This follows from the fact that the zero-cost edges form a matching in the input graph. In particular, one can select the appropriate elements from all double edge pairs into obtain,so that their union with the deleted zero-cost edges is feasible for.It is clear that this can be performed in linear time, and. ∎
Proposition 3.
Algorithm 1 can be implemented in polynomial-time.
Proof.
It is clear that the the second and the fourth step of the algorithm can be implemented in polynomial-time. The computation of a minimal 2-VCSS in the first step is also obvious. The operations on strong-segments followed by this takessteps, since an excluded edge of costis never included again. To see that the third step also takes polynomial time, it suffices to see that the main loop ofImprovement-Processterminates in polynomial number of operations. There are polynomially many critical edge sets,sinceis constant. Starting from the internal vertexof a strong-segment,consider the recursion tree in which each node represents a recursive function call. By definition, each node of this tree is associated to the internal vertex of a strong-segment. A vertex can be an internal vertex of a single strong-segment. This implies that the number of nodes in the tree is polynomially bounded. So the main loop ofImprovement-Processterminates in polynomial number of operations. ∎
4Proof of Theorem1
Letdenote the value of an optimal 2-ECSS on,anddenote the value of an optimal 2-ECSS on,the result of the second step of the algorithm. Letbe a solution returned by Algorithm 1,be the result of the first step of the algorithm, andbe the result of the second step of the algorithm.
Lemma 4.
.
Proof.
Take an optimal 2-ECSSon.Contract the zero-cost edges inand the intersection ofwith the special maximal set inused by the algorithm. Let the result be.By definition then,is a feasible solution for,which implies the result. ∎
Lemma 5.
For any vertex,there is no zero-cost edge in.
Proof.
Recall that the second step of the algorithm contracts the zero-cost edges inand a special maximal set of edges in.Given this, a zero-cost edgemust belong to.Ifis an edge of a-segment on,then it remains inby the reverse-delete procedure in computing,which keeps zero-cost edges. The edgecannot belong to another segment ineither, since this implies that it belongs to a special maximal set. Thus, we have that there is no zero-cost edge. ∎
Lemma 6.
Letbe a strong-segment with,or a weak segment on.Then none of the edges ofcan be zero-cost.
Proof.
If there is such a zero-cost edge in,then it belongs to a special maximal set in,and hence contracted in the second step of the algorithm. This implies that there is no such edge in.Since there is no zero-cost edge inby Lemma5,it follows that there is no such edge ineither. ∎
Lemma 7.
There exists,a 2-VCSS,and a 2-ECSSsuch that the following hold:
-
1.
is obtained by deleting redundant edges from.
-
2.
Given the internal vertexof a strong-segment on,there is no edgeincident to.
-
3.
is minimal with respect to inclusion.
-
4.
.
Proof.
We reducetoandtoby performing a series of operations. Letbe a strong-segment on,andbe its internal vertex. Letbe an optimal 2-ECSS on.Thencontains two edges incident to,sayand.Assume it contains a third edgeincident to.Let the other end vertices of these edges be,and,respectively. Ifcontains all the edges incident tothat are in,we callaspecial vertex,for.Note that none of,,andis a zero-cost edge by the construction of.To finish the proof of the lemma, we need the following two claims.
Claim 8.
We can switch to an optimal solutionsuch that there is at most one special vertex in the set.
Proof.
Assume without loss of generality thatandare special vertices. Then by the structure of a 2-ECSS, we can discardorfromwithout violating feasibility. ∎
Claim 9.
There exists an optimal 2-ECSSonsuch thatcontainsedges incident to.
Proof.
By Claim8,there are at least two vertices in the setthat are not special. Let two of them be without loss of generalityand.By the structure of a 2-ECSS, one of these vertices, say,satisfies the following. There is a neighborofsuch that,andis another optimal solution. In this case the degree ofonis,which completes the proof. ∎
Letbe the set of edges in this solution incident to the internal vertex of.Letbe a minimal 2-VCSS on,where.Letdenote the set of edges incident to the internal vertex ofon,which excludes the edges in,and note that it contains.Delete the edges infromto obtain.Perform these operations, including the switch to an optimal solution implied by Claim9,recursively on the new strong-segments that appear on,which we callemerging segments.Note that since none of the aforementioned vertices,,andcan be an internal vertex of a strong-segment due to an improvement operation, the switch fromtocannot be reversed. After the recursion starting fromterminates, continue performing the described operations on the strong-segments on the residual solution and the graph. Let the results beand.Letbe a 2-ECSS obtained by deleting the redundant edges from,so that the first claim of the lemma holds. Note that the second claim of the lemma also holds, since there is no edge inincident to the internal vertex of a strong-segment onby construction. The third claim of the lemma follows from Claim9.
We now show that the fourth claim holds.
Claim 10.
.
Proof.
Letbe a strong-segment on which we start the recursive operations above or an emerging segment. The inequalityderives a contradiction to the algorithm and the construction of,since there is no improvement process performed onthat has improved the cost of the solution. In particular, by all the listed improvement operations we cannot have the configurations on the left hand sides of Figure1-Figure3.We thus have,which implies.Note next that if,then we also haveby construction. This implies,which is equivalent to. ∎
We next note that.This follows from our construction ensuring that there is an optimal solutionsuch that for any strong-segmenton,does not contain any edge from.Combining this with Claim10,we obtain,which implies the fourth claim of the lemma, and completes the proof. ∎
Remark 11.
Letbe a strong-segment on.Then at most one edge ofcan be zero-cost.
Proof.
Follows from the fact that zero-cost edges form a matching in the input graph. ∎
Lemma 12.
Letbe a strong-segment with,or a weak segment on.Then none of the edges ofcan be zero-cost.
Proof.
Lemma 13.
Proof.
We construct a feasible dual solution in (MAP-D) with total value at least.Given an internal vertexof a strong-segment on,we assign.At most one of the edges of a strong-segment can be zero-cost by Remark11.In order to maintain feasibility, if such a segment has a zero-cost edge,we set.For any internal vertexof a strong-segment onwithor a weak segment, we assign.Note that these assignments form a feasible solution in (MAP-D) by Lemma5,Lemma12,and the second claim of Lemma7.We will be tacitly assuming these facts in the rest of the proof while enlarging the dual assignment.
We distinguish a dual value we assign and its contribution in the objective function of (MAP-D), which is twice the dual value. The latter is called thedual contribution.We use a cost sharing argument, so that the cost of a specific set of edges is countered with a unique set of dual contributions with ratio at least,which establishes the main result. In doing so, we will also make sure that we count all thedual values of edges exactly once. For a given specific set of edges, we call the ratio of the dual value with the cost thecover ratio.If the cover ratio is at least,we say that the set isoptimally covered.
We first describe the argument on the strong segments. Given a strong segmentonand a side vertexof:
-
•
Ifis a-segment, then both of its edges might be of cost.In this case the dual contributionofresults in a cover ratio of.If one of the edges has cost,and the other edgeis a zero-cost edge, then,again optimally covering the edges of the segment.
-
•
Ifis an-segment with,then the dual contribution of-dual variables of the internal vertices ofis,which results in a cover ratio.
Given a weak-segment, the dual contribution of its internal vertices is also.We impose that this contribution pays for the cost ofof the weak segment, thus covering the costof the segment optimally. Since the cover ratio of the strong segments is at least,it suffices to show that the remaining cost ofof each weak segment is covered with cover ratio at least.
We argue by induction on the number of weak segments.We consider the base casein which the two weak segments do not share a common end vertex. Letbe an end vertex of a weak segment. Ifis not shared by any strong-segment, we assign.Figure4(a)shows this configuration with all the end vertices applied this assignment. Otherwise, letbe a set satisfying the following:
-
1.
,
-
2.
consists of vertices of strong-segments,
-
3.
induces a connected subgraph,
-
4.
is maximal.
We callanaugmented set on.Assign.Note that this is also feasible by the stated properties ofand the second claim of Lemma7.We call the dual variablesandaugmented dual variables.It is clear that in the base case, there are at leastaugmented dual variables, thereby optimally covering the weak segments.
In the inductive step one may introduce one, two, three, or four new weak segments by extending the graph in the induction hypothesis. All the cases are given in Figure4,Figure5,and Figure6,where we depict the extending subgraphs in their simplest form. In Figure4(b)and Figure4(c)one new weak segment is introduced. Letbe a newly introduced high-degree vertex. If there is no strong-segment with an end vertex,we define.Otherwise, we definefor an augmented seton.In either case, the new weak segment is optimally covered. In Figure5(a)two new weak segments are introduced. Letandbe two newly introduced high-degree vertices, which are also end vertices of weak segments. If neithernoris an end vertex of a strong-segment, we define,which optimally covers the new weak segments. Assume without loss of generality that both of them are the end vertices of the same strong-segment. Then assignfor an augmented seton.In this case we incorporate the-segment into the analysis. Recall that at most one edge of a strong-segment can be zero-cost. The total cost of the-segment and the new weak segments is then at least,where,and the total dual contribution includingand the dual value defined for the-segment is.This leads to a cover ratio of.We do not depict the generalization of Figure5(a),analogous to the one from Figure4(b)to Figure4(c),which does not change the analysis.
In Figure5(b)two new weak segments are introduced together with at least two strong segments. The analysis is identical to that of Figure5(a),resulting in a cover ratio of at least.In Figure5(c),Figure6(a),and Figure6(b)three new weak segments are introduced. In all these cases the analysis essentially reduces to that of the previous case, since there is a high-degree vertex we can assign the dual valueon, which optimally covers the extra new segment, and hence only betters the cover ratio of the previous case. Figure6(c)is also a straightforward generalization of Figure6(a),where there are four new weak segments. We do not depict the generalizations of Figure6(c),analogous to the one from Figure6(a)to Figure6(b),which does not change the analysis. This completes the induction and the proof. ∎
5A Tight Example
A tight example for the algorithm is given in Figure7.The bold lines represent the edges of cost,and the other lines represent zero-cost edges. The solution returned by the algorithm has cost,whereis an even integer. Note that there is no improvement that can be performed on the depicted solution. The optimal solution has cost.
Acknowledgment
This work was supported by Scientific and Technological Research Council of Turkey (TUBITAK) under the Grant Number 123E530. The author thanks to TUBITAK for their supports.
References
- [1] D. Adjiashvili. Beating approximation factor two for weighted tree augmentation with bounded costs. ACM Trans. Algorithms,15(2):19:1–19:26, 2019.
- [2] F. Cecchetto, V. Traub, and R. Zenklusen. Bridging the gap between tree and connectivity augmentation: unified and stronger approaches. InSTOC ’21: 53rd Annual ACM SIGACT Symposium on Theory of Computing,pages 370–383, 2021.
- [3] J. Cheriyan, R. Cummings, J. Dippel, and J. Zhu. An improved approximation algorithm for the matching augmentation problem. SIAM J. Discret. Math.,37(1):163–190, 2023.
- [4] J. Cheriyan, J. Dippel, F. Grandoni, A. Khan, and V. V. Narayan. The matching augmentation problem: a-approximation algorithm. Math. Program.,182(1):315–354, 2020.
- [5] J. Cheriyan and Z. Gao. Approximating (unweighted) tree augmentation via lift-and-project, part I: stemless TAP. Algorithmica,80(2):530–559, 2018.
- [6] J. Cheriyan and Z. Gao. Approximating (unweighted) tree augmentation via lift-and-project, part II. Algorithmica,80(2):608–651, 2018.
- [7] J. Cheriyan, H. J. Karloff, R. Khandekar, and J. Könemann. On the integrality ratio for tree augmentation. Oper. Res. Lett.,36(4):399–401, 2008.
- [8] J. Cheriyan, A. Sebö, and Z. Szigeti. Improving on the 1.5-approximation of a smallest 2-edge connected spanning subgraph. SIAM J. Discrete Math.,14(2):170–180, 2001.
- [9] N. Cohen and Z. Nutov. A (1+ln2)-approximation algorithm for minimum-cost 2-edge-connectivity augmentation of trees with constant radius. Theor. Comput. Sci.,489-490:67–74, 2013.
- [10] B. Csaba, M. Karpinski, and P. Krysta. Approximability of dense and sparse instances of minimum 2-connectivity, TSP and path problems. InProceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA),pages 74–83, 2002.
- [11] G. Even, J. Feldman, G. Kortsarz, and Z. Nutov. A 1.8 approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2. ACM Trans. Algorithms,5(2):21:1–21:17, 2009.
- [12] S. Fiorini, M. Groß, J. Könemann, and L. Sanità. Approximating weighted tree augmentation via chvátal-gomory cuts. InProceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018,pages 817–831, 2018.
- [13] G. N. Frederickson and J. F. JáJá. Approximation algorithms for several graph augmentation problems. SIAM J. Comput.,10(2):270–283, 1981.
- [14] M. Garg, F. Grandoni, and A. J. Ameli. Improved approximation for two-edge-connectivity. InProceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, SODA,pages 2368–2410, 2023.
- [15] M. Garg, F. Hommelsheim, and N. Megow. Matching augmentation via simultaneous contractions. In50th International Colloquium on Automata, Languages, and Programming, ICALP 2023,volume 261 ofLIPIcs,pages 65:1–65:17.
- [16] F. Grandoni, A. J. Ameli, and V. Traub. Breaching the 2-approximation barrier for the forest augmentation problem. InSTOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing,pages 1598–1611, 2022.
- [17] F. Grandoni, C. Kalaitzis, and R. Zenklusen. Improved approximation for tree augmentation: saving by rewiring. InProceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018,pages 632–645, 2018.
- [18] C. Hunkenschröder, S. Vempala, and A. Vetta. A 4/3-approximation algorithm for the minimum 2-edge connected subgraph problem. ACM Trans. Algorithms,15(4):55:1–55:28, 2019.
- [19] K. Jain. A factor 2 approximation algorithm for the generalized steiner network problem. Combinatorica,21(1):39–60, 2001.
- [20] S. Khuller and R. Thurimella. Approximation algorithms for graph augmentation. J. Algorithms,14(2):214–225, 1993.
- [21] S. Khuller and U. Vishkin. Biconnectivity approximations and graph carvings. J. ACM,41(2):214–235, 1994.
- [22] G. Kortsarz and Z. Nutov. A simplified 1.5-approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2. ACM Trans. Algorithms,12(2):23:1–23:20, 2016.
- [23] G. Kortsarz and Z. Nutov. Lp-relaxations for tree augmentation. Discret. Appl. Math.,239:94–105, 2018.
- [24] H. Nagamochi. An approximation for finding a smallest 2-edge-connected subgraph containing a specified spanning tree. Discret. Appl. Math.,126(1):83–113, 2003.
- [25] Z. Nutov. On the tree augmentation problem. Algorithmica,83(2):553–575, 2021.
- [26] A. Sebö and J. Vygen. Shorter tours by nicer ears: 7/5-approximation for the graph-TSP, 3/2 for the path version, and 4/3 for two-edge-connected subgraphs. Combinatorica,34(5):597–629, 2014.
- [27] V. Traub and R. Zenklusen. A better-than-2 approximation for weighted tree augmentation. In62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021,pages 1–12, 2021.
- [28] V. Traub and R. Zenklusen. Local search for weighted tree augmentation and steiner tree. InProceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, SODA 2022,pages 3253–3272, 2022.