You are on page 1of 26

Approximating Steiner Networks with Node Weights

Zeev Nutov
The Open University of Israel
nutov@openu.ac.il
Abstract
The (undirected) Steiner Network problem is: given a graph G = (V, E) with
edge/node weights and connectivity requirements {r(u, v) : u, v U V }, nd a
minimum weight subgraph H of G containing U so that the uv-edge-connectivity in
H is at least r(u, v) for all u, v U. The seminal paper of Jain [19], and nume-
rous papers preceding it, considered the Edge-Weighted Steiner Network problem, with
weights on the edges only, and developed novel tools for approximating minimum
weight edge-covers of several types of set functions and families. However, for the
Node-Weighted Steiner Network (NWSN) problem, nontrivial approximation algorithms
were known only for 0, 1 requirements.
We make an attempt to change this situation, by giving the rst non-trivial approxi-
mation algorithm for NWSN with arbitrary requirements. Our approximation ratio for
NWSN is r
max
O(ln |U|), where r
max
= max
u,vU
r(u, v). This generalizes the result
of Klein and Ravi [21] for the case r
max
= 1. We also give an O(ln |U|)-approximation
algorithm for the node-connectivity variant of NWSN (when the paths are required
to be internally-disjoint) for the case r
max
= 2. Our results are based on a much
more general approximation algorithm for the problem of nding a minimum node-
weighted edge-cover of an uncrossable set-family. We also give the rst evidence that
a polylogarithmic approximation ratio for NWSN might not exist even for |U| = 2 and
unit weights.
1
1 Introduction
1.1 Motivation, problem denition, and previous work
Network design problems require nding a minimum weight (sub-)network that satises pre-
scribed properties, often connectivity requirements. Classic examples with 0, 1 connectivity
requirements are: Shortest Path, Minimum Spanning Tree, Minimum Steiner Tree/Forest, and
others. Examples of problems with high connectivity requirements are: Min-Cost k-Flow,
k-Edge/Node-Connected Spanning Subgraph, Steiner Network, and others.
Two main types of weights are considered in the literature: the edge weights and the node
weights. We consider the latter, which is usually more general than the former. For most
undirected network design problems, a simple reduction transforms edge weights to node
weights, but the inverse is usually not true. The study of network design problems with
node weights is well motivated and established from both theoretical as well as practical
considerations, c.f., [21, 16, 17, 25, 5, 24]. For example, in telecommunication networks,
expensive equipment such as routers/switches/transmitters is located at the nodes of the
network, and thus it is natural to model these problems by assigning weights to the nodes
and/or to the edges, rather than to the edges only.
In directed graphs, it is often possible to reduce node weights case to the edge weights
case via an approximation ratio preserving reduction. However, this is usually not so for
undirected graphs, and an attempt to transform an undirected problem into a directed one
typically results in a problem which is signicantly harder to approximate; e.g., in undi-
rected graphs, for Steiner Forest a 2-approximation is known for edge costs [1], an O(log n)-
approximation is known for node costs and this is tight [21], while the directed variant does
not admit a polylogarithmic ratio unless NPQuasi(P) [8].
Let
H
(u, v) denote the uv-edge-connectivity in a graph H, that is, the maximum number
of edge-disjoint uv-paths in H. We consider the following fundamental problem on undirected
graphs:
Node-Weighted Steiner Network (NWSN)
Instance: A graph G = (V, E), node weights w(v) : v V , and edge-connectivity require-
ments r(u, v) : u, v U V .
Objective: Find a minimum weight subgraph H of G containing U so that

H
(u, v) r(u, v) u, v U . (1)
Let r
max
= max
u,vU
r(u, v) denote the maximum requirement. The Edge-Weighted
2
Steiner Network problem was studied extensively, starting from the rst 2-approximation
algorithm of Agrawal, Klein, and Ravi [1] for r
max
= 1 (see Goemans and Williamson [14]
for more general algorithm and simpler proof, and Robins and Zelikovsky [29] for a better
ratio for the Steiner Tree problem), continuing with 2r
max
-approximation of Williamson et.
al [30] and 2 ln r
max
-approximation of Goemans et. al [13], and ending with the seminal
2-approximation of Jain [19]. See surveys in [15, 20, 23] on approximation algorithms for
various connectivity problems; for work on directed graphs see [31, 3, 4, 11].
However, for the node-weighted version NWSN, nontrivial approximation algorithms were
known only for r
max
= 1. The rst approximation algorithm for NWSN with r
max
= 1
due to Klein and Ravi [21] appeared in 1995, at the same time as the 2-approximation of
Klein, Agrawal, and Ravi [1], for the edge-weighted case with r
max
= 1. The Klein-Ravi
[21] algorithm uses a greedy approach. Based on spider decomposition of trees, they
proved that iteratively adding spiders (subtrees with at most one node of degree 3) that
minimize the ratio of the weight of the spider over the number of minimal decient sets it
connects minus 1, is a 2H([U[)-approximation algorithm, where H(n) =

n
i=1
1/i = O(ln n)
is the nth Harmonic number. The approximation ratio was improved by Guha and Khuller
[16] to (1.35 + )H([U[) using a slight generalization of spiders. These ratios are nearly
tight, as the case r
max
= 1 of NWSN generalizes the Set-Cover problem, and thus has an
(1) ln [U[-approximation threshold [9]. However, unlike the case of edge weights, for node
weights almost no progress has been made since the Klein-Ravi paper [21]: no approximation
algorithm was known for NWSN with r
max
> 1, not even for the case r
max
= 2.
1.2 Our results
We make a progress, and give the rst non-trivial algorithm for NWSN with arbitrary re-
quirements.
Theorem 1.1 NWSN admits a 3r
max
H([U[)-approximation algorithm.
The approximation ratio in Theorem 1.1 is tight (up to a constant factor) if r
max
is
small (usually, r
max
3 in practical networks), but may seem weak if r
max
is large. We
give the rst evidence that a polylogarithmic approximation algorithm for NWSN may not
exist even for very simple instances. Let the Node-Weighted k-Flow (NWk-F) problem be the
restriction of NWSN to instances with U = s, t and r(s, t) = k. We show a reduction from
the following extensively studied problem to unit weight NWk-F. For an edge set E on V
and X V let E(X) denote the set of edges in E with both endpoints in X.
3
Densest -Subgraph (D-S)
Instance: A graph G = (V, E) and an integer .
Objective: Find X V with [X[ and [E(X)[ maximum.
The best known approximation ratio for D-S due to Feige, Kortsarz, and Peleg [10] is
[V [
1/3+
, where 1/60. This is so even for the case of bipartite graphs, which is up to a
constant factor is as hard to approximate as the general case. In spite of numerous attempts
to improve it, this ratio holds for more than 10 years. We prove:
Theorem 1.2 Suppose that NWk-F admits a -approximation algorithm. Then:
The Hitting-Set problem admits a -approximation algorithm.
D-S on bipartite graphs admits a 1/(2
2
)-approximation algorithm.
Remarks:
1. It was shown in [18] that on directed graphs, NWk-F cannot be approximated within
O(2
log
1
n
) for any xed > 0, unless NP Quasi(P); however, for edge weights, this case
is in P.
2. The augmentation version of NWk-F that seeks to nd a minimum node-weight aug-
menting edge set to increase the st-edge-connectivity by 1 is reducible to the shortest
path problem, and thus is solvable in polynomial time, see Section 4. This implies a k-
approximation algorithm for NWk-F.
3. NWk-F with node-disjoint paths is easily reducible to the Min-Cost k-Flow problem, and
thus is solvable in polynomial time.
We also consider the node-connectivity version of NWSN, when the paths are required
to be internally node-disjoint. The edge-weighted version with internally disjoint paths is
usually referred to as the Survivable Network Design Problem (SNDP). Kortsarz et. al [22]
proved that SNDP does not admit a polylogarithmic approximation, unless NPQuasi(P).
This is so even if the input graph G is complete with edge weights in 0, 1 [26]. However,
Fleischer, Goemans, and Williamson [12] showed that the 0, 1, 2-SNDP, when r
max
2,
admits a 2-approximation algorithm. We consider the node weighted version NWSNDP of
SNDP, and specically the 0, 1, 2-NWSNDP, and prove:
Theorem 1.3 0, 1, 2-NWSNDP admits an O(ln n)-approximation algorithm.
In fact, Theorems 1.1 and 1.3 are just applications of a more general approximation
algorithm for nding a minimum node-weighted (edge-)cover of an extensively studied
type of set-families. We need some denitions to present this result.
4
Denition 1.1 Let T 2
V
be a set-family of subsets of a ground-set V .
T is uncrossable if X Y, X Y T or X Y, Y X T for any intersecting
X, Y T.
An edge set I on V covers T (or I is an T-cover) if for every X T there is an edge
in I with exactly one end-node in X.
Denition 1.2 For an edge set I on V let V (I) =

uvI
u, v denote the set of end-nodes
of the edges in I. Given node weights w(v) : v V , let w(I) = w(V (I)) be the node-weight
of I.
We consider the following general problem:
Node-Weighted Set-Family (Edge-)Cover (NWSFC)
Instance: A set-family T, an edge set E on V , and node weights w(v) : v V .
Objective: Find a minimum node-weight T-cover I E.
We give a 3H([V [)-approximation algorithm for the problem of nding a minimum node-
weight cover of an uncrossable family T, but its polynomial implementation requires that
certain queries related to T can be answered in polynomial time. Given an edge set I on V ,
the residual family T
I
of T (w.r.t. I) consists of all members of T that are uncovered by
the edges of I. It is well known that if T is uncrossable, so is T
I
, for any I, c.f., [19].
Denition 1.3 A set C T is an T-core, or simply a core if T is understood, if C does not
contain two disjoint members of T. An inclusion minimal (maximal) T-core is a min-T-core
(max-T-core). Let ((T) denote the family of min-T-cores. For s V and C ((T) let
T(s, C) be the family of cores containing C and not containing s.
Clearly, the members of ((T) are pairwise disjoint if T is uncrossable. For any edge set
I on V , make the following two assumptions:
Assumption 1:
The family ((T
I
) of min-T
I
-cores can be found in polynomial time.
Assumption 2:
A minimum node-weight T
I
(s, C)-cover can be found in polynomial time for any s V and
C ((T
I
).
Theorem 1.4 NWSFC with uncrossable T admits a 3H([((T)[)-approximation algorithm
under Assumptions 1 and 2.
5
A set-function f on V is weakly supermodular if f(X) +f(Y ) f(X Y ) +f(X Y ) or
f(X) + f(Y ) f(X Y ) + f(Y X) for any X, Y V . An edge set I covers f if in the
graph (V, I) the degree of every X V is at least f(X). Uncrossable families correspond
to weakly supermodular 0, 1 set functions. For edge-weights, the 2-approximation of [30] for
uncrossable set-families was extended to arbitrary weakly supermodular set-functions by Jain
[19]. A natural question is whether Theorem 1.4 extends to arbitrary weakly supermodular
set-functions. As NWk-F is a particular case of the problem of nding a minimum weight
edge-cover of a weakly supermodular set-function, such an extension is unlikely, due to our
hardness result given in Theorem 1.2.
The main tool used to prove Theorem 1.4 is a novel decomposition of covers of uncrossable
families into spider-covers, generalizing the Klein-Ravi [21] decomposition of a forest into spi-
ders. However, even extending properly the notions of spider and spider-decomposition
to set-families is already a nontrivial task. Roughly speaking, an edge set S is a spider-cover
with center s of a set ( ((T) of cores if it is a union of into (s, C)-covers S
C
: C (
so that no two of them have a node in common, except of maybe s. A spider-cover de-
composition is a collection of node-disjoint spider-covers that collectively cover ((T). Our
spider-covers are much more complex objects than [21] spiders, e.g., they are not even con-
nected graphs. Moreover, unlike [21], we cannot use specic graph properties to prove our
decomposition, but can rely only on properties of uncrossable families. Note also that our
ratio is 3H(n) and not 2H(n) as in [21]; for a reason for that see Lemma 3.3 in Section 3.
Decomposition of directed covers of intersecting families, when X, Y T and X Y =
implies X Y, X Y T, was considered in [27], but the case of uncrossable families and
undirected covers is substantially more involved, see Sect. 2. Our notion of spider-cover
and spider-cover decomposition are more involved than their analogues in [27], because
the edges are undirected. To prove that such a decomposition exists we use the method of
laminar witness families [30, 13, 15], some ideas from [27], and some new techniques. As
uncrossable families and spiders arise in approximation algorithms for various network design
problems with 0, 1 requirements, c.f., [21, 16, 2, 27, 28, 24], we believe that our decomposition
can be used to extend these algorithms to more general requirements. For example, to prove
Theorems 1.4 and 1.3, we combine our decomposition, after overcoming some technical
diculties, with the greedy method similarly to the way the spider decomposition was used
in [21] for Node-Weighted Steiner Forest.
Section 2 presents our main result a novel decomposition of covers of uncrossable
families. Theorems 1.4, 1.1, 1.3, and 1.2 are proved in Sections 3, 4, 5, and 6, respectively.
For some open problems see Section 7.
6
2 Decomposition of covers of uncrossable families
2.1 Spider-covers and decompositions
We start by briey describing the decomposition of [21] of a tree (or forest) into spiders.
Denition 2.1 A spider is a tree having at least two leaves and at most one node of degree
3. A spider decomposition T of a tree T is a collection of node disjoint spiders, each of
them is a subtree of T, so that every leaf of T belongs to exactly one spider of T.
Lemma 2.1 ([21]) Any tree T admits a spider decomposition.
Proof: Root T at an arbitrary leaf r. Proceed by induction on the number of leaves in T
distinct from r. If = 1 the statement is trivial. Otherwise, T has a node s of degree 3 so
that the subtree S that consists of s and all its descendants is a spider with at least 2 leaves.
If s = r, then T is a spider. Otherwise, s has an ancestor s

so that the degree of s

is at
least 3, but every node in the (possibly empty) set P of the internal nodes of the s

s-path
in T has degree 2. Let T

= T (S P). Note that s

is not a leaf of T

, hence the sets of


leaves of T

and S partition the set of leaves of T. By the induction hypothesis, T

admits
a spider decomposition T

. Thus T

S is a spider decomposition of T. 2
Another proof of Lemma 2.1 is as follows. Let U be the set of leaves of T. Consider the
set-family T = X V : [X U[ = 1. It is easy to see that T is uncrossable. It can be
shown that any inclusion minimal T-cover F T is a collection T of pairwise node-disjoint
spiders; consequently, T is a spider decomposition of T. Note that a spider with leaf set U

and center s covers all T-cores (in fact, all members of T) that contain a node from U

and
do not contain s. Motivated by the latter observation, we suggests the following analogue of
spiders for covers of set families.
Denition 2.2 Let T be a set-family on V , let s V , and let ( ((T). An edge set
S on V with s V (S) is an T(s, ()-cover with center if it is an T(s, C)-cover for every
C (, and if ( = C then s does not belong to any T-core containing C. An (s, ()-cover
S is a spider-cover (or an (s, ()-spider-cover) if it can be partitioned into T(s, C)-covers
S
C
: C ( such that the node sets V (S
C
) s : C ( are pairwise disjoint.
Equivalently, any spider cover is obtained as a union of some (s, C)-covers, C ( ((T),
so that no two of them have a common end-node except of maybe s. We now state our
denition of spider-cover decomposition of covers of set-families.
Denition 2.3 A sub-partition S
1
, . . . , S
q
of an T-cover F is a spider-cover decomposition
7
(c)
(a) (b)
s s
Figure 1: Examples of spider-covers; min-cores are shown by dark gray circles, max-cores
by large gray circles. (a) Note that s can be in several max-cores. (b) If ( = C then s
must be outside the max-core containing C. (c) An edge connecting two min-cores is also a
spider-cover; s can be any node belonging to one of the min-cores (the part corresponding
to this min-core is empty).
of F if V (S
1
), . . . , V (S
q
) are pairwise disjoint, and there exists s
1
, . . . , s
q
V and a partition
(
1
, . . . , (
q
of ((T) so that each S
i
is a spider-cover of T(s
i
, (
i
).
The main result of this section is the following:
Theorem 2.2 (The Spider-Cover Decomposition Theorem)
Any cover F of an uncrossable family T admits a spider-cover decomposition.
In [27], a variant of Theorem 2.2 was proved for directed cover of an intersecting family,
when X, Y T, X Y = implies X Y, X Y T, and for every X T there should be
an edge in F entering X. The denition of a spider-covers and decompositions in [27] was
slightly dierent than the one here, e.g., it required disjointness of the tails. For this case, in
[27] is proved that there exists a spider-cover decomposition that covers at least 2[((T)[/3
min-cores (in the setting of [27], this bound is the best possible). The proof of this result is
easier than that of Theorem 2.2 for two reasons. First, in the case of intersecting families,
the max-cores are pairwise disjoint. Second, because the edges are directed, every edge with
head in some max-core can cover only cores contained in this core. Hence any such edge is
assigned to a unique max-core. This enables to apply similar arguments as in the proof of
Lemma 2.1, after overcoming some technical diculties.
However, for undirected covers of uncrossable families, the situation is more involved; the
max-cores may not be disjoint, many edges may cover the same max-core M
C
, and the edges
contained in M
C
may cover cores contained in other max-cores. We use a dierent denition
of the sets M
C
, and extract the the spider-cover decomposition in several stages.
8
2.2 Cores and laminar families
Here we establish some properties of cores and laminar families that will be used later. The
following property of cores is immediate:
Claim 2.3 Let X, Y be cores of an uncrossable family T. Then:
X Y, X Y T if, and only if, X, Y contain the same minimal core.
X Y, Y X T if, and only if, X, Y contain distinct minimal cores.
Denition 2.4 X, Y V cross if each one of the sets X Y , X Y , Y X is nonempty.
A set family L is laminar if its members are pairwise non-crossing, namely, if for any
intersecting X, Y L either X Y or Y X holds.
Denition 2.5 Let F be a cover of a set family T, and let e F. A set W
e
T is a
witness set for e (w.r.t. F) if e is the unique edge in F that covers W
e
. A family J T is
a witness family for F if every e F has a unique witness set W
e
J.
Clearly, any inclusion minimal cover F of a set-family T has a witness family. The follo-
wing statement was implicitly proved in several papers, c.f., [1, 30, 19]; we give a short proof
for completeness of exposition.
Proposition 2.4 Let F be an inclusion minimal cover of a uncrossable family T. Then
there exists a laminar witness family L T for F.
Proof: By the minimality of F there exists a witness family L T for F. We prove that
there exists such laminar L. Among all F

F which have a laminar witness family L

, let
F

be a maximal inclusion one. We claim that F

= F. Suppose to the contrary that there is


e F F

. Among all witness sets for e, let W


e
be one that crosses minimal number of sets
in L

. There is W
f
L

so that W
e
, W
f
cross, as otherwise L

W
e
is a laminar witness
family for F

e, contradicting the maximality of F

. We claim that then at least one of


the following holds:
(i) If W
e
W
f
, W
e
W
f
T then one of W
e
W
f
, W
e
W
f
is a witness for one of e, f
and the other is a witness for the other.
(ii) If W
e
W
f
, W
f
W
e
T and then one of W
e
W
f
, W
f
W
e
is a witness for one of
e, f and the other is a witness for the other.
Consequently, at least one of the sets W
e
W
f
, W
e
W
f
, W
e
W
f
, W
f
W
e
is a witness set
for e. However, it is known (c.f., [19]) that each one of these sets crosses less sets in L

than
W
e
, contradicting the choice of W
e
.
9
We now prove that (i) or (ii) must hold. Suppose that W
e
W
f
, W
e
W
f
T. Note that
then there is an edge in F covering W
e
W
f
and there is an edge in F covering W
e
W
f
.
However, if for arbitrary sets X, Y an edge covers one of X Y, X Y then it covers one of
X, Y , and if some edge covers both XY and XY then it covers both X and Y . Thus no
edge in F e, f can cover W
e
W
f
or W
e
W
f
, so one of e, f covers W
e
W
f
, and thus
the other must cover W
e
W
f
. The proof of the case W
e
W
f
, W
f
W
e
T is similar. 2
Let L T be a laminar witness family for a minimal T-cover F. The following two simple
reductions enable to simplify the exposition. We illustrate them on the Node-Weighted Steiner
Tree problem, the case of NWSN when r(u, v) = 1 if u, v U and r(u, v) = 0 otherwise.
Reduction 1: We may assume that every member of T is an T-core. This is since
Denitions 2.2 and 2.3 consider covers of T-cores only. Thus we may replace T by the
family of T-cores; the latter is uncrossable if T is, by Claim 2.3. Note that in the Node-
Weighted Steiner Tree problem, T = X V : X U, (V X) U = , but the spider
decomposition of a feasible solution covers the family X V : [X U[ = 1 of T-cores,
but may not cover the entire family T.
Reduction 2: We may assume that the minimal members of L are the minimal T-cores.
Otherwise, the following simple transformation applies. For every C ((T) add to V two
new nodes u
C
, v
C
, replace every X T containing C by X v
C
, u
C
, add u
C
to T, and
add the edge e
C
= v
C
u
C
to F. The new family is uncrossable, F covers T if, and only if,
F e
C
: C ((T) covers the new family, and u
C
is the witness set for e
C
for every
C ((T). Proving Theorem 2.2 for the modied family implies Theorem 2.2 for the original
family. This transformation is an analogue of moving terminals to leaves used in [21] for
the Node-Weighted Steiner Tree problem.
2.3 Proof of Theorem 2.2
The proof of Theorem 2.2 follows. The following deniton is central in our proof.
Denition 2.6 For every C ((T) dene (see Fig. 2):
L
C
is the maximal set in L containing C (L
C
exists and is a core, by Reductions 1,2).
e
C
= s
C
v
C
is the (unique, since L
C
is a witness set) edge in F covering L
C
, v
C
L
C
.
S
C
is the set of edges in F with both endpoints in L
C
plus e
C
(possibly S
C
= e
C
).
We have the following properties of the sets L
C
and S
C
:
10
M
C
C
L
e
C
C
L
C
C
C
s
C
v
Figure 2: Illustration to Denitions 2.6 and 2.7.
Lemma 2.5
(i) The sets L
C
: C ((T) are pairwise disjoint.
(ii) For every e = uv F there is a unique C ((T) so that u, v L
C
= ; thus
S
C
= uv F : u, v L
C
= and the sets S
C
: C ((T) partition F.
(iii) S
C
covers all cores contained in L
C
for every C ((T).
Proof:
(i) Part (i) follows from the laminarity of L and the maximality of L
C
.
(ii) Let W
e
be the witness set for e = uv F. By the laminarity of L and the maximality
of the sets L
C
, W
e
L
C
for some C ((T). Consequently, e has at least one end-
node in L
C
. Furthermore, e has exactly one end-node in L
C
if, and only if, e = e
C
; in
this case, L
C
is the witness set for e, and thus e cannot have an end-node in L
C
for
C

((T) C, since every edge in F has a unique witness set.


(iii) Part (iii) follows from part (ii) and the simple observation that if an edge e covers a
set contained in L
C
, then it has at least one end-node in L
C
.
2
Corollary 2.6 Any partition (
1
, . . . , (
q
of ((T) induces a partition S
1
, . . . , S
q
of F, where
S
i
= S
C
: C (
i
.
We obtain a spider-cover decomposition of F as a decomposition induced by a certain
partition of ((T). A natural partition of ((T) (see Fig. 2) is by the stars of e
C
: C ((T).
11
As we show later (see Corollary 2.7), every star with at least two edges indeed gives a spider-
cover. However, this direct approach fails because for a star consisting of a single edge
e
C
= s
C
v
C
, the edge set S
C
may not be a spider-cover, if there is a core containing L
C
+s
C
,
see the set M
C
in Fig. 2. We will handle this diculty by dening a partition of such
dangerous cores, showing that every part of size at least 2 is a spider-cover, and joining
every singleton part to a non-dangerous star. This motivates the following denition:
Denition 2.7 A min-core C ((T) is active if there exists a core containing L
C
+ s
C
;
an active core is dangerous if deg
F
(s
C
) = 1. Let / denote the set of active and T the set of
dangerous min-cores (note that T /). For C / let M
C
be the (unique, by Claim 2.3)
minimal core among the cores containing L
C
+s
C
.
Corollary 2.7
If C ((T) T then S
C
is an T(s, C)-cover for any s V L
C
.
If C T then S
C
is an T(s, C)-cover for any s M
C
L
C
.
Proof: Suppose to the contrary that some X T(s, C) is not covered by S
C
. We will
prove that then we must have s
C
X. This immediately gives a contradiction to the case
C ((T) T. In the case C T we obtain a contradiction to the minimality of M
C
: by
Claim 2.3, Y = (L
C
X) M
C
T, but L
C
+s
C
Y and Y M
C
s.
It remains to show that we must have s
C
X. By Claim 2.3, L
C
X T. By
Lemma 2.5 (iii), there is e S
C
that covers L
C
X, say e = uv where v L
C
X. We
have u / L
C
, as otherwise e covers X. Hence e covers L
C
, implying that e = e
C
and u = s
C
.
However, u X, as otherwise e covers X. 2
We have the following additional properties of the sets M
C
:
Lemma 2.8 For every C / the following holds:
(i) M
C
L
C
= for any C

((T) C.
(ii) M
C
is covered by some edge e
C
, C

((T) C.
(iii) If M
C
M
C
= for C

/ then s
C
, s
C
M
C
M
C
.
Proof:
(i) For part (i), assume to the contrary that M
C
L
C
= for some C

((T) C. By
Claim 2.3, M
C
L
C
T. By Lemma 2.5(i), L
C
M
C
L
C
. If s
C
M
C
L
C
, then
12
L
C
+s
C
M
C
L
C
, contradicting the minimality of M
C
. Otherwise, s
C
M
C
L
C
;
but then e
C
covers L
C
, contradicting that L
C
is a witness set for e
C
.
(ii) Part (ii) follows from part (i) and Lemma 2.5(ii).
(iii) For part (iii), assume to the contrary that s
C
M
C
M
C
; the case s
C
M
C
M
C
is identical. By Claim 2.3, M
C
M
C
T. By part (i), L
C
M
C
M
C
. Hence
L
C
+s
C
M
C
M
C
, contradicting the minimality of M
C
.
2
Corollary 2.9 The relation 1 = (M
C
, M
C
) : C, C

/, M
C
M
C
= is an equivalence.
Proof: Clearly, 1 is symmetric and reexive. The transitivity follows from Lemma 2.8(iii).
2
Proof of Theorem 2.2: We obtain a spider-cover decomposition of F as a decomposition
induced by a partition (
1
, . . . , (
q
of ((T), which we dene in two steps, as follows.
The rst step denes a subpartiton of T(() and the corresponding centers as follows.
Partition ((T) T according to stars of e
C
: C ((T) T, namely, into equivalence
classes of the relation (C, C

) : s
C
= s
C
on ((T) T. Add to this partition a partition
of T into equivalence classes of size at least 2 of the relation 1 as in Corollary 2.9 (namely,
we partition T into equivalence classes of 1, and exclude the singleton classes from this
partition). Let (
1
, . . . , (
q
be a sub-partition of ((T) obtained; s
i
is chosen arbitrarily from
s
C
: C (
i
, i = 1, . . . , q. Note that if (
i
is a part of ((T) T then s
i
is unique, while if
(
i
is a part of T then there are [(
i
[ distinct choices of s
i
.
In the second step we join every singleton part C of T to some part of ((T) T, as
follows (see Fig. 3(a)). By Lemma 2.8(ii), there exists C

((T) C so that e
C
covers
M
C
(namely, so that s
C
M
C
). Note that C

((T) T, as otherwise C, C

would belong
to the same class of 1. Hence there is a part of ((T) T which contains a core C

so that
e
C
covers M
C
; we join C to one (arbitrarily chosen) such part of ((T) T.
Let (
1
, . . . , (
q
be the partition of ((T) obtained. We claim that the induced partition
S
1
, . . . , S
q
of (
1
, . . . , (
q
, where S
i
= S
C
: C (
i
, with the corresponding centers s
1
, . . . , s
q
(chosen at the rst step), is a spider-cover decomposition of F. From Lemma 2.5(ii) and the
construction it follows that V (S
1
), . . . , V (S
q
) are pairwise disjoint. Thus it remains to show
that S
i
is an (s
i
, (
i
)-spider-cover for every i = 1, . . . , q.
Fix some part ( = (
i
, and let S = S
i
and s = s
i
. We prove that S is an (s, ()-spider
cover, where the corresponding partition of S is S
C
: C (. Note that if ( = C,
13
C
M
M
C
C
C
L
L
e
C
(a) (b)
s
s
Figure 3: (a) ( is obtained from a star with center s by joining a dangerous core C so that
s M
C
. (b) ( is an equivalence class of the relation 1 = (C, C

) TT : M
C
M
C
= .
then C / T, hence no X T contains both C and s; otherwise, if there is such X, then
X L
C
T by Claim 2.3, contradicting that C / T. Now recall that the pair (, s was
obtained in one of the following two ways:
1. A subset of ((T) T corresponding to a star with center s chosen at step 1, (namely,
an equivalence class of the relation (C, C

) : s
C
= s
C
on ((T) T), to which we
possibly joined at step 2 some dangerous cores C T with s M
C
(see Fig. 3(a)).
2. An equivalence class ( of size at least 2 of the relation 1on T, with s chosen arbitrarily
from s
C
: C ( (see Fig. 3(b)).
In both cases, the node sets V (S
C
) s : C ( are pairwise disjoint by Lemma 2.5(ii)
and the construction, and S
C
is an T(s, C)-cover for every C ( by Corollary 2.7. Conse-
quently, S is an (s, ()-spider-cover, as claimed.
The proof of Theorem 2.2 is complete. 2
3 Covering uncrossable families (Proof of Theorem 1.4)
We use a result about the performance of a Greedy Algorithm for the following type of
problems:
Covering Problem
Instance: A ground-set E, integral function , w on 2
E
given by an evaluation oracle, where
(E) = 0.
Objective: Find I E with (I) = 0 and with w(I) minimized.
14
A set-function f on 2
E
is decreasing (resp, increasing) if f(I
2
) f(I
1
) (resp., if f(I
2
)
f(I
1
)) for any I
1
I
2
E; f is sub-additive if f(I
1
I
2
) f(I
1
) + f(I
2
) for all I
1
, I
2
E.
In the Covering Problem, is the deciency function (it is assumed to be decreasing and
measures how far is I from being a feasible solution) and w the weight function (assumed to
be increasing and sub-additive). Let > 1 and let opt be the optimal solution value for the
Covering Problem. The -Approximate Greedy Algorithm starts with I = and iteratively
adds subsets of E I to I one after the other using the following rule. As long as (I) 1
it adds to I a set S E I so that

I
(S) =
w(S)
(I) (I +S)

opt
(I)
. (2)
The following statement is known, c.f., [21], where a slightly weaker statement was proved.
Theorem 3.1 For any Covering Problem so that is decreasing and w is increasing and
sub-additive, the -Approximate Greedy Algorithm computes a solution I so that w(I)
H(()) opt.
Recall that ((T) is the family of minimal T-cores. We dene the functions and w by:
(I) = [((T
I
)[ and w(I) = w(V (I)) I E .
Clearly, is decreasing, and w is increasing and sub-additive. Theorem 1.4 will be proved if
we prove:
Lemma 3.2 For (I) = [((T
I
)[ and w(I) = w(V (I)), I E, an edge set S E I
satisfying (2) with = 3 can be found in polynomial time under Assumptions 1 and 2.
For simplicity of exposition, let us revise our notation and use T instead of T
I
, and let
= (). We assume that E is a feasible solution, thus (E) = 0. Let (S) = (S).
Then we need to show that under Assumptions 1 and 2 one can nd in polynomial time an
edge set S E so that:

(S) =
w(S)
(S)
3
opt

. (3)
Denition 2.2 is useful in the context of the greedy method because of the following
statement:
Lemma 3.3 (The Spider-Cover Lemma) Let T be an uncrossable set-family, let S be
an (s, ()-cover, and let (S) = (S). Then (S) ([([ 1)/2| and (S) 1 if
[([ = 1.
15
s
u
0
v
1
v
2
u
2
u
1
Figure 4: Example that the bound in Lemma 3.3 is tight for [([ = 3.
Proof: The minimal T
S
-cores are pairwise disjoint, and each of them contains some minimal
T-core. Let t be the number of T
S
-cores containing exactly one minimal T-core. By the
denition of an (s, ()-cover, any T
S
-core C

that contains some T-core C, contains s or


contains some other minimal T-core distinct from C. Furthermore, if ( = C only the
latter can hold. Thus t [((T)[ ([([ 1) if [([ 2, and t [((T)[ 1 if [([ = 1. The
statement follows. 2
Example that the bound on (S) given in Lemma 3.3 is tight:
The bound on (S) given in Lemma 3.3 is tight even for laminar set-families and any
[([, see Fig. 4 for an example with [([ = 3 and (S) = 3 2 = 1. Here
V = s, u
0
, u
1
, u
2
, v
1
, v
2
, T = u
0
, u
1
, u
2
, s, u
0
, u
1
, u
2
, v
1
, v
2
, ( = u
0
, u
1
, u
2
.
The edge set S = su
0
, v
1
u
1
, v
2
u
2
is an (s, ()-cover, and the T
S
-cores are s, u
0
and
u
1
, u
2
, v
1
, v
2
. This example extends for any [([ 2. For [([ = 2k +1 is odd, make k copies
of the set u
1
, u
2
, v
1
, v
2
together with the sets and edges contained in it. Then, to get an
example for [([ = 2k even, delete u
0
together with the sets containing it and edges incident
to it. One might think that a better denition of an (s, ()-spider-cover, ( ((T), is an
edge-set that covers all members of T separating s and some core C (. However, then
there are examples showing that an appropriate decomposition as in Theorem 2.2 does not
exist.
Corollary 3.4 There exists an (s, (

)-spider-cover S for which (3) holds.


Proof: Note that if S is an (s, ()-cover, then (S) [([/3, by Lemma 3.3; the worse case
is when [([ = 3, but in this case (S) = 1. Let S
1
, . . . , S
q
be a core-cover decomposition
of an optimal T-cover I. Now the statement follows by a simple averaging argument. Let
w
i
= w(V (S
i
)) and let
i
= (S
i
). We have

t
i=1
w
i
w(I) = opt. By Lemma 3.3,

t
i=1

i
/3. Thus

t
i=1
w
i

t
i=1

i

opt
/3
. There must be index i so that w
i
/
i
3 opt/. Let
S = S
i
. Then (S)
i
, by Lemma 3.3. Consequently,

(S) = w(S)/(S) 3 w(I)/ =


3 opt/. 2
16
Let us show that Corollary 3.4 implies Lemma 3.2. The following algorithm nds S E
satisfying (3). For every s V compute an edge set S E as follows. For every C (
dene the weight W(C) of C to be the minimum weight of an T(s, C)-cover, ignoring the
weight of s. This can be done in polynomial time by Assumption 2. Sort the members of (
by increasing weight W(C
1
) W(C
2
) . . . W(C
q
). Let W
j
= w(s) +

j
i=1
W(C
i
). Note
that W
j
is at most the node-weight of any (s, C
1
, . . . , C
j
)-spider cover. Now set:

1
= W
1
if s does not belong to the maximal core containing C
1
and
1
= 0 otherwise;

j
= W
j
/(j 1)/2|, j = 2, . . . , q.
We nd the index j for which
j
is maximum, which determines the edge set S. Among the
edge sets S : s V computed choose one with

(S) maximum. The time complexity is the


time required to compute the family ((T) (polynomial by Assumption 1), plus n[((T)[ times
the time required to nd a minimum weight T(s, C)-cover (polynomial by Assumption 2).
4 Algorithm for NWSN (Proof of Theorem 1.1)
Theorem 1.4 can be applied to give a 3r
max
H([U[)-approximation algorithm for NWSN.
The algorithm has r
max
iterations. Iteration k starts with a partial solution H satisfying

H
(u, v) minr(u, v), k 1 for all u, v V and returns an augmenting edge set F
E E(H) of node-weight w(F) 3H([U[) opt so that
H+F
(u, v) minr(u, v), k for all
u, v V . Hence after r
max
iterations, a feasible solution of weight at most 3r
max
H([U[) opt
is found.
By Mengers Theorem, computing an augmenting edge set F as above is equivalent to
nding an T-cover of the set-family T = X V : r(X) k, deg
H
(X) = k 1. This
T is uncrossable, c.f., [30]. To apply Theorem 1.4, we need to show that Assumptions 1,2
hold for T. For that, we show a polynomial time algorithm for the following augmentation
version of NWk-F:
Node-Weighted k-Flow Augmentation (NWk-FA)
Instance: A graph G = (V, E) with node weights w(v) : v V , s, t V , an integer k, and
a subgraph G
0
= (V, E
0
) of G so that
G
0
(s, t) = k 1.
Objective: Find F E E
0
so that
G
0
+F
(s, t) = k and w(V (F)) is minimum.
Proposition 4.1 NWk-FA can be solved in polynomial time using one shortest path compu-
tation.
Proof: It would be convenient to describe the algorithm using mixed graphs that con-
tain both directed and undirected edges. Given such mixed graph with weights on the
17
edges/nodes, a minimum weight st-path can be found in polynomial time using Dikjstras
algorithm and elementary constructions (namely, replacing every undirected edge by two
opposite directed edges, and, if necessary, converting node weights to edge weights). The
following known algorithm solves the edge-weighted version of the problem, c.f., [7].
1. Let I
0
be an inclusion minimal edge set in G
0
that contains k1 pairwise edge-disjoint
st-paths. Construct a mixed graph D by directing these paths from t to s.
2. Compute a minimum weight st-path P in D. Return P E
0
.
The same algorithm applies for the node-weighted version NWk-FA, with the minor modi-
cation that at step 2 we nd a minimum node-weight st-path P. 2
We now ready to show that Assumptions 1,2 hold for the family T. As any edge set I
added at some previous step of iteration k can be included in H, it is sucient to prove:
Corollary 4.2 Let H be an edge set on V and T = X V : r(X) k, deg
H
(X) = k 1.
1. The family ((T) can be found using [U[([U[ 1)/2 max-ow computations.
2. A min-node-weight T(s, C)-cover can be found using one shortest path computation.
Proof: The minimal T-cores can be computed as follows. For every pair u, v U with
r(u, v) k, compute a maximum uv-ow in H. If the ow value is k 1, then in the corre-
sponding residual directed network the set of nodes X
uv
= x V : x is reachable from u
is a minimal set in T that contains u and does not contain v, and thus is a candidate to be
the minimal core containing u; similarly, X
vu
= x V : v is reachable from x is a minimal
member of T
I
that contains v and does not contain u. The minimal inclusion sets among all
such sets, two for every pair u, v V so that r(u, v) k and
H
(u, v) = k 1, are the
minimal T-cores.
After the minimal T-cores are found, a minimum node-weight T(s, C)-cover for every
s V and C ((T) can be found using one shortest path computation as follows. Add an
edge from s to every minimal core distinct from C; the added edges cover T(s, C

) for every
C ((T)C, but do not cover any member in T(s, C). Then choose t C, and compute
a minimum node-weight augmenting edge set F E so that
H+F
(s, t) k. The latter
problem is exactly NWk-FA, and thus can be solved using one shortest path computation,
by Proposition 4.1. 2
18
5 Algorithm for {0, 1, 2}-NWSNDP (Proof of Theorem 1.3)
Let E
0
be the solution computed by the Klein-Ravi [21] (or the Guha-Khuller [16]) algorithm
with the 0, 1-requirement function minr(u, v), 1; clearly, w(E
0
) = O(ln n) opt. After
resetting the weight of nodes in V (E
0
) to 0, we get the following residual problem:
Instance: Disjoint edge sets E
0
, E on a node set V , node weights w(v) : v V with
w(E
0
) = 0, and a set D of node pairs, so that every pair belongs to the same
component of (V, E
0
).
Objective: Find a minimum node-weight edge set I E so that the graph (V, E
0
+I) contains
2 internally disjoint uv-paths for every pair u, v D.
We reduce the latter problem to NWSFC with uncrossable T, and show that Assumptions
1,2 hold for this T. We start by modifying the instance H
0
= (V, E
0
), E, w, D (see Fig. 5).
A node a is a cut-node of H if H a has more (connected) components than H. The
components of H a that are not components of H are the sides of a. Let Q be the set
of cut-nodes of H
0
. For every a Q with sides A
1
, . . . , A
k
do the following (see Fig. 5):
add new nodes a
1
, . . . , a
k
of the weight 0 each, add the edges aa
1
, . . . , aa
k
to E
0
, and for
every edge ua E
0
E with u A
i
replace its end-node a by a
i
; the set D of demand
pairs remains the same. Note that only edges in E that are incident to a node in S and
have both end-nodes in the same component of H
0
are aected. Clearly, the construction
is polynomial. For subsets of E the transformation is weight preserving, since all original
nodes keep their weights, while the added nodes and the nodes in Q have weight 0. It is also
easy to see that I E is a feasible solution to the original instance if, and only if, I is a
feasible solution to the modied instance; the weight of I is the same in both instances. We
now dene our family T on the modied instance.
Denition 5.1 A set-pair is a partition X, X

of V a for some a Q so that no edge in


E
0
connects X and X

. A set-pair X, X

is violated if there is a demand pair x, x

D
so that x X and x

. A set X V is violated if it is a part of some violated set-pair.


Let T
+
be the family of all violated sets, let T

= V X : X T
+
, and let T = T
+
T

.
Note that X T
+
if, and only if, V X T

. Thus T is symmetric, that is, X T


implies V X T. It is a routine to show that I E is a feasible solution for the modied
instance if, and only if, I covers T. Lemmas 5.1 and 5.2 to follow together with Theorem 1.4
imply Theorem 1.3.
Lemma 5.1 The family T in Denition 5.1 is uncrossable.
19
a
2
b
1
b
3
b
1
c c
2
c
b
a
2
a
4
a
1
a
c
b a
3
Figure 5: Modication of the instance H
0
= (V, E
0
), E. Some edges in E are shown
by dashed lines. The set of original cut-nodes is Q = a, b, c and the added nodes are
a
1
, a
2
, a
3
, a
4
, b
1
, b
2
, b
3
, c
1
, c
2
.
A
2
A
3
A
4
A
1 1
2
A
4
A
3
A
Y
(b)
X
Y
X
Y Y
X
(a)
A
X
a
a
b
Figure 6: Illustration to the proof of Lemma 5.1.
Proof: Let X, Y T. We need to show that X Y, X Y T or X Y, Y X T. The
following assumptions simplify the case analysis. We may assume that X Y, X Y, Y
X, V (X Y ) are all nonempty, as otherwise the statement is trivial. Also, it would be
enough to consider the case X, Y T
+
, since the sets in T

are complementaries of the sets


in T
+
, and since T is symmetric.
Let X, X

, a, x, x

be as in Denition 5.1, and similarly Y, Y



, b, y, y

are dened.
Let A
1
= X Y , A
2
= X Y

, A
3
= Y

, and A
4
= X

Y (see Fig. 6). An ordered


pair (s, t) of nodes is an (A
i
, A
j
)-pair if s A
i
and t A
j
. We split the proof into two cases:
a = b and a = b.
Assume that a = b (see Fig. 6(a)). Then at least one of the following holds:
(i) (x, x

) or (y, y

) is an (A
1
, A
3
)-pair;
(ii) (x, x

) or (y, y

) is an (A
2
, A
4
)-pair;
(iii) (x, y

) is an (A
1
, A
3
)-pair and x

, y A
4
, or (y, x

) is an (A
1
, A
3
)-pair and x, y

A
2
;
(iv) (x, y) is an (A
2
, A
4
)-pair and x

, y

A
3
, or (y

, x

) is an (A
2
, A
4
)-pair and x, y A
1
.
One can easily verify that if (i) or (iii) holds, then X Y, X Y T
+
, and if (ii) or (iv)
holds then X Y, Y X T
+
. Hence the statement is true if a = b.
20
Assume that a = b. Then we must have a Y Y

and b XX

, say a Y and b X
(see Fig. 6(b)). Note that in H
0
there is no edge between any two of the sets A
1
, A
2
, A
3
, A
4
,
so any path between any two of them, if any, goes through a and/or b. In particular, A
3
does not intersect the component containing a or b. Consequently, none of x, x

, y, y

belongs
to A
3
. Eliminating from the cases (i)(iv) all the cases when A
3
contains one of x, x

, y, y

,
we get that either: case (i) holds, namely, one of (x, x

), (y, y

) is an (A
2
, A
4
)-pair, or (y

, x

)
is an (A
2
, A
4
)-pair and x, y A
1
. In both cases, A
2
, A
4
T
+
. The corresponding violated
set-pairs are A
2
, V b A
2
and A
4
, V a A
4
, so V b A
2
, V a A
4
T
+
.
However, the complementary of V b A
2
is A
2
b = X Y , and the complementary of
V a A
4
is A
4
a = Y X. Hence X Y, Y X T

T. 2
Lemma 5.2 Assumptions 1, 2 hold for T in Denition 5.1.
Proof: We need to show that for any I E:
1. The family ((T
I
) of minimal T
I
-cores can be found in polynomial time.
2. A min-node-weight T
I
(s, C)-cover can be found in polynomial time for any s V and
C ((T
I
).
For simplicity of exposition, we may consider the case I = . The proof is similar to the
proof of Corollary 4.2.
The family ((T) can be computed as follows. For every cut-node of H
0
not in S, we nd
the sides of this cut-node, and for each side check if it is a violated set. Among the violated
sets found, we output the minimal inclusion ones.
After the minimal T-cores are found, a minimum node-weight T(s, C)-cover for every
s V and C ((T) can be found using one shortest path computation in the same way
as for ordinary NWSN, as described in the proof of Corollary 4.2. First, add to H
0
an edge
from s to every minimal core distinct from C. Note that after adding these edges, there
is a path from s to C (since the component of H
0
contains a core disjoint to C), and that
the added edges cover T(s, C

) for every C ((T) C, but do not cover any member


in T(s, C). Second, choose t C and compute a minimum node-weight augmenting edge
set F E so that after adding F there are 2 edge-disjoint st-paths. It is a routine to
verify that adding F will create 2 internally-disjoint st-paths, because we work on the graph
after applying the modication described at the beginning of Section 5. Hence again we can
apply our algorithm for NWk-FA, and solve the corresponding problem using one shortest
path computation, by Proposition 4.1. 2
The proof of Theorem 1.3 is complete.
21
6 Hardness of NWk-F (Proof of Theorem 1.2)
It is easy to see that NWk-F is Hitting-Set hard. Indeed, the Hitting-Set problem can be
formulated as follows. Given a bipartite graph J = (A + B, E), nd minimum size subset
S A such that every node in B has a neighbor in S. Construct an instance of NWk-F by
adding new nodes s, t, edges sa : a A bt : b B, and setting w(v) = 1 if v A
and w(v) = 0 otherwise. Then replace every edge not incident to t by [B[ parallel edges. For
k = [B[, it is easy to see that S is a solution to the Hitting-Set instance if, and only if, the
subgraph induced by S B s, t is a feasible solution to the obtained NWk-F instance.
We now prove that a -approximation algorithm for NWk-F implies a 1/(2
2
)-approxi-
mation for bipartite D-S. We need the following statement.
Lemma 6.1 There exists a polynomial time algorithm that given a graph G = (V, E) and
an integer 1 n = [V [ nds a subgraph G

= (V

, E

) of G with [V

[ = and [E

[
[E[
(1)
n(n1)
.
Proof: While G has more than nodes, repeatedly delete the minimum degree node from
G. At the beginning of iteration i + 1 G has n
i
= n i nodes and m
i
edges, where n
0
= n
and m
0
= m. The average degree is 2m
i
/n
i
, thus after iteration i + 1 the number m
i+1
of
edges in G is at least:
m
i+1
m
i

2m
i
n
i
= m
i

n i 2
n i
.
The statement follows since the above recursive formula implies that after i = n iterations:
m
i
m

(n 2) (n i + 1)(n i)(n i 1)
n(n 1)(n 2) (n i + 1)
=
(n i)(n i 1)
n(n 1)
=
( 1)
n(n 1)
.
2
Given an instance J = (A + B, E) and of bipartite D-S, dene an instance of unit-
weight NWk-F by adding new nodes s, t, edges sa : a A bt : b B of multiplicity
[A[ + [B[ each, and setting w(v) = 1 for all v A B. Note that any I E determines
[I[ edge-disjoint st-paths. Thus for any integer k 1, . . . , [E[ we have a -approximation
algorithm for
min[X[ : X A +B, [E(X)[ k .
We show that this implies a 1/(2
2
)-approximation algorithm for the D-S problem, which
is
max[E(X)[ : X A +B, [X[ .
22
For every k = 1, . . . , [E[, use the -approximation algorithm for NWk-F to compute a
subset X
k
A + B so that [E(X
k
)[ k, or to determine that no such X
k
exists. Now, let
X = X
k
where k is the largest integer so that [X
k
[ min |, [A[ +[B[ and [E(X
k
)[ k.
Let X

be an optimal solution for D-S. Note that [E(X)[ [E(X

)[ and that
(1)
|X|(|X|1)

1/(2
2
). By Lemma 6.1 we can nd in polynomial time X

X so that [X

[ = and
[E(X

)[ [E(X)[
( 1)
[X[([X[ 1)
[E(X

)[ 1/(2
2
) .
Thus X

is a 1/(2
2
)-approximation for the bipartite D-S.
7 Open problems
We suggest the following open problems:
Can the ratio for NWSN be improved to 2H([U[) r
max
, or even better?
Does NWSN admits a sub-linear in r
max
approximation ratio? Even for NWk-F, the best
known ratio is k, while the reduction to D-S in Theorem 1.2 shows only a threshold
of [V [
1/6/2
for 1/60, unless for D-S a better algorithm than the one in [10] will
be found.
Can Theorem 2.2 be applied for node-weighted Steiner Network with element-connecti-
vity requirements? For edge-weights, this problem admit a 2-approximation algorithm
[12, 6].
Acknowledgment: I thank an anonymous referee for many useful comments on a previous
version of this paper. I also than Danny Segev for some comments.
References
[1] A. Agrawal, P. N. Klein, and R. Ravi. When trees collide: An approximation algorithm
for the generalized Steiner problem on networks. SIAM J. Comput., 24(3):440456,
1995.
[2] G. Calinescu, S. Kapoor, A. Olshevsky, and A. Zelikovsky. Network lifetime and power
assignment in ad-hoc wireless networks. In Proc. European Symposium on Algorithms
(ESA), pages 114126, 2003.
23
[3] M. Charikar, C. Chekuri, T. Cheung, Z. Dai, A. Goel, S. Guha, and M. Li. Approxima-
tion algorithms for directed Steiner problems. Journal of Algorithms, 33:7391, 1999.
[4] C. Chekuri, G. Even, A. Gupta, and D. Segev. Set connectivity problems in undirected
graphs and the directed Steiner network problem. To appear in SODA 2008.
[5] C. Chekuri, M. Hajiaghayi, G. Kortsarz, and M. R. Salavatipour. Polylogarithmic ap-
proximation algorithm for non-uniform multicommodity buy-at-bulk with vertex costs.
In Proc. Symposium on Discrete Algorithms (SODA), 2007. To appear.
[6] J. Cheriyan, S. Vempala, and A. Vetta. Network design via iterative rounding of setpair
relaxations. Combinatorica, 26(3):255275, 2006.
[7] W. J. Cook, W. H. Cunningham, W. R. Pulleyblank, and A. Scrijver. Combinatorial
Optimization. Wiley, 1998.
[8] Y. Dodis and S. Khanna. Design networks with bounded pairwise distance. In Proc.
Symposium on the Theory of Computing (STOC), pages 750759, 1999.
[9] U. Feige. A threshold of ln n for approximating set cover. Journal of the ACM,
45(4):634652, 1998.
[10] U. Feige, G. Kortsarz, and D. Peleg. The dense k-subgraph problem. Algorithmica,
29:410421, 2001.
[11] M. Feldman, G. Kortsarz, and Z. Nutov. Improved approximating algorithms for di-
rected steiner forest. Manuscript, 2008.
[12] L. K. Fleischer, K. Jain, and D. P. Williamson. An iterative rounding 2-approximation
algorithm for the element connectivity problem. In Proc. Symposium on the Foundations
of Computer Science (FOCS), pages 339347, 2001.
[13] M. X. Goemans, A. V. Goldberg, S. Plotkin, D. B.Shmoys, E. Tardos, and D. P.
Williamson. Improved approximation algorithms for network design problems. In Proc.
Symposium on Discrete Algorithms (SODA), pages 223232, 1994.
[14] M. X. Goemans and D. P. Williamson. A general approximation technique for con-
strained forest problems. SIAM Journal on Computing, 24:296317, 1995.
[15] M. X. Goemans and D. P. Williamson. The primal-dual method for approximation
algorithm and its application to network design problems, Chapter 4 in Approximation
Algorithms for NP-hard problems, D. S. Hochbaum Ed., pages 144-191. PWS, 1995.
24
[16] S. Guha and S. Khuller. Improved methods for approximating node weighted steiner
trees and connected dominating sets. Inf. Comput., 150(1):5774, 1999.
[17] S. Guha, A. Moss, J. Naor, and B. Schieber. Ecient recovery from power outage. In
Proc. Symposium on the Theory of Computing (STOC), pages 574582, 1999.
[18] M. T. Hajiaghayi, G. Kortsarz, V. S. Mirokni, and Z. Nutov. Power optimization for
connectivity problems. Math. Programming (special issue for IPCO XI), 110(1):195208,
2007.
[19] K. Jain. A factor 2 approximation algorithm for the generalized Steiner network prob-
lem. Combinatorica, 21(1):3960, 2001.
[20] S. Khuller. Approximation algorithms for for nding highly connected subgraphs, Chap-
ter 6 in Approximation Algorithms for NP-hard problems, D. S. Hochbaum Ed., pages
236-265. PWS, 1995.
[21] P. N. Klein and R. Ravi. A nearly best-possible approximation algorithm for node-
weighted steiner trees. Journal of Algorithms, 19(1):104115, 1995.
[22] G. Kortsarz, R. Krauthgamer, and J. R. Lee. Hardness of approximation for vertex-
connectivity network design problems. SIAM Journal on Computing, 33(3):704720,
2004.
[23] G. Kortsarz and Z. Nutov. Approximating minimum cost connectivity problems, Ch. 58
in Approximation Algorithms and Metahueristics, T. F. Gonzales ed.,. CRC, 2007.
[24] G. Kortsarz and Z. Nutov. Approximating some network design problems with node
costs. Manuscript, 2007.
[25] A. Moss and Y. Rabani. Approximation algorithms for constrained node weighted
Steiner tree problems. In Proc. Symposium on the Theory of Computing (STOC), pages
373382, 2001.
[26] Z. Nutov. Approximating connectivity augmentation problems. In Proc. Symposium on
Discrete Algorithms (SODA), pages 176185, 2005.
[27] Z. Nutov. Approximating minimum power covers of intersecting families and directed
connectivity problems. In Proc. Workshop on Approximation algorithms (APPROX),
LNCS 4110, pages 236247, 2006.
25
[28] R. Ravi, M. V. Marathe, S. S. Ravi, D. J. Rosenkrantz, and H. B. Hunt III. Ap-
proximation algorithms for degree-constrained minimum-cost network-design problems.
Algorithmica, 31(1):5878, 2001.
[29] G. Robins and A. Zelikovsky. Tighter bounds for graph Steiner tree approximation.
SIAM J. Discrete Math., 1(19):122134, 2005.
[30] D. P. Williamson, M. X. Goemans, M. Mihail, and V. V. Vazirani. A primal-dual approx-
imation algorithm for generalized steiner network problems. Combinatorica, 15:435454,
1995.
[31] A. Zelikovsky. A series of approximation algorithms for the acyclic directed Steiner tree
problem. Algorithmica, 18:99110, 1997.
26

You might also like