Skip to main content

Approximate Multi-matroid Intersection via Iterative Refinement

  • Conference paper
  • First Online:
Integer Programming and Combinatorial Optimization (IPCO 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11480))

Abstract

We introduce a new iterative rounding technique to round a point in a matroid polytope subject to further matroid constraints. This technique returns an independent set in one matroid with limited violations of the other ones. On top of the classical steps of iterative relaxation approaches, we iteratively refine/split involved matroid constraints to obtain a more restrictive constraint system, that is amenable to iterative relaxation techniques. Hence, throughout the iterations, we both tighten constraints and later relax them by dropping constraints under certain conditions. Due to the refinement step, we can deal with considerably more general constraint classes than existing iterative relaxation/rounding methods, which typically round on one matroid polytope with additional simple cardinality constraints that do not overlap too much.

We show how our rounding method, combined with an application of a matroid intersection algorithm, yields the first 2-approximation for finding a maximum-weight common independent set in 3 matroids. Moreover, our 2-approximation is LP-based, and settles the integrality gap for the natural relaxation of the problem. Prior to our work, no upper bound better than 3 was known for the integrality gap, which followed from the greedy algorithm. We also discuss various other applications of our techniques, including an extension that allows us to handle a mixture of matroid and knapsack constraints.

A. Linhares and C. Swamy—Research supported by NSERC grant 327620-09 and an NSERC DAS Award.

N. Olver—Supported by NWO VIDI grant 016.Vidi.189.087.

R. Zenklusen—Supported by Swiss National Science Foundation grant 200021_165866.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bansal, N., Khandekar, R., Könemann, J., Nagarajan, V., Peis, B.: On generalizations of network design problems with degree bounds. In: Proceedings of Integer Programming and Combinatorial Optimization (IPCO), pp. 110–123 (2010)

    Chapter  Google Scholar 

  2. Bansal, N., Khandekar, R., Nagarajan, V.: Additive guarantees for degree-bounded directed network design. SIAM J. Comput. 39(4), 1413–1431 (2009)

    Article  MathSciNet  Google Scholar 

  3. Chan, Y.H., Lau, L.C.: On linear and semidefinite programming relaxations for hypergraphic matching. Math. Program. Ser. A 135, 123–148 (2012)

    Article  Google Scholar 

  4. Chekuri, C., VondrĂ¡k, J., Zenklusen, R.: Submodular function maximization via the multilinear relaxation and contention resolution schemes. SIAM J. Comput. 43(6), 1831–1879 (2014)

    Article  MathSciNet  Google Scholar 

  5. Cook, W.J., Cunningham, W.H., Pulleyblank, W.R., Schrijver, A.: Combinatorial Optimization. Wiley, New York (1998)

    Google Scholar 

  6. Cygan, M.: Improved approximation for \(3\)-dimensional matching via bounded pathwidth local search. In: Proceedings of 54th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 509–518 (2013)

    Google Scholar 

  7. Cygan, M., Grandoni, F., Mastrolilli, M.: How to sell hyperedges: the hypermatching assignment problem. In: Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 342–351 (2013)

    Google Scholar 

  8. Fisher, M.L., Nemhauser, G.L., Wolsey, L.A.: An analysis of approximations for maximizing submodular set functions - II. Math. Program. Study 8, 73–87 (1978)

    Article  MathSciNet  Google Scholar 

  9. FĂ¼redi, Z.: Maximum degree and fractional matchings in uniform hypergraphs. Combinatorica 1(2), 155–162 (1981)

    Article  MathSciNet  Google Scholar 

  10. Gupta, A., Nagarajan, V., Ravi, R.: Robust and maxmin optimization under matroid and knapsack uncertainty sets. ACM Trans. Algorithms 12(1), 121 (2015)

    Article  MathSciNet  Google Scholar 

  11. Gupta, A., Roth, A., Schoenebeck, G., Talwar, K.: Constrained non-monotone submodular maximization: offline and secretary algorithms. In: Saberi, A. (ed.) WINE 2010. LNCS, vol. 6484, pp. 246–257. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17572-5_20

    Chapter  Google Scholar 

  12. HalldĂ³rsson, M.M.: Approximating discrete collections via local improvements. In: Proceedings of the 6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 160–169 (1995)

    Google Scholar 

  13. Hurkens, C.A.J., Schrijver, A.: On the size of systems of sets every \(t\) of which have an SDR, with an application to the worst-case ratio of heuristics for packing problems. SIAM J. Discrete Math. 2(1), 68–72 (1989)

    Article  MathSciNet  Google Scholar 

  14. KirĂ¡ly, T., Lau, L.C., Singh, M.: Degree bounded matroids and submodular flows. In: Proceedings of Integer Programming and Combinatorial Optimization (IPCO), pp. 259–272 (2008)

    Google Scholar 

  15. Lau, L.C., Ravi, R., Singh, M.: Iterative Methods in Combinatorial Optimization, 1st edn. Cambridge University Press, New York (2011)

    Book  Google Scholar 

  16. Lee, J., Mirrokni, V., Nagarajan, V., Sviridenko, M.: Maximizing nonmonotone submodular functions under matroid or knapsack constraints. SIAM J. Discrete Math. 23(4), 2053–2078 (2010)

    Article  MathSciNet  Google Scholar 

  17. Lee, J., Sviridenko, M., VondrĂ¡k, J.: Submodular maximization over multiple matroids via generalized exchange properties. Math. Oper. Res. 35(4), 795–806 (2010)

    Article  MathSciNet  Google Scholar 

  18. Parekh, O., Pritchard, D.: Generalized hypergraph matching via iterated packing and local ratio. In: Bampis, E., Svensson, O. (eds.) WAOA 2014. LNCS, vol. 8952, pp. 207–223. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18263-6_18

    Chapter  MATH  Google Scholar 

  19. Schrijver, A.: Combinatorial Optimization, Polyhedra and Efficiency. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  20. Singh, M., Lau, L.C.: Approximating minimum bounded degree spanning trees to within one of optimal. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), pp. 661–670 (2007)

    Google Scholar 

  21. Zenklusen, R.: Matroidal degree-bounded minimum spanning trees. In: Proceedings of the 23rd Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 1512–1521 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rico Zenklusen .

Editor information

Editors and Affiliations

Appendices

A Impossibility of Achieving Small Additive Violations

We show that Theorem 2 for problem (1) cannot be strengthened to yield a basis of \(M_0\) that has small additive violation for the matroid constraints of \(M_1,\ldots ,M_k\), even when \(k=2\).

We first define additive violation precisely. Given a matroid \(M = (N,\mathcal {I})\) with rank function r, we say that a set \(R \subseteq N\) is \(\mu \text {-}additively\,independent\) in M if \(|R|-r(R) \le \mu \); equivalently, we can remove at most \(\mu \) elements from R to obtain an independent set in M. Unlike results for degree-bounded spanning trees, or matroidal degree-bounded MST [21], we show that small additive violation is not possible in polytime (assuming P \(\ne \) NP) even for the special case of (1) where \(k=2\), so we seek a basis of \(M_0\) that is independent in \(M_1,M_2\).

Theorem 8

Let \(f(n) = O(n^{1-\varepsilon })\), where \(\varepsilon > 0\) is a constant. Suppose we have a polytime algorithm \(\mathcal {A}\) for (1) that returns a basis B of \(M_0\) satisfying \(|B|\le r_i(B)+f(|N|)\) for \(i=1,2\) (where \(r_i\) is the rank function of \(M_i\)). Then we can find in polytime a basis of \(M_0\) that is independent in \(M_1,M_2\).

The problem of finding a basis of \(M_0\) that is independent in \(M_1,M_2\) is NP-hard, as shown by an easy reduction from the directed Hamiltonian path problem. Thus, Theorem 8 shows that it is NP-hard to obtain an additive violation for problem (1) that is substantially better than linear violation.

Proof of Theorem

8. Choose t large enough so that \(t > 2f(t|N|)\). Since \(f(n) = O\bigl (n^{1-\varepsilon }\bigr )\), this is achieved by some \(t={{\,\mathrm{poly}\,}}(|N|)\). For each \(i \in \{0, 1, 2\}\), let \(M'_i\) be the direct sum of t copies of \(M_i\). Let \(N'\) be the ground set of these matroids, which consists of t disjoint copies of N, which we label \(N_1,\ldots ,N_t\).

Clearly, the instance \((M'_0, M'_1, M'_2)\) is feasible iff the original instance is feasible. Suppose that running \(\mathcal {A}\) on the replicated instance yields a basis \(R'\) of \(M'_0\) that has the stated additive violation for the matroids \(M'_1, M'_2\). Hence, there are two sets \(Q_1,Q_2\subseteq R'\) with \(|Q_1|,|Q_2|\le f(t|N|)\), such that \(R'\setminus Q_i\) is independent in \(M'_i\) for \(i = 1, 2\). Hence, \(R'\setminus (Q_1\cup Q_2)\) is independent in both \(M'_1\) and \(M'_2\). Because \(|Q_1\cup Q_2| \le 2f(t|N|) < t\), we have by the pigeonhole principle that there is one \(j\in [t]\) such that \((Q_1\cup Q_2)\cap N_j=\emptyset \). This implies that \(R = R'\cap N_j = (R'\setminus (Q_1\cup Q_2))\cap N_j\), when interpreted on the ground set N, is independent in both \(M_1\) and \(M_2\). Moreover, the elements of R, when interpreted on the ground set N, are a basis in \(M_0\) because \(R'\) is a basis in \(M'_0\). Hence, R is the desired basis without any violations.    \(\square \)

B Omitted Proofs

Proof of Corollary

3. Extend N by adding a set F of \(r(N_0)\) additional elements with 0 weight, where r is the rank function of \(M_0\). We modify \(M_0\) to a matroid \(\widehat{M}_0\) on the ground set \(N_0\,\cup \,F\), given by the rank function . That is, \(\widehat{M}_0\) is the union of \(M_0\) with a free matroid on F, but then truncated to have rank \(r(N_0)\). Let \(P_{\widehat{\mathcal {B}}_0}\) be the matroid base polytope of \(\widehat{M}_0\). It is now easy to see that if \(x\in \mathbb R^{N_0\cup F}\) lies in \(P_{\widehat{\mathcal {B}}_0}\), then \(x\vert _{N_0}\in P_{\mathcal I_0}\). Moreover, we can extend \(x\in \mathbb R^{N_0}\) with \(x\in P_{\mathcal I_0}\) to \(x'\in \mathbb R^{N_0\cup F}\) so that \(x'\in P_{\widehat{\mathcal {B}}_0}\) and \(x'\vert _{N_0}=x\). The corollary thus follows by applying Theorem 2 to \(\widehat{M}_0, M_1, \ldots , M_k\).    \(\square \)

Proof sketch of Theorem

7. We first state the LP-relaxation (\(\mathrm{LP}_\mathrm{matkn}\)).

figure d

The algorithm leading to Theorem 7 is quite similar to Algorithm 1, and so is its analysis, and we highlight the main changes.

In the algorithm, whenever we contract an element e, for each knapsack constraint with \(e\in N_i\), we now update \(U_i\leftarrow U_i-c^i_e\) and drop e from \(N_i\). After performing all possible deletions, contractions, and refinements, we now either drop a matroid \(M'\in \mathcal M'\) in step 6 as before, or, we drop a knapsack constraint for some \(i\in \{k+1,\ldots ,k+t\}\) if \(|N_i|-x^*(N_i)\le q_i\).

To prove termination, we need only argue that we can always drop a matroid constraint, or a knapsack constraint in step 6 (modified as above). This follows from the same token-counting argument as in the proof of Lemma 6. Recall that if \(Ax=b\) is a full-rank subsystem of (\(\mathrm{LP}_\mathrm{matkn}\)) consisting of linearly independent \(x^*\)-tight constraints, then we may assume that the rows of A corresponding to the \(M_0\)-constraints form a nested family \(\mathcal {C}\). We define a token-assignment scheme, where each \(e\in N\) supplies \(x^*(e)\) tokens to the row of A corresponding to the smallest set in \(\mathcal {C}\) containing e (if one exists), and \(\bigl (1-x^*(e)\bigr )/q_{M'}\) to each row \(A_{M'}\) coming from a matroid \(M'\in \mathcal M\) in our collection whose ground set contains e. Additionally, every \(e\in N\) now also supplies \(\bigl (1-x^*(e)\bigr )/q_i\) tokens to each row of A originating from a knapsack constraint whose ground set contains e. Under this scheme, as before, given the constraint on our q-values, it follows that every \(e\in N\) supplies at most 1 token unit. Also, as before, each row of A corresponding to an \(M_0\) constraint receives at least 1 token unit. So either there is some row \(A_{M'}\) coming from a matroid in \(\mathcal M\) that receives strictly less than 1 token-unit, or there must be some row of A corresponding to a knapsack constraint that receives at most 1 token-unit; the latter case corresponds to a knapsack constraint i with \(|N_i|-x^*(N_i)\le q_i\).

The proof of parts (i)–(iii) is exactly as before. To prove part (iv), consider the i-th knapsack constraint. Note that the only place where we possibly introduce a violation in the knapsack constraint is when we drop the constraint. If \(x^*\) is the optimal solution just before we drop the constraint, then we know that \((c^i)^Tx^*\vert _{N_i}\le U_i\). (Note that \(N_i\) and \(U_i\) refer to the updated ground set and budget.) It follows that if S denotes the set of elements included from this residual ground set \(N_i\), then the additive violation in the knapsack constraint is

$$\begin{aligned} c^i(S)-U_i\le c^i(N_i)-U_i\le \bigl (\max _{e\in N_i}c^i_e\bigr )\bigl (|N_i|-x^*(N_i)\bigr ) \le q_i\cdot \bigl (\max _{e\in N_i}c^i_e\bigr ). \end{aligned}$$

   \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Linhares, A., Olver, N., Swamy, C., Zenklusen, R. (2019). Approximate Multi-matroid Intersection via Iterative Refinement. In: Lodi, A., Nagarajan, V. (eds) Integer Programming and Combinatorial Optimization. IPCO 2019. Lecture Notes in Computer Science(), vol 11480. Springer, Cham. https://doi.org/10.1007/978-3-030-17953-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17953-3_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17952-6

  • Online ISBN: 978-3-030-17953-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics