67142
67142
com
OR CLICK HERE
DOWLOAD NOW
https://ebookmeta.com/product/double-agent-celery-mi5-s-crooked-hero-
carolinda-witt-foreword-by-nigel-west/
ebookmeta.com
The Dark King 1st Edition Gina L. Maxwell
https://ebookmeta.com/product/the-dark-king-1st-edition-gina-l-
maxwell/
ebookmeta.com
https://ebookmeta.com/product/safehaven-the-giseria-chronicles-
book-2-1st-edition-xander-jade/
ebookmeta.com
Algorithmic Aspects
LNCS 13513
in Information
and Management
16th International Conference, AAIM 2022
Guangzhou, China, August 13–14, 2022
Proceedings
Lecture Notes in Computer Science 13513
Founding Editors
Gerhard Goos
Karlsruhe Institute of Technology, Karlsruhe, Germany
Juris Hartmanis
Cornell University, Ithaca, NY, USA
Algorithmic Aspects
in Information
and Management
16th International Conference, AAIM 2022
Guangzhou, China, August 13–14, 2022
Proceedings
Editors
Qiufen Ni Weili Wu
Guangdong University of Technology University of Texas at Dallas
Guangzhou, China Richardson, TX, USA
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2022
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
Reviewers
Wolfgang Bein University of Nevada, USA
Gruia Calinescu Illinois Institute of Technology, USA
Xujin Chen Academy of Mathematics and Systems Science,
Chinese Academy of Sciences, China
Sijia Dai Shenzhen Institute of Advanced Technology,
Chinese Academy of Sciences, China
Bhaskar DasGupta University of Illinois at Chicago, USA
Xingjian Ding Beijing University of Technology, Faculty of
Information Technology, China
Dingzhu Du University of Texas at Dallas, USA
Hongwei Du Harbin Institute of Technology (Shenzhen), China
Liman Du University of Chinese Academy of Sciences,
China
Guichen Gao Shenzhen Institute of Advanced Technology,
Chinese Academy of Sciences, China
Yuping Gao Lanzhou University, China
Shuyang Gu Texas A&M University - Central Texas, USA
Jianxiong Guo Beijing Normal University, Advanced Institute of
Natural Sciences, China
Xinxin Han Shenzhen Institute of Advanced Technology,
Chinese Academy of Sciences, China
Yi Hong Beijing Forestry University, China
Sun-Yuan Hsieh National Cheng Kung University, China
Liying Kang Shanghai University, China
Michael Khachay Krasovsky Institute of Mathematics and
Mechanics, Russia
Chia-Wei Lee National Taitung University, Computer Science
and Information Engineering, China
Xianyue Li Lanzhou University, China
Xiao Li University of Texas at Dallas, USA
Shengxin Liu Harbin Institute of Technology (Shenzhen), China
Chuanwen Luo Beijing Forestry University, China
Organization ix
Approximation Algorithms
Network Problems
Pilot Pattern Design with Branch and Bound in PSA-OFDM System . . . . . . . . . . 244
Shuchen Wang, Suixiang Gao, and Wenguo Yang
Graph Theory
1 Introduction
2 Related Work
Non-monotone DR-submodular Maximization is closely related to non-monotone
submodular set function maximization because the algorithm for the latter prob-
lem can be applied to the former problem directly. The non-monotone submodu-
lar maximization is also called Unconstrained Submodular Maximization (USM).
A Binary Search Double Greedy Algorithm 5
USM has various applications, such as marketing strategies over social networks
[18], Max-Cut [19], and maximum facility location [20]. USM problem has been
studied extensively [21–23]. Buchbinder gives a tight linear time randomized
(1/2)-approximation for the problem [5].
The topic of functions over integer lattice optimization has attracted much
attention recently. Monotone submodular functions over integer lattice with car-
dinality constraint are addressed in [10,12,14]. Sahin et al. study lattice sub-
modular functions subject to a discrete (integer) polymatroid constraint [13].
Zhang et al. study the problem of maximizing the sum of a monotone non-
negative DR-submodular function and a supermodular function on the integer
lattice subject to a cardinality constraint [11]. The non-submodular functions on
the integer lattice are addressed in [16]. Nong et al. focus on maximizing a non-
monotone weak-submodular function on a bounded integer lattice [17]. For the
problem addressed in this paper, non-monotone DR-submodular function maxi-
1
mization, Soma et al. design a 2+ -approximation algorithm with a running time
n 2
of O( log B) [6].
In the meantime, the discrete domains of submodular functions over inte-
ger lattice are further extended to continuous domains, Hassani et al. study
stochastic projected gradient methods for maximizing continuous submodular
functions with convex constraints [15]. In [7,8], the authors consider maximizing
a continuous and nonnegative submodular function over a hypercube.
3 Preliminaries
We say that a set function g : f : 2E → R+ is submodular if it satisfies a natural
“diminishing returns” property: the marginal gain from adding an element to a
set X is at least as high as the marginal gain from adding the same element to
a superset of X. Formally, for every set X, Y such that X ⊆ Y ⊆ E and every
e ∈ E \ Y , it follows that
entries equal to either 0 or 1 can be seen as a subset including the elements that
are equal to 1 while excluding the elements that are equal to 0, in that case,
x ∧ y and x ∧ y transform to set intersection and set union of the subsets that
x and y represent respectively.
The submodular function over integer lattice does not have the diminishing
return property. To capture such property in real-world problems, a stronger
version of submodularity has been introduced, which is called DR-submodular
[4]. DR submodular function on a bounded integer lattice satisfies the following
diminish return property:
where χe denotes a unit vector, i.e. χe ∈ ZE is the vector with χe (e) = 1 and
χe (a) = 0 for every a = e.
The problem we consider is maximizing (non-monotone) DR-submodular
functions. Formally, we study the optimization problem
max f (x)
(1)
subject to 0 ≤ x ≤ B,
4 Algorithm
In this section, we present the algorithm for non-monotone DR-submodular func-
tion maximization. The main idea is inspired by the double greedy algorithm for
the unconstrained submodular maximization (USM) [5] on set functions. The
algorithm can be extended to accommodate DR-submodular function over inte-
ger lattice [6], because DR-submodular function can be treated as submodular set
function on each coordinate. We investigate some interesting properties for DR-
submodular functions to further speed up the algorithm. In the rest of the paper
some notations will be used. We define two new functions φ(b) := f (χe |x + bχe ),
ψ(b) := f (−χe |y − bχe ), where b ∈ Z+ . Both functions are non-increasing func-
tions of b because the function f is DR-submodular.
The algorithm starts with two vectors, x = 0 and y = c. For each coordinate
e ∈ E it iteratively either increase x(e) or decrease y(e) by σ, which depends on
the marginal gain by adding σ to x(e) and the marginal gain by removing σ to
y(e). This procedure continues until x(e) = y(e). Then it moves on to work on
A Binary Search Double Greedy Algorithm 7
1: x ← 0, y ← c;
2: for e ∈ E do
3: Find arg minb φ(b) such that φ(b) < 0 by binary search.
4: u ← x(e) + arg minb φ(b) − 1.
5: Find arg minb ψ(b) such that ψ(b) < 0 by binary search.
6: v ← y(e) − arg minb ψ(b) + 1.
7: while x(e) < y(e) do
8: σ ← max( y (e)−x
2
(e)
, 1)
9: α ← f (σχe |x) and β ← f (−σχe |y)
10: if β ≤ 0 then
11: x(e) ← x(e) + σ
12: else if α ≤ 0 then
13: y(e) ← y(e) − σ
14: else
15: Randomly update x(e) ← x(e) + σ or y(e) ← y(e) − σ; the former case
α β
occurs with probability α+β , the later case with the probability α+β .
16: end if
17: end while
18: if x(e) ≥ u then
19: x(e) ← u, y(e) ← u
20: end if
21: if y(e) ≤ v then
22: y(e) ← v, x(e) ← v
23: end if
24: end for
25: return x
Proof.
f (x + χe ) − f (x) ≥ f (y + χe ) − f (y)
f (x + 2χe ) − f (x + χe ) ≥ f (y + 2χe ) − f (y + χe )
..
.
f (x + kχe ) − f (x + (k − 1)χe ) ≥ f (y + kχe ) − f (y + (k − 1)χe )
Proof.
Since the values of the terms in the above equations are non-increasing from
left to right, f (χe |x + (q − 1)χe ) ≥ 0, so all terms are greater than or equal to
0. And f (qχe |x) has more terms, so the lemma holds.
Proof. Notice that it suffices to prove the inequality conditioned on any event of
the form xei−1 = sei−1 , where sei−1 ∈ ZE+ , (sei−1 (e) ≤ σ1 +· · ·+σi−1 ), for which the
probability that xei−1 = sei−1 is nonzero. Hence, fix such an event corresponding
to an integer vector sei−1 . The rest of the proof implicitly assumes everything
is conditioned on this event. Since the analysis is same for every coordinate,
we omit the superscript e in xei , yie , sei and optei in the following proof. After an
iteration i on coordinate e, denote by δi the distance between xi (e) and yi (e),
i
which can be calculate as δi = yi (e) − xi (e) = B − k=1 σk . The parameter σi
B− i−1 σ
can be obtained iteratively as σ1 = B2 , σi = 2
k=1 k
= δ2i . Due to the
conditioning, the following random variables become constants:
We prove it considering the relationship among xi−1 (e), xi (e) and opti (e).
Case 1.1: xi (e) = si−1 (e) + σi ≤ opt(e).
This condition implies xi−1 (e) ≤ opt(e). Since y i = y i−1 , the left-hand side
of the last inequality is 0, which is definitely not greater than the nonnegative
αi
2 .
10 S. Gu et al.
Case 1.3: si−1 (e) ≤ opt(e) and xi (e) = si−1 (e) + σi > opt(e).
Then we have
And
f ((opt ∨ xi−1 ) ∧ y i−1 ) − f ((opt ∨ (xi−1 + σi χe )) ∧ y i )
= f (−δχe |(opt ∨ (xi−1 + σi χe )) ∧ y i ) (4)
= f (−δχe |opti ).
xi ≤ opti ≤ y i
The above sum is telescopic. We define that the algorithm executes on the vector
coordinates ordered by e1 , . . . , en . Collapse the inequality, we get
1
f (opte01 ) − f (opteθne ) ≤ E[f (xeθne ) − f (xe01 ) + f (y eθne ) − f (y e01 )]
2 n n
(8)
1
≤ E[f (xeθne ) + f (y eθne )]
2 n n
Recalling the definitions of optei , opte01 = opt, opteθne = xeθne = y eθne is the
n n
output solution, thus E[f (xeθne )] = E[f (y eθne )] ≥ f (opt)/2. It is clear that the
n n
algorithm makes O(n log B) oracle calls since for each coordinate e ∈ E the
number of oracle calls is at most log B and there are n = |E| coordinates.
5 Conclusions
In this paper, we propose a binary search double greedy algorithm for non-
monotone DR-submodular function maximization over bounded integer lattice.
Our algorithm improves the approximation ratio and significantly reduces the
time complexity.
One interesting direction for our future work is to explore the problems
in social networks that fall into non-monotone DR-submodular maximization,
exploit our proposed algorithm and test with real datasets. Another direction
we are interested in is maximizing DR-submodular function with some types
of constraints such as cardinality constraint, matroid constraint and knapsack
constraint.
References
1. Alon, N., Gamzu, I., Tennenholtz, M.: Optimizing budget allocation among chan-
nels and influencers. In: Proceedings of the 21st International Conference on World
Wide Web, pp. 381–388 (2012)
2. Gottschalk, C., Peis, B.: Submodular function maximization on the bounded inte-
ger lattice. In: Sanità, L., Skutella, M. (eds.) WAOA 2015. LNCS, vol. 9499, pp.
133–144. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28684-6_12
A Binary Search Double Greedy Algorithm 13
21. Gharan, S.O., Vondrák, J.: Submodular maximization by simulated annealing. In:
Proceedings of the 22nd Annual ACM-SIAM Symposium on Discrete Algorithms,
pp. 1098–1116. SIAM (2011)
22. Buchbinder, N., Feldman, M.: Deterministic algorithms for submodular maximiza-
tion problems. ACM Trans. Algorithms (TALG) 14(3), 1–20 (2018)
23. Pan, X., Jegelka, S., Gonzalez, J.E., Bradley, J.K., Jordan, M.I.: Parallel double
greedy submodular maximization. In: Advances in Neural Information Processing
Systems, vol. 27 (2014)
An Approximation Algorithm
for the Clustered Path Travelling
Salesman Problem
1 Introduction
Supported by the NSF of China (No. 11971146), the NSF of Hebei Province of China
(No. A2019205089, No. A2019205092), Overseas Expertise Introduction Program of
Hebei Auspices (25305008) and the Graduate Innovation Grant Program of Hebei
Normal University (No. CXZZSS2022052).
c The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Q. Ni and W. Wu (Eds.): AAIM 2022, LNCS 13513, pp. 15–27, 2022.
https://doi.org/10.1007/978-3-031-16081-3_2
16 J. Zhang et al.
2 Preliminaries
In this section, we introduce some terminology, concepts and related results.
A graph G is a pair (V, E) where V is a set of objects called vertices and
E is a set of edges. Each edge is a pair {v, w} of vertices v, w ∈ V . If an edge
{v, w} is associated with a direction, a directed edge (arc) is obtained and we
denote it by (v, w) if the direction is from v to w or (w, v) otherwise. Vertices v
and w are called the tail and the head of the arc (v, w), respectively. A directed
graph has a set of vertices and a set of directed edges. In a directed graph, the
outdegree (indegree) of a vertex is the number of edges directed out of (into) the
vertex. A mixed graph in which both directed and undirected edges may exist.
A mixed multigraph is a graph, possibly with parallel edges, each of which is
either undirected or directed.
A walk in a graph G from vertex v1 to vl is a sequence
(v1 , {v1 , v2 }, v2 , {v2 , v3 }, v3 , · · · , vl−1 , {vl−1 , vl }, vl ), in which all vi s are vertices
and {vi−1 , vi } ∈ E(G) for i = 2, 3, · · · , l. We also call v1 , vl the start vertex
and the end vertex of the walk. A path is a walk with no repeated vertices.
A trail is a walk with no repeated edges. An Eulerian trail is a walk passing
through every edge of G exactly once. If this walk is closed (starts and ends
at the same vertex), it is called an Eulerian tour. A Hamiltonian path/cycle in
G is a path/cycle visiting every vertex of G exactly once. A directed walk in
a directed graph is a sequence (v1 , (v1 , v2 ), v2 , (v2 , v3 ), v3 , · · · , vl−1 , (vl−1 , vl ), vl ).
A directed path is a directed walk with no repeated vertices. A directed trail
is a directed walk with no repeated arcs. A directed Eulerian trail is a directed
walk passing through every arc of G exactly once. Similarly, we can define that
on the mixed multigraph.
In the stacker crane problem (SCP), we are given a mixed multigraph G =
(V , E , D), where V = {si , ti | i ∈ [k]}, (V , E ) is an undirected complete
graph with an edge weight function satisfying the triangle inequality, and D =
{(si , ti ) | i ∈ [k]}. Here [k] is the notation for the set {1, 2, · · · , k}. The objective
is to find a minimum Hamiltonian cycle that traverses each arc (si , ti ) in the
specified direction from si to ti , i ∈ [k], where we identify the weight of the arc
(si , ti ) with that of the corresponding edge {si , ti }.
If the objective “Hamiltonian cycle” substitutes for “Hamiltonian path” in
the definition of the SCP, we get the path version of the stacker crane problem,
and we call it the path stacker crane problem (PSCP).
The following results are important for the discussion in Sects. 3 and 4.
Theorem 2.1 [7]. A connected multigraph has an Eulerian trail if and only if
it has either 0 or 2 vertices of odd degree.
Theorem 2.2. A connected directed multigraph has an Eulerian trail if and only
if every vertex has the same indegree and outdegree or the indegree of one vertex
is equal to the outdegree of this vertex plus one, the outdegree of another vertex
is equal to the indegree of this vertex plus one, and the outdegree of other vertices
is equal to the indegree of them.
Theorem 2.3 [17]. For the PTSP with u1 and u2 being the two given endpoints,
there exists a polynomial time approximation algorithm that finds Hamiltonian
paths S1 and S2 from u1 to u2 such that w(S1 ) ≤ 2OP T − w{u1 , u2 }, w(S2 ) ≤
3
2 OP T , where OP T denotes the weight of an optimal solution of the problem.
In this section, we give two polynomial-time algorithms for the PSCP which will
be used when we design the algorithm for the CPTSP in next section.
Recall that in the PSCP, we are given a mixed multigraph G = (V , E , D),
where V = {si , ti | i ∈ [k]}, (V , E ) is an undirected complete graph with an
edge weight function ω satisfying the triangle inequality, and D = {(si , ti ) | i ∈
[k]}. The objective is to find a minimum Hamiltonian path from s1 to tk that
traverses each arc (si , ti ) in the specified direction from si to ti , i ∈ [k]. The first
algorithm for the PSCP is as follows.
Algorithm 1.
Step 1: Find a minimum bipartite matching between the head set T =
{t1 , t2 , · · · , tk−1 } and the tail set S = {s2 , s3 , · · · , sk }.
Step 2: Initialize E1 to be empty. For each edge included in the above match-
ing, associate a direction with it, going from T to S, and insert it into E1 . (This
results in m ≥ 1 disjoint connected components, each of which consists of edges
with the associated directions in the matching and arcs in D, and we denote
these m disjoint connected components by Ri , i ∈ [m].)
Step 3: Condense each Ri into a single node ni . Define
d{ni , nj } = min{ω{u, v} | u ∈ Ri , v ∈ Rj }
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.