Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

On the max-flow min-cut ratio for directed multicommodity flows

Published: 07 March 2006 Publication History

Abstract

We present a pure combinatorial problem whose solution determines max-flow min-cut ratio for directed multicommodity flows. In addition, this combinatorial problem has applications in improving the approximation factor of the greedy algorithm for the maximum edge disjoint path problem. More precisely, our upper bound improves the approximation factor for this problem to O(n3/4).

References

[1]
[1] C. Chekuri, S. Khanna, Edge disjoint paths revisited, in: Proc. Fourteenth Annu. ACM-SIAM Symp. Discrete Algorithms, 2003, pp. 628-637.
[2]
[2] J. Cheriyan, H.J. Karloff, Y. Rabani, Approximating directed multicuts, in: Proc. 42th Annu. Symp. Foundations of Computer Science, 2001, pp. 348-356.
[3]
[3] A. Gupta, Improved results for directed multicut, in: Proc. Fourteenth Annu. ACM-SIAM Symp. Discrete Algorithms, 2003, pp. 454-455.
[4]
[4] V. Guruswami, S. Khanna, R. Rajaraman, B. Shepherd, M. Yannakakis, Near-optimal hardness results and approximation algorithms for edge-disjoint paths and related problems, J. Comput. System Sci. 67 (2003) 473-496.
[5]
[5] T. Leighton, S. Rao, Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms, J. ACM 46 (1999) 787-832.
[6]
[6] M. Saks, A. Samorodnitsky, L. Zosin, A lower bound on the integrality gap for minimum multicut in directed networks, Combinatorica 24 (3) (2004) 525-530.
[7]
[7] D.B. Shmoys, Cut problems and their application to divide-and-conquer, in: Approximation Algorithms for NP-hard Problem, PWS Publishing Company, 1997, pp. 192-235.
[8]
[8] K. Varadarajan, G. Venkataraman, Graph decomposition and a greedy algorithm for edge-disjoint paths, in: Proc. Fifteenth Annu. ACM-SIAM Symp. Discrete Algorithms, 2004, pp. 379-380.

Cited By

View all
  • (2016)Formal proof of security algorithms based on reachability reductionProceedings of the 8th International Conference on Management of Digital EcoSystems10.1145/3012071.3012085(67-72)Online publication date: 1-Nov-2016
  • (2015)Efficient algorithms for the maximum concurrent flow problemNetworks10.1002/net.2157265:1(56-67)Online publication date: 1-Jan-2015
  • (2010)QoS analysis of weighted multi-state probabilistic networks via decision diagramsProceedings of the 29th international conference on Computer safety, reliability, and security10.5555/1886301.1886306(41-54)Online publication date: 14-Sep-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Theoretical Computer Science
Theoretical Computer Science  Volume 352, Issue 1
7 March 2006
348 pages

Publisher

Elsevier Science Publishers Ltd.

United Kingdom

Publication History

Published: 07 March 2006

Author Tags

  1. approximation algorithm
  2. directed graph
  3. multicommodity flow and multicut

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Formal proof of security algorithms based on reachability reductionProceedings of the 8th International Conference on Management of Digital EcoSystems10.1145/3012071.3012085(67-72)Online publication date: 1-Nov-2016
  • (2015)Efficient algorithms for the maximum concurrent flow problemNetworks10.1002/net.2157265:1(56-67)Online publication date: 1-Jan-2015
  • (2010)QoS analysis of weighted multi-state probabilistic networks via decision diagramsProceedings of the 29th international conference on Computer safety, reliability, and security10.5555/1886301.1886306(41-54)Online publication date: 14-Sep-2010
  • (2007)Approximation algorithms and hardness results for cycle packing problemsACM Transactions on Algorithms10.1145/1290672.12906853:4(48-es)Online publication date: 1-Nov-2007

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media