Abstract
Deterministic protocols are well-known tools to obtain extended formulations, with many applications to polytopes arising in combinatorial optimization. Although constructive, those tools are not output-efficient, since the time needed to produce the extended formulation also depends on the number of rows of the slack matrix (hence, of the exact description in the original space). We give general sufficient conditions under which those tools can be implemented as to be output-efficient, showing applications to e.g. Yannakakis’ extended formulation for the stable set polytope of perfect graphs, for which, to the best of our knowledge, an efficient construction was previously not known. For specific classes of polytopes, we give also a direct, efficient construction of those extended formulations. Finally, we deal with extended formulations coming from certain unambiguous non-deterministic protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aprile, M.: On some problems related to 2-level polytopes. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (2018)
Aprile, M., Faenza, Y., Fiorini, S., Huynh, T., Macchia, M.: Extension complexity of stable set polytopes of bipartite graphs. In: Bodlaender, H.L., Woeginger, G.J. (eds.) WG 2017. LNCS, vol. 10520, pp. 75–87. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68705-6_6
Balas, E.: Disjunctive programming. Ann. Discrete Math. 5, 3–51 (1979)
Bazzi, A., Fiorini, S., Huang, S., Svensson, O.: Small extended formulation for knapsack cover inequalities from monotone circuits. In: Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 2326–2341. SIAM (2017)
Bazzi, A., Fiorini, S., Pokutta, S., Svensson, O.: No small linear program approximates vertex cover within a factor \(2-\epsilon \). Math. Oper. Res. 44(1), 147–172 (2018)
Chan, S.O., Lee, J.R., Raghavendra, P., Steurer, D.: Approximate constraint satisfaction requires large LP relaxations. J. ACM (JACM) 63(4), 34 (2016)
Chudnovsky, M., Trotignon, N., Trunck, T., Vušković, K.: Coloring perfect graphs with no balanced skew-partitions. J. Comb. Theory Ser. B 115, 26–65 (2015)
Chvátal, V.: On certain polytopes associated with graphs. J. Comb. Theory Ser. B 18, 138–154 (1975)
Conforti, M., Cornuéjols, G., Zambelli, G.: Extended formulations in combinatorial optimization. 4OR 8(1), 1–48 (2010)
Faenza, Y., Fiorini, S., Grappe, R., Tiwary, H.R.: Extended formulations, nonnegative factorizations, and randomized communication protocols. Math. Program. 153(1), 75–94 (2015)
Fiorini, S., Huynh, T., Weltge, S.: Strengthening convex relaxations of 0/1-sets using Boolean formulas. arXiv preprint arXiv:1711.01358 (2017)
Fiorini, S., Massar, S., Pokutta, S., Tiwary, H.R., De Wolf, R.: Linear vs. semidefinite extended formulations: exponential separation and strong lower bounds. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, pp. 95–106. ACM (2012)
Giandomenico, M., Letchford, A.N., Rossi, F., Smriglio, S.: Ellipsoidal relaxations of the stable set problem: theory and algorithms. SIAM J. Optim. 25(3), 1944–1963 (2015)
Göös, M.: Lower bounds for clique vs. independent set. In: 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pp. 1066–1076. IEEE (2015)
Göös, M., Jain, R., Watson, T.: Extension complexity of independent set polytopes. SIAM J. Optim. 47(1), 241–269 (2018)
Grötschel, M., Lovász, L., Schrijver, A.: Polynomial algorithms for perfect graphs. N.-Holl. Math. Stud. 88, 325–356 (1984)
Håstad, J.: Some optimal inapproximability results. J. ACM (JACM) 48(4), 798–859 (2001)
Kaibel, V.: Extended formulations in combinatorial optimization. OPTIMA 85, 2–7 (2011)
Kaibel, V., Pashkovich, K.: Constructing extended formulations from reflection relations. In: Jünger, M., Reinelt, G. (eds.) Facets of Combinatorial Optimization, pp. 77–100. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38189-8_4
Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, Cambridge (1996)
Lagoutte, A.: Personal communication, Cargese, Corsica, 18 October 2018
Lee, J., Leung, J., Margot, F.: Min-up/min-down polytopes. Discrete Optim. 1(1), 77–85 (2004)
Lovász, L.: On the Shannon capacity of a graph. IEEE Trans. Inf. Theory 25(1), 1–7 (1979)
Lovász, L.: Stable sets and polynomials. Discrete Math. 124(1–3), 137–153 (1994)
Martin, R.K.: Using separation algorithms to generate mixed integer model reformulations. Oper. Res. Lett. 10(3), 119–128 (1991)
Pashkovich, K.: Extended formulations for combinatorial polytopes. Ph.D. thesis, Otto-von-Guericke-Universität Magdeburg (2012)
RothvoĂź, T.: The matching polytope has exponential extension complexity. J. ACM (JACM) 64(6), 41 (2017)
Schrijver, A.: Combinatorial Optimization: Polyhedra and Efficiency, vol. 24. Springer, Heidelberg (2002)
Weltge, S.: Sizes of linear descriptions in combinatorial optimization. Ph.D. thesis, Otto-von-Guericke-Universität Magdeburg, Fakultät für Mathematik (2015)
Yannakakis, M.: Expressing combinatorial optimization problems by linear programs. J. Comput. Syst. Sci. 43, 441–466 (1991)
Acknowledgements
We thank Mihalis Yannakakis for inspiring discussions and Samuel Fiorini for useful comments on [1], where many of the results presented here appeared. Manuel Aprile would also like to thank Aurélie Lagoutte and Nicolas Bousquet for useful discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
Application of Theorem 5 to (STAB(G), QSTAB(G)). We now sketch how to apply Theorem 5 to the protocol from Theorem 3 in order to obtain an extended formulation for (STAB(G), QSTAB(G)) in time \(n^{O(\log (n))}\).
For a detailed description of the protocol from [30] and for full details of the proof, we refer to the journal version. Here we recall that, at the beginning of the protocol, Alice is given a clique C of G as input and Bob a stable set S, and they want to compute the entry of the slack matrix of \(\mathrm {STAB}(G)\) corresponding to C, S, i.e. to establish whether C, S intersect or not. To do that, they exchange vertices of their respective sets. The number of vertices exchanged in total is at most \(\lceil \log _2 n\rceil \). Hence, the protocol partitions the slack matrix of (STAB(G), QSTAB(G)) in a collection \(\mathcal {R}\) of \(n^{O(\log n)}\) monochromatic rectangles. Each rectangle \(R\in \mathcal {R}\) is univocally identified by the list of vertices sent by Alice and by Bob during the execution of the protocol, which we denote by \(C_R\) and \(S_R\) respectively. Notice that \(|C_R|+|S_R|\le \lceil \log _2 n\rceil \). For any clique C (resp. stable set) whose corresponding row (resp. column) is in R, we write \(C\in R\) (resp. \(S \in R\)). If \(C \in R\), then \(C_R\subseteq C\) (in particular, \(C_R\) is a clique), and similarly \(S \in R\) implies \(S_R \subseteq S\) (and \(S_R\) is a stable set). We let \(P_R\) be the convex hull of stable sets \(S \in R\) and \(Q_R\) the set of clique inequalities corresponding to cliques \(C \in R\), together with the unit cube constraints.
To apply Theorem 5 we need to have a description of \(\tau ,\ell \) and the extended formulations for \((P_R,Q_R)\), for each \(R\in \mathcal {R}\). These are computed as follows.
-
1.
\(\tau \), \(\ell \), and \((C_R,S_R)\) for all \(R \in \mathcal{R}\). Enumerate all cliques and stable sets of G of combined size at most \(\lceil \log _2 n\rceil \) and run the protocol on each of those input pairs. Each of those inputs gives a path in the tree (with the corresponding \(\ell \)), terminating in a leaf v, corresponding to a rectangle R. \(\tau \) is given by the union of those paths, hence it has size \(n^{O(\log n)}\). Moreover, the inclusion-wise minimal input pairs corresponding to the same rectangle R give \(C_R,S_R\).
-
2.
Extended formulations of \((P_R,Q_R)\), for each \(R\in \mathcal {R}\). From the discussion in Sect. 2, it follows that an extended formulation of \((P_R,Q_R)\) is given by
$$\begin{aligned} {T_R:=}\{x\in \mathbb {R}^d, y_R\in \mathbb {R}: x(C)+y_R= 1 \;\forall \; C\in R, \ y_R\ge 0, 0\le x \le 1 \}.\end{aligned}$$(3)We now claim that the equations in the description above, which can be exponentially many, are implied by a much smaller system (of size at most n):
$$\begin{aligned}{T_R=}\{x\in \mathbb {R}^d, y_R\in \mathbb {R}: x(C_R)+y_R= 1\\ x(C_R+v)+y_R=1&\;\forall \; v\in V\setminus C_R: C_R+v\in R\\ y_R\ge 0, \; 0\le x \le 1 \}. \end{aligned}$$Let \(C \in R\). We only need to show that \(x(C)+y_R\) is a linear combination of the left-hand sides of the equations above. For any \(v\in C\setminus C_R\), one can show that \(C_R+v\in R\). Hence we obtain, as required,
$$ \sum _{v\in C\setminus C_R} (x(C_R+v)+y_R)- (|C\setminus C_R|-1) (x(C_R)+y_R) = x(C) + y_R.$$
Proof of Theorem 12 (Sketch). The decomposition scheme outlined in the proof of Theorem 11 can be associated to a decomposition tree \(\tau =\tau (G)\) on \(n^{O(\log n)}\) nodes as follows: at each step, either decompose the current graph H using Lemma 9 (in which case each children is one of the \(H_i\)’s), or take the complement (in which case there is a single child, associated to \(\bar{H}\)). We will abuse notation and identify a node of the decomposition tree and the corresponding subgraph. Note, in particular, that this decomposition tree does not depend on the fact that G is perfect, hence it can be applied here as well.
We can assume that, for each leaf L of \(\tau \), we are given an extended formulation \(T_L\) of \((\mathrm {STAB}(L),\mathrm {QSTAB}(L))\). Consider the extended formulation, which we call \(\eta (G)\), obtained by traversing \(\tau \) bottom-up and applying the following:
-
1.
if a non-leaf node H of \(\tau \) has a single child \(\bar{H}\), then define \(\eta (H)\) to be equal to the extended formulation of \(\{x\in \mathbb {R}^{V(H)}: x^Ty\le 1 \;\forall \; y \in \eta (\bar{H})\}\), obtained by applying Lemma 7.
-
2.
otherwise if H has children \(H_0,\dots ,H_k\), then we define \(\eta (H)\) to be the extended formulation obtained from \(\eta (H_0),\dots , \eta (H_k)\) using Observation 10.
We only need to prove that \(\eta (G)\) is an extended formulation for \((\mathrm {STAB}(G),\mathrm {QSTAB}(G))\), as the efficiency aspects have been discussed in Theorems 5 and 11. We proceed by induction on the height of \(\tau \), in particular we prove that for a node H of \(\tau \), \(\eta (H)\) is an extended formulation of \((\mathrm {STAB}(H),\mathrm {QSTAB}(H))\), assuming this is true for the children of H. If H is a leaf of \(\tau \), then there is nothing to prove. Otherwise, we need to analyze two cases:
-
1.
H has a single child, labelled \(\bar{H}\). Assume that \(\mathrm {STAB}(\bar{H})\subseteq \pi (\eta (\bar{H})) \subseteq \mathrm {QSTAB}(\bar{H})\), where \(\pi \) is the projection on the appropriate space. Let S be a stable set in H, and \(\chi ^S\) the corresponding incidence vector. For any \(y\in \pi (\eta (\bar{H})) \subseteq \mathrm {QSTAB}(\bar{H})\), we have \(y^T\chi ^S = y(S)\le 1\) as S is a clique in \(\bar{H}\), hence since \(\eta (H)\) (hence \(\pi (\eta (H))\)) is clearly convex it follows that \(\mathrm {STAB}(H)\subseteq \pi (\eta (H))\). Now, for a clique C of H and \(x\in \pi (\eta (H))\), one has \(\chi ^C\in \pi (\eta (\bar{H}))\) hence \(x(C)=x^T\chi ^C\le 1\), proving \(\pi (\eta (H))\subseteq \mathrm {QSTAB}(H)\).
-
2.
H has children \(H_0,\dots ,H_k\). Assume that for \(i=0,\dots ,k\), \(\mathrm {STAB}(H_i)\subseteq \pi (\eta (H_i))\subseteq \mathrm {QSTAB}(H_i)\) for \(\pi \) as above. Let \(\chi ^S\) be the characteristic vector of a stable set S of H, for every \(i=0,\dots ,k\) \(S\cap V(H_i)\) is a stable set in \(H_i\), hence \(\chi ^{S}\in \pi (\eta (H_i))\times \mathbb {R}^{V(H)\setminus V(H_i)}\), and by convexity we conclude again that \(\mathrm {STAB}(H)\subseteq \pi (\eta (H))\). Finally, let \(x\in \pi (\eta (H))\), and let C be a clique of H. It follows from the way we decompose H, that C is contained in \(H_i\) for some i: indeed, if \(\{v_1,\dots ,v_k\}\cap C\ne \emptyset \), let i be the minimum such that \(v_i\in C\), then \(C\subseteq N^+(V_i)\setminus \{v_1,\dots ,v_{i-1}\}=V_i\) by definition; if \(\{v_1,\dots ,v_k\}\cap C= \emptyset \), then \(C\subseteq V_0\). By induction hypothesis, \(\pi (\eta (H_i))\subseteq \mathrm {QSTAB}(H_i)\). But then \(x(C)\le 1\), and since this holds for all the cliques of H, we have \(\pi (\eta (H))\subseteq \mathrm {QSTAB}(H)\).   \(\square \)
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Aprile, M., Faenza, Y. (2019). Extended Formulations from Communication Protocols in Output-Efficient Time. In: Lodi, A., Nagarajan, V. (eds) Integer Programming and Combinatorial Optimization. IPCO 2019. Lecture Notes in Computer Science(), vol 11480. Springer, Cham. https://doi.org/10.1007/978-3-030-17953-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-17953-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17952-6
Online ISBN: 978-3-030-17953-3
eBook Packages: Computer ScienceComputer Science (R0)