The Minimum Vulnerability Problem

We revisit the problem of finding k paths with a minimum number of shared edges between two vertices of a graph. An edge is called shared if it is used in more than one of the k paths. We provide a [k/2]-approximation algorithm for this problem, improving the best previous approximation factor of k − 1. We also provide the first approximation algorithm for the problem with a sublinear approximation factor of O(n 3/4), where n is the number of vertices in the input graph. For sparse graphs, such as bounded-degree and planar graphs, we show that the approximation factor of our algorithm can be improved to \(O(\sqrt{n})\). While the problem is NP-hard, and even hard to approximate to within an O(logn) factor, we show that the problem is polynomially solvable when k is a constant. This settles an open problem posed by Omran et al. regarding the complexity of the problem for small values of k. We present most of our results in a more general form where each edge of the graph has a sharing cost and a sharing capacity, and there is vulnerability parameter r that determines the number of times an edge can be used among different paths before it is counted as a shared/vulnerable edge.

[1]  Guy Kortsarz,et al.  On network design problems: fixed cost flows and the covering steiner problem , 2002, TALG.

[2]  Andrew V. Goldberg,et al.  Beyond the flow decomposition barrier , 1998, JACM.

[3]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[4]  Aravind Srinivasan,et al.  Approximation algorithms for the covering Steiner problem , 2002, Random Struct. Algorithms.

[5]  Sven O. Krumke,et al.  Flow Improvement and Network Flows with Fixed Costs , 1999 .

[6]  Matthew Franklin,et al.  Complexity and security of distributed protocols , 1994 .

[7]  Mei Yang,et al.  Dual-Homing Based Scalable Partia Multicast Protection , 2006, IEEE Transactions on Computers.

[8]  Mei Yang,et al.  Minimum-Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network , 2010, IEEE/ACM Transactions on Networking.

[9]  Robert D. Carr,et al.  Strengthening integrality gaps for capacitated network design and covering problems , 2000, SODA '00.

[10]  R. Ravi,et al.  A polylogarithmic approximation algorithm for the group Steiner tree problem , 2000, SODA '98.

[11]  Mei Yang,et al.  Minimum cost paths subject to minimum vulnerability for reliable communications , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).

[12]  Hamid Zarrabi-Zadeh,et al.  Finding paths with minimum shared edges , 2011, J. Comb. Optim..

[13]  David P. Williamson,et al.  The Design of Approximation Algorithms , 2011 .