Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

The Worst and the Most Probable Performance of a Class of Set-Covering Algorithms

Published: 01 May 1983 Publication History

Abstract

Let $I = (1, \cdots,m),\, J = (1, \cdots,n)$ and $\Delta = (D_i )_{i \in I} $ be a family of subsets $D_i $ of J. A class of algorithms which find a minimum number of $D_i $’s covering $D = \cup _{i \in I} D_i $ is studied. A measure $T(\Delta )$ of the computation time is shown to grow exponentially with the size of the problem in the worst case, namely $\max _\Delta T(\Delta ) > (4^{1/5} )^{\min (m,n')} > 1.319^{\min (m,n')},\, n' = |D|$. For $m = n'$ and a large subclass of algorithms, an estimate $\max _\Delta T(\Delta ) < (3/4^{1/3} )^m < (1.890)^m $ is established, so they always perform better than the obvious trivial procedure. Let, on the other hand, be chosen at random. Under condition in $\ln n/\ln m \to \gamma \in (0,\infty )$, it is proven that \[ P\left(m^{c_1 (\gamma )\ln m} \leqq T(\Delta ) \leqq m^{c_2 (\gamma )\ln m} \right) \to 1. \] Hence, asymptotically almost certainly, the computation time is of a considerably lower order than that in Hence, asymptotically almost certainly, the computation time is of a considerably lower order than that in the worst case, but it is still far from being polynomially bounded.

References

[1]
David Avis, A note on some computationally difficult set covering problems, Math. Programming, 18 (1980), 138–145
[2]
V. Chvátal, Determining the stability number of a graph, SIAM J. Comput., 6 (1977), 643–662
[3]
Vašek Chvátal, Hard knapsack problems, Oper. Res., 28 (1980), 1402–1411
[4]
Jack Edmonds, Paths, trees, and flowers, Canad. J. Math., 17 (1965), 449–467
[5]
Shimon Even, Algorithmic combinatorics, The Macmillan Co., New York, 1973xii+260
[6]
R. Fulkerson, G. Nemhauser, L. Trotter, Two computationally difficult set covering problems that arise in computing the 1-width of incidence matrices of Steiner triple systems, Math. Programming Stud., 2 (1974), 72–81
[7]
Michael R. Garey, David S. Johnson, Computers and intractability, W. H. Freeman and Co., San Francisco, Calif., 1979x+338, A Guide to the Theory of NP-Completeness
[8]
Richard M. Karp, R. E. Miller, J. W. Thatcher, Reducibility among combinatorial problemsComplexity of computer computations (Proc. Sympos., IBM Thomas J. Watson Res. Center, Yorktown Heights, N.Y., 1972), Plenum, New York, 1972, 85–103
[9]
Eugene L. Lawler, Combinatorial optimization: networks and matroids, Holt, Rinehart and Winston, New York, 1976x+374
[10]
Vladimir Lifschitz, The efficiency of an algorithm of integer programming: a probabilistic analysis, Proc. Amer. Math. Soc., 79 (1980), 72–76
[11]
V. Lifschitz, B. Pittel, The number of increasing subsequences of the random permutation, J. Combin. Theory Ser. A, 31 (1981), 1–20
[12]
V. Lifschitz, L. Pesotchinsky, The analysis of a partition algorithm, J. Assoc. Comp. Mach., to appear
[13]
Colin McDiarmid, Determining the chromatic number of a graph, SIAM J. Comput., 8 (1979), 1–14
[14]
J. W. Moon, L. Moser, On cliques in graphs, Israel J. Math., 3 (1965), 23–28
[15]
Robert Z. Norman, Michael O. Rabin, An algorithm for a minimum cover of a graph, Proc. Amer. Math. Soc., 10 (1959), 315–319
[16]
J. M. Plotkin, J. W. Rosenthal, On the expected number of branches in analytic tableaux analysis in propositional calculus, Notices Amer, Math. Soc., 25 (1978), A-437
[17]
Robert Endre Tarjan, Anthony E. Trojanowski, Finding a maximum independent set, SIAM J. Comput., 6 (1977), 537–546

Cited By

View all
  • (2020)Hiding Sensitive Information when Sharing Distributed Transactional DataInformation Systems Research10.1287/isre.2019.089831:2(473-490)Online publication date: 1-Jun-2020

Index Terms

  1. The Worst and the Most Probable Performance of a Class of Set-Covering Algorithms
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image SIAM Journal on Computing
        SIAM Journal on Computing  Volume 12, Issue 2
        May 1983
        196 pages
        ISSN:0097-5397
        DOI:10.1137/smjcat.1983.12.issue-2
        Issue’s Table of Contents

        Publisher

        Society for Industrial and Applied Mathematics

        United States

        Publication History

        Published: 01 May 1983

        Author Tags

        1. algorithmic analysis
        2. complexity
        3. worst case
        4. probable behavior
        5. random trees
        6. asymptotical estimates

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 13 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Hiding Sensitive Information when Sharing Distributed Transactional DataInformation Systems Research10.1287/isre.2019.089831:2(473-490)Online publication date: 1-Jun-2020

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media