ABSTRACT
In the Densest k-Subgraph problem, given a graph G and a parameter k, one needs to find a subgraph of G induced on k vertices that contains the largest number of edges. There is a significant gap between the best known upper and lower bounds for this problem. It is NP-hard, and does not have a PTAS unless NP has subexponential time algorithms. On the other hand, the current best known algorithm of Feige, Kortsarz and Peleg, gives an approximation ratio of n1/3 - c for some fixed c>0 (later estimated at around c= 1/90).
We present an algorithm that for every ε> 0 approximates the Densest k-Subgraph problem within a ratio of n¼ + ε in time nO(1/ε). If allowed to run for time nO(log n), the algorithm achieves an approximation ratio of O(n¼). Our algorithm is inspired by studying an average-case version of the problem where the goal is to distinguish random graphs from random graphs with planted dense subgraphs -- the approximation ratio we achieve for the general case matches the "distinguishing ratio" we obtain for this planted problem.
At a high level, our algorithms involve cleverly counting appropriately defined trees of constant size in G, and using these counts to identify the vertices of the dense subgraph. We say that a graph G(V,E) has log-density α if its average degree is Θ(|V|α). The algorithmic core of our result is a procedure to output a k-subgraph of 'nontrivial' density whenever the log-density of the densest k-subgraph is larger than the log-density of the host graph.
We outline an extension to our approximation algorithm which achieves an O(n¼ -ε)-approximation in O(2nO(ε)) time. We also show that, for certain parameter ranges, eigenvalue and SDP based techniques can outperform our basic distinguishing algorithm for random instances (in polynomial time), though without improving upon the O(n¼) guarantee overall.
- N.Alon, M.Krivelevich, and B.Sudakov. Finding a large hidden clique in a random graph. pages 457--466, 1998. Google ScholarDigital Library
- N.Alon and J.Spencer. The Probabilistic Method. Wiley-Interscience, third edition, 2008.Google Scholar
- B.Applebaum, B.Barak, and A.Wigderson. Public key cryptography from different assumptions. Preliminary version as cryptology eprint report 2008/335 by Barak and Wigderson, 2008.Google Scholar
- S.Arora, B.Barak, M.Brunnermeier, and R.Ge. Computational complexity and information asymmetry in financial products. In Proceedings of the First Symposium on Innovations in Computer Science (ICS), 2010.Google Scholar
- Y.Asahiro, R.Hassin, and K.Iwama. Complexity of finding dense subgraphs. Discrete Appl. Math., 121(1-3):15--26, 2002. Google ScholarDigital Library
- B.E. Birnbaum and K.J. Goldman. An improved analysis for a greedy remote-clique algorithm using factor-revealing LPs. Algorithmica, 1:42--59, 2009. Google ScholarDigital Library
- M.Charikar, M.Hajiaghayi, and H.J. Karloff. Improved approximation algorithms for label cover problems. In ESA, volume 5757 of Lecture Notes in Computer Science, pages 23--34. Springer, 2009.Google Scholar
- U.Feige. Relations between average case complexity and approximation complexity. In Proceedings of the 34th annual ACM Symposium on Theory of Computing (STOC'02), pages 534--543. ACM Press, 2002. Google ScholarDigital Library
- U.Feige, G.Kortsarz, and D.Peleg. The dense k-subgraph problem. Algorithmica, 29(3):410--421, 2001.Google ScholarDigital Library
- U.Feige and M.Langberg. Approximation algorithms for maximization problems arising in graph partitioning. J. Algorithms, 41(2):174--211, 2001. Google ScholarDigital Library
- U.Feige and M.Seltser. On the densest k-subgraph problems. Technical Report CS97-16, Weizmann Institute of Science, Rehovot, Israel, 1997. Google ScholarDigital Library
- Z.Furedi and J.Komlos. The eigenvalues of random symmetric matrices. Combinatorica, 1:233--241, 1981.Google ScholarCross Ref
- G.Gallo, M.D. Grigoriadis, and R.E. Tarjan. A fast parametric maximum flow algorithm and applications. SIAM J. Comput., 18(1):30--55, 1989. Google ScholarDigital Library
- S.Khot. Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique. In Proceedings of the 44th Annual IEEE Symposium on the Foundations of Computer Science (FOCS'04), pages 136--145, 2004. Google ScholarDigital Library
- L.Lovasz and A.Schrijver. Cones of matrices and set-functions and 0-1 optimization. SIAM Journal on Optimization, 1:166--190, 1991.Google ScholarCross Ref
- A.Srivastav and K.Wolf. Finding dense subgraphs with semidefinite programming. In Proceedings of the International Workshop on Approximation Algorithms for Combinatorial Optimization (APPROX), pages 181--191, 1998. Google ScholarDigital Library
Index Terms
- Detecting high log-densities: an O(n¼) approximation for densest k-subgraph
Recommendations
An O(log n)-Approximation Algorithm for the Edge-Disjoint Paths Problem in Eulerian Planar Graphs
In this article, we study an approximation algorithm for the maximum edge-disjoint paths problem. In this problem, we are given a graph and a collection of pairs of vertices, and the objective is to find the maximum number of pairs that can be connected ...
Algorithmic aspects of semitotal domination in graphs
AbstractFor a graph G = ( V , E ), a set D ⊆ V is called a semitotal dominating set of G if D is a dominating set of G, and every vertex in D is within distance 2 of another vertex of D. The Minimum Semitotal Domination problem is to find a ...
b-Disjunctive Total Domination in Graphs: Algorithm and Hardness Results
CALDAM 2016: Proceedings of the Second International Conference on Algorithms and Discrete Applied Mathematics - Volume 9602Let $$G=V,E$$ be a connected graph with at least two vertices. For a fixed positive integer $$b>1$$, a set $$D\subseteq V$$ is called a b-disjunctive total dominating set of G if for every vertex $$v\in V$$, v is either adjacent to a vertex of D or has ...
Comments