Algorithms and Lower Bounds for Replacement Paths under Multiple Edge Failures

被引:1
|
作者
Williams, Virginia Vassilevska [1 ]
Woldeghebriel, Eyob [1 ]
Xu, Yinzhan [1 ]
机构
[1] MIT, EECS, 77 Massachusetts Ave, Cambridge, MA 02139 USA
关键词
Replacement paths; fine-grained complexity; PAIRS SHORTEST PATHS; ORACLES;
D O I
10.1109/FOCS54457.2022.00090
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers a natural fault-tolerant shortest paths problem: for some constant integer f, given a directed weighted graph with no negative cycles and two fixed vertices s and t, compute (either explicitly or implicitly) for every tuple of f edges, the distance from s to t if these edges fail. We call this problem f-Fault Replacement Paths (fFRP). We first present an (O) over tilde (n(3)) time algorithm for 2FRP in n-vertex directed graphs with arbitrary edge weights and no negative cycles. As 2FRP is a generalization of the well-studied Replacement Paths problem (RP) that asks for the distances between s and t for any single edge failure, 2FRP is at least as hard as RP. Since RP in graphs with arbitrary weights is equivalent in a fine-grained sense to All-Pairs Shortest Paths (APSP) [Vassilevska Williams and Williams FOCS'10, J. ACM'18], 2FRP is at least as hard as APSP, and thus a substantially subcubic time algorithm in the number of vertices for 2FRP would be a breakthrough. Therefore, our algorithm in (O) over tilde (n(3)) time is conditionally nearly optimal. Our algorithm immediately implies an (O) over tilde (n(f+1)) time algorithm for the more general fFRP problem, giving the first improvement over the straightforward O(n(f+2)) time algorithm. Then we focus on the restriction of 2FRP to graphs with small integer weights bounded by M in absolute values. We show that similar to RP, 2FRP has a substantially subcubic time algorithm for small enough M. Using the current best algorithms for rectangular matrix multiplication, we obtain a randomized algorithm that runs in (O) over tilde (M(2/3)n(2.9153)) time. This immediately implies an improvement over our (O) over tilde (n(f+1)) time arbitrary weight algorithm for all f > 1. We also present a data structure variant of the algorithm that can trade off pre-processing and query time. In addition to the algebraic algorithms, we also give an n(8/3-o(1)) conditional lower bound for combinatorial 2FRP algorithms in directed unweighted graphs, and more generally, combinatorial lower bounds for the data structure version of fFRP.
引用
收藏
页码:907 / 918
页数:12
相关论文
共 50 条
  • [41] EXPONENTIAL LOWER BOUNDS ON A CLASS OF KNAPSACK ALGORITHMS
    HAUSMANN, D
    KANNAN, R
    KORTE, B
    [J]. MATHEMATICS OF OPERATIONS RESEARCH, 1981, 6 (02) : 225 - 232
  • [42] Quantum algorithms and lower bounds for convex optimization
    Chakrabarti, Shouvanik
    Childs, Andrew M.
    Li, Tongyang
    Wu, Xiaodi
    [J]. QUANTUM, 2020, 4
  • [43] Hexagonal grid drawings: Algorithms and lower bounds
    Aziza, S
    Biedl, T
    [J]. GRAPH DRAWING, 2004, 3383 : 18 - 24
  • [44] ON LOWER BOUNDS OF TIME COMPLEXITY OF SOME ALGORITHMS
    洪加威
    [J]. Science China Mathematics, 1979, (08) : 890 - 900
  • [45] Lower Bounds and Accelerated Algorithms for Bilevel Optimization
    Ji, Kaiyi
    Liang, Yingbin
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2022, 23
  • [46] Lower bounds for the rate of convergence of greedy algorithms
    Livshits, E. D.
    [J]. IZVESTIYA MATHEMATICS, 2009, 73 (06) : 1197 - 1215
  • [47] New algorithms and lower bounds for monotonicity testing
    Chen, Xi
    Servedio, Rocco A.
    Tan, Li-Yang
    [J]. 2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014), 2014, : 286 - 295
  • [48] PROVING RELATIVE LOWER BOUNDS FOR INCREMENTAL ALGORITHMS
    BERMAN, AM
    PAULL, MC
    RYDER, BG
    [J]. ACTA INFORMATICA, 1990, 27 (07) : 665 - 683
  • [49] Improved algorithms for replacement paths problems in restricted graphs
    Bhosle, AM
    [J]. OPERATIONS RESEARCH LETTERS, 2005, 33 (05) : 459 - 466
  • [50] New lower bounds for multiple coverings
    Esa Antero Seuranen
    [J]. Designs, Codes and Cryptography, 2007, 45 : 91 - 94