Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Approximation in (Poly-) Logarithmic Space (2008.04416v2)

Published 10 Aug 2020 in cs.DS

Abstract: We develop new approximation algorithms for classical graph and set problems in the RAM model under space constraints. As one of our main results, we devise an algorithm for d-Hitting Set that runs in time n{O(d2 + d/\epsilon})}, uses O((d2 + d/\epsilon) log n) bits of space, and achieves an approximation ratio of O((d/{\epsilon}) n{\epsilon}) for any positive \epsilon \leq 1 and any natural number d. In particular, this yields a factor-O(log n) approximation algorithm which runs in time n{O(log n)} and uses O(log2 n) bits of space (for constant d). As a corollary, we obtain similar bounds for Vertex Cover and several graph deletion problems. For bounded-multiplicity problem instances, one can do better. We devise a factor-2 approximation algorithm for Vertex Cover on graphs with maximum degree \Delta, and an algorithm for computing maximal independent sets which both run in time n{O(\Delta)} and use O(\Delta log n) bits of space. For the more general d-Hitting Set problem, we devise a factor-d approximation algorithm which runs in time n{O(d {\delta}2)} and uses O(d {\delta}2 log n) bits of space on set families where each element appears in at most \delta sets. For Independent Set restricted to graphs with average degree d, we give a factor-(2d) approximation algorithm which runs in polynomial time and uses O(log n) bits of space. We also devise a factor-O(d2) approximation algorithm for Dominating Set on d-degenerate graphs which runs in time n{O(log n)} and uses O(log2 n) bits of space. For d-regular graphs, we show how a known randomized factor-O(log d) approximation algorithm can be derandomized to run in time n{O(1)} and use O(log n) bits of space. Our results use a combination of ideas from the theory of kernelization, distributed algorithms and randomized algorithms.

Citations (3)

Summary

We haven't generated a summary for this paper yet.