Skip to main content

Packing Under Convex Quadratic Constraints

  • Conference paper
  • First Online:
Integer Programming and Combinatorial Optimization (IPCO 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12125))

Abstract

We consider a general class of binary packing problems with a convex quadratic knapsack constraint. We prove that these problems are APX-hard to approximate and present constant-factor approximation algorithms based upon three different algorithmic techniques: (1) a rounding technique tailored to a convex relaxation in conjunction with a non-convex relaxation whose approximation ratio equals the golden ratio; (2) a greedy strategy; (3) a randomized rounding method leading to an approximation algorithm for the more general case with multiple convex quadratic constraints. We further show that a combination of the first two strategies can be used to yield a monotone algorithm leading to a strategyproof mechanism for a game-theoretic variant of the problem. Finally, we present a computational study of the empirical approximation of the three algorithms for problem instances arising in the context of real-world gas transport networks.

We acknowledge funding through the DFG CRC/TRR 154, Subproject A007.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Other works assume that the relationship is cubic, but experiments conducted by Wierman et al. [28] suggest that the relationship is closer to quadratic than cubic.

  2. 2.

    We here make the standard assumption that the true values of the source vertex \(s_j\), the target vertex \(t_j\), and the quantity of gas \(q_j\) are public knowledge. This is reasonable since these values are physically measurable by the system provider so that misreporting them would be pointless for the agent. This assumption is also frequently made in the knapsack auction literature [1, 4, 17].

References

  1. Aggarwal, G., Hartline, J.D.: Knapsack auctions. In: Proceedings of 17th Annual ACM-SIAM Symposium Discrete Algorithms (SODA), pp. 1083–1092 (2006)

    Google Scholar 

  2. Bansal, N., Kimbrel, T., Pruhs, K.: Dynamic speed scaling to manage energy and temperature. In: Proceedings of 45th Annual IEEE Symposium Foundations Computer Science (FOCS), pp. 520–529 (2004)

    Google Scholar 

  3. Berman, A., Shaked-Monderer, N.: Completely Positive Matrices. World Scientific Publishing, Singapore (2003)

    Google Scholar 

  4. Briest, P., Krysta, P., Vöcking, B.: Approximation techniques for utilitarian mechanism design. SIAM J. Comput. 40, 1587–1622 (2011)

    Article  MathSciNet  Google Scholar 

  5. Chau, C.-K., Elbassioni, K.M., Khonji, M.: Truthful mechanisms for combinatorial allocation of electric power in alternating current electric systems for smart grid. ACM Trans. Econ. Comput. 5 (2016). Art. nr. 7

    Google Scholar 

  6. Elbassioni, K.M., Nguyen, T.T.: Approximation algorithms for binary packing problems with quadratic constraints of low cp-rank decompositions. Discrete Appl. Math. 230, 56–70 (2017)

    Article  MathSciNet  Google Scholar 

  7. Gallo, G., Hammer, P.L., Simeone, B.: Quadratic knapsack problems. Math. Program. Study 12, 132–149 (1980)

    Article  MathSciNet  Google Scholar 

  8. Gibbard, A.: Manipulation of voting schemes: a general result. Econometrica 41, 587–601 (1973)

    Article  MathSciNet  Google Scholar 

  9. Håstad, J.: Clique is hard to approximate within \(n^{1-\epsilon }\). Acta Mathematica 182(1), 105–142 (1999)

    Article  MathSciNet  Google Scholar 

  10. Ibarra, O.H., Kim, C.E.: Fast approximation algorithms for the knapsack and sum of subsets problems. J. ACM 22, 463–468 (1975)

    Google Scholar 

  11. Irani, S., Pruhs, K.R.: Algorithmic problems in power management. SIGACT News 36(2), 63–76 (2005)

    Article  Google Scholar 

  12. Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W., Bohlinger, J.D. (eds.) Complexity of Computer Computations. The IBM Research Symposia Series. Springer, Boston (1972). https://doi.org/10.1007/978-1-4684-2001-2_9

  13. Klimm, M., Pfetsch, M.E., Raber, R., Skutella, M.: Packing under convex quadratic constraints. Preprint (2019). arXiv:1912.00468 [math.OC]

  14. Klimm, M., Pfetsch, M.E., Raber, R., Skutella, M.: On the robustness of potential-based flow networks. Preprint (2020). https://opus4.kobv.de/opus4-trr154/frontdoor/index/index/docId/309

  15. Kozlov, M.K., Tarasov, S.P., Khachiyan, L.G.: The polynomial solvability of convex quadratic programming. USSR Comput. Math. Math. Phys. 20(5), 223–228 (1980)

    Google Scholar 

  16. McCabe, K.A., Rassenti, S.J., Smith, V.L.: Designing ‘smart’ computer-assisted markets: an experimental auction for gas networks. Eur. J. Polit. Econ. 5, 259–283 (1989)

    Article  Google Scholar 

  17. Mu’alem, A., Nisan, N.: Truthful approximation mechanisms for restricted combinatorial auctions. Games Econ. Behav. 64, 612–631 (2008)

    Article  MathSciNet  Google Scholar 

  18. Myerson, R.B.: Optimal auction design. Math. Oper. Res. 6, 58–73 (1981)

    Article  MathSciNet  Google Scholar 

  19. Nesterov, Y., Nemirovskii, A.: Interior-Point Polynomial Algorithms in Convex Programming, vol. 13. SIAM (1994)

    Google Scholar 

  20. Newbery, D.M.: Network capacity auctions: promise and problems. Utilities Policy 11, 27–32 (2002)

    Article  Google Scholar 

  21. Pferschy, U., Schauer, J.: Approximation of the quadratic knapsack problem. INFORMS J. Comput. 28, 308–318 (2016)

    Article  MathSciNet  Google Scholar 

  22. Rader Jr., D.J., Woeginger, G.J.: The quadratic 0–1 knapsack problem with series-parallel support. Oper. Res. Lett. 30, 159–166 (2002)

    Google Scholar 

  23. Rassenti, S.J., Reynolds, S.S., Smit, V.L.: Cotenancy and competition in an experimental auction market for natural gas pipeline networks. Econ. Theory 4, 41–65 (1994)

    Article  Google Scholar 

  24. Sahni, S.: Approximate algorithms for the \(0/1\) knapsack problem. J. ACM 22(1), 115–124 (1975)

    Article  MathSciNet  Google Scholar 

  25. Schmidt, M., et al.: GasLib - a library of gas network instances. Data 2(4) (2017). Article 40

    Google Scholar 

  26. Sviridenko, M.: A note on maximizing a submodular set function subject to a knapsack constraint. Oper. Res. Lett. 32, 41–43 (2004)

    Article  MathSciNet  Google Scholar 

  27. Weymouth, T.R.: Problems in natural gas engineering. Trans. Am. Soc. Mech. Eng. 34, 185–231 (1912)

    Google Scholar 

  28. Wierman, A., Andrew, L.L.H., Tang, A.: Power-aware speed scaling in processor sharing systems: optimality and robustness. Perform. Eval. 69, 601–622 (2012)

    Google Scholar 

  29. Woeginger, G.J.: When does a dynamic programming formulation guarantee the existence of a fully polynomial time approximation scheme (FPTAS)? INFORMS J. Comput. 12, 57–74 (2000)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Max Klimm , Marc E. Pfetsch , Rico Raber or Martin Skutella .

Editor information

Editors and Affiliations

Appendix A – Computational results

Appendix A – Computational results

We apply our algorithms to gas transportation as described in Example 1, using the GasLib-134 instance [25], see Fig. 2. Sources and sinks are denoted by S and T, resp. Every \(t\in T\) has a demand of \(q_t\) units of gas. To ensure network robustness in the sense of [14], we assume that all sinks between \(s_1\) and \(s_2\) are supplied by \(s_1\), all sinks between \(s_3\) and \(t_{45}\) by \(s_3\), and all other sinks by \(s_2\). Let \(T_i\) be the sinks supplied by \(s_i\). For simplicity, we assume that for every \(t\in T\), the economic welfare \(p_t\) of transporting \(q_t\) units of gas to t equals \(\theta q_t\) for \(\theta > 0\).

The goal is to choose a welfare-maximal feasible subset of transportations, while the pressures at the first sink \(s_1\) and the last source \(t_{45}\) are within their feasible interval. Let \(\bar{E}\) denote the path from \(s_1\) to \(t_{45}\), and for every \(t\in T_i\) denote by \(E_t\) the set of edges on the unique path from \(s_i\) to t, \(i \in [3]\). Let \(p = (p_t)_{t\in T}\), \(W = (w_{t,t'})_{t,t'\in T}\), with \(w_{t,t'} = \sum _{e\in \bar{E} \cap E_t\cap E_{t'}}\beta _e\, q_t\, q_{t'}\), and let , where \(\bar{\pi }_v\) and denote the upper and lower bound on the squared pressure at node v, respectively. Finally, let \(x = (x_t)_{t\in T} \in \{0,1\}^T\), where \(x_t = 1\) if and only if sink t is supplied. This results in a formulation as (P); see Example 1.

Fig. 2.
figure 2

The Gaslib-134 instance. Sources are shown in blue, sinks in red. (Color figure online)

The GasLib-134 instance contains different scenarios, where each scenario provides demands \(\hat{q}_t\) for every sink \(t\in T\). In order to make the optimization problem non-trivial, we increase the node demands by setting \(q_t = \gamma \, \hat{q}_t\), for . We apply the golden ratio, greedy, and randomized rounding algorithm to the first 100 scenarios, using each \(\gamma \in \varGamma \). The algorithms are executed using k initial elements in partial enumeration for each \(k \in \{0,1,3\}\).

Table 1. Mean and standard deviation (SD) of the approximation ratio of the greedy algorithm, the golden ratio algorithm, and randomized rounding. Each algorithm has been executed with partial enumeration of k elements.
Fig. 3.
figure 3

Approximation ratios (top row) and computation times (bottom row) of the three algorithms when executed with partial enumeration of \(k = 0, 1, 3\) elements. The red line indicates the median. (Color figure online)

Randomized rounding is run with \(\alpha \) chosen uniformly at random from [0, 1]. Instead of a single feasible realization, we generate 100 feasible realizations of and return the one with the highest profit. For the golden ratio algorithm, instead of scaling the optimal solution y of (\({R_1}\)) by \(\phi \), we scale it by the largest number \(\lambda \in [\phi ,1]\) such that \(\lambda \, y\) is feasible for (\({R_2}\)), using binary search. The result of each algorithm is compared to an optimal solution computed with a standard MIP solver. The computations were executed on a 4-core Intel Core i5-2520M processor with 2.5 GHz. The code is implemented in Python 3.6 and we use the SLSQP algorithm of the SciPy optimize package to solve (\({R_1}\)). The results are shown in Table 1 and as box plots in Fig. 3.

The greedy algorithm achieves the best approximation ratios on average when combined with partial enumeration and is at least 20 times faster than the other algorithms, because the latter rely on solving (\({R_1}\)) first. The approximation ratio of all three algorithms is on average much higher than their proven worst case lower bounds. However, the quality of the solutions produced by the golden ratio algorithm is subject to strong fluctuations. By running the algorithm with partial enumeration with \(k = 3\) initial items, the ratio is at least \(\phi \) for every instance, as guaranteed by Theorem 1.

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Klimm, M., Pfetsch, M.E., Raber, R., Skutella, M. (2020). Packing Under Convex Quadratic Constraints. In: Bienstock, D., Zambelli, G. (eds) Integer Programming and Combinatorial Optimization. IPCO 2020. Lecture Notes in Computer Science(), vol 12125. Springer, Cham. https://doi.org/10.1007/978-3-030-45771-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45771-6_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45770-9

  • Online ISBN: 978-3-030-45771-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics