SlideShare a Scribd company logo
Metric K-Center
Ken Liu
CoreTech
Trend Micro Inc.
Outline
• Preliminary
• NP-hard
• Unapproximability
• Gonzalez Algorithm
• Approximation ratio
• Conclusion
Preliminary
• A metric space is a pair (M, d) where M is a set of nodes
and d is a distance function on M such that:
– d(x, y) >=0 (non-negative),
– d(x, y) = 0 iff x=y (identity of indiscernibles),
– d(x, y) = d(y, x) (symmetry) and
– d(x, y) <= d(x, z) + d(y, z) (triangle inequality)
• Notation overloading
– Given x ∈ M and Y ⊆ M, let d(x, Y) = min {d(x, y): y ∈ Y}
Metric K-Center Problem
• Given a metric space (M, d), find k center
C = {c1, c2, ..., ck} to minimize the radius
– max { d(x, C): u ∈ M}
• Geometric view
– Voronoi diagram
– Each node is covered by some center
c1
c2
c3
c4
NP-hard
• Dominating set
– Given a graph G=(V, E), a k-dominating set of size k is a set C = {c1, c2, ..., ck}
⊆ V such that each node v ∈ V is adjacet to some node in C.
– To determine if a graph has a k-dominating set is known to be NP-hard
• Theorem: Metrick K-center is NP-hard
Proof:
– Given G = (V, E), let d(x, y) = 2 if (x, y) ∉ E and d(x, y) = 1 otherwise.
– (V, d) is a metric space.
– G has a k-dominating set => radius of optimal k centers for (V, d) is 1
– G has no k-dominating set => radius of optimal k centers for (V, d) is 2
– G = (V, E) has a k-dominating  radius of optimal k centers for (V, d) is 1
Unapproximibility
• Theorem: Assuming NP≠P, Metrick K-center cannot be
approximated within 2.
Proof:
– Given G = (V, E), let d(x, y) = 2 if (x, y) ∉ E and d(x, y) = 1 otherwise.
– G has a k-dominating set => radius of optimal k centers for (V, d) is 1
– G has no k-dominating set => radius of optimal k centers for (V, d) is 2
– Assume for contradiction that we have a polynomial (2 –ε)-
approximation algorithm called A
– G has a k-dominating set  A(V, d) < 2 - ε
– So we have a polynomial algorithm for the k-dominating set, -><-
Gonzalez’s Algorithm (1985)
• Input: a metric space (M, d) and a positive integer
• Output: a set of k centers
1. C = {}
2. c1 := a randomly chosen node in M
3. C.add(c1)
4. for i in {2, ..., k}:
ci := the node c ∈ M – C with max d(c, C)
C.add(ci)
5. return C
Approximation ratio
• Theorem: Gonzalez’s algorithm has an approximation ratio of 2
• proof:
– Let C = {c1, c2, ..., ck} be the output of Gonzalez algorithm and r be its
radius.
– Let ck+1 be the farest node from C. Note that
• d(ci, cj) >= r for all i ≠ j
– Let C’ = {c’1, c’2, ..., c’k} be the optimal solution and r* be its radius
– By Pigenhole theorem we have two nodes ci, cj being covered by the
same center c’ in C’
– r <= d(ci, cj) <= d(ci, c’) + d(cj, c’) <= d(ci, C’) + d(cj, C’) <= 2r*
c’
ci
cj
<=r*
>=r
Conclusion
• Gonzalez’s algorithm is simple yet optimal
Conclusion
• Gonzalez’s algorithm is simple yet optimal

More Related Content

What's hot

How to add client computer into a domain using dhcp
How to add client computer into a domain using dhcpHow to add client computer into a domain using dhcp
How to add client computer into a domain using dhcp
Mac Picar
 
Chapter14
Chapter14Chapter14
Chapter14
Muhammad Ahad
 
Fast Convergence in IP Network
Fast Convergence in IP Network Fast Convergence in IP Network
Fast Convergence in IP Network
Bangladesh Network Operators Group
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
Email server configuration on cisco packet tracer
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracer
prodhan999
 
Chapter12
Chapter12Chapter12
Chapter12
Muhammad Ahad
 
Reference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignReference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignDataWorks Summit
 
Chapter11
Chapter11Chapter11
Chapter11
Muhammad Ahad
 
Nat pat
Nat patNat pat
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
ShortestPathFirst
 
Computing Performance: On the Horizon (2021)
Computing Performance: On the Horizon (2021)Computing Performance: On the Horizon (2021)
Computing Performance: On the Horizon (2021)
Brendan Gregg
 
DNS server configuration in packet tracer
DNS server configuration in packet tracerDNS server configuration in packet tracer
DNS server configuration in packet tracer
prodhan999
 
Socket programming
Socket programmingSocket programming
Socket programming
Anurag Tomar
 
Desconstruindo a web
Desconstruindo a webDesconstruindo a web
Desconstruindo a web
Willian Molinari
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
APNIC
 
basic linux command (questions)
basic linux command (questions)basic linux command (questions)
basic linux command (questions)
Sukhraj Singh
 
Dns
DnsDns
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Bai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdf
Bai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdfBai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdf
Bai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdf
hoangvttlu
 
Chapter07
Chapter07Chapter07
Chapter07
Muhammad Ahad
 

What's hot (20)

How to add client computer into a domain using dhcp
How to add client computer into a domain using dhcpHow to add client computer into a domain using dhcp
How to add client computer into a domain using dhcp
 
Chapter14
Chapter14Chapter14
Chapter14
 
Fast Convergence in IP Network
Fast Convergence in IP Network Fast Convergence in IP Network
Fast Convergence in IP Network
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Email server configuration on cisco packet tracer
Email server configuration on cisco packet tracerEmail server configuration on cisco packet tracer
Email server configuration on cisco packet tracer
 
Chapter12
Chapter12Chapter12
Chapter12
 
Reference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network DesignReference Architecture-Validated & Tested Approach to Define Network Design
Reference Architecture-Validated & Tested Approach to Define Network Design
 
Chapter11
Chapter11Chapter11
Chapter11
 
Nat pat
Nat patNat pat
Nat pat
 
An Introduction to BGP Flow Spec
An Introduction to BGP Flow SpecAn Introduction to BGP Flow Spec
An Introduction to BGP Flow Spec
 
Computing Performance: On the Horizon (2021)
Computing Performance: On the Horizon (2021)Computing Performance: On the Horizon (2021)
Computing Performance: On the Horizon (2021)
 
DNS server configuration in packet tracer
DNS server configuration in packet tracerDNS server configuration in packet tracer
DNS server configuration in packet tracer
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Desconstruindo a web
Desconstruindo a webDesconstruindo a web
Desconstruindo a web
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
basic linux command (questions)
basic linux command (questions)basic linux command (questions)
basic linux command (questions)
 
Dns
DnsDns
Dns
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Bai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdf
Bai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdfBai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdf
Bai giang quan tri mang-CHƯƠNG 2- Cac ky thuat DINH TUYEN.pdf
 
Chapter07
Chapter07Chapter07
Chapter07
 

Similar to Metric k center

parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph Motif
AMR koura
 
2.circle
2.circle2.circle
2.circle
SakshiNailwal
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
The Statistical and Applied Mathematical Sciences Institute
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
Barani Tharan
 
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huliCRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
harshmacduacin
 
10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulasswartzje
 
2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...
2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...
2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...
The Statistical and Applied Mathematical Sciences Institute
 
SPDE presentation 2012
SPDE presentation 2012SPDE presentation 2012
SPDE presentation 2012
Zheng Mengdi
 
48 circle part 1 of 2
48 circle part 1 of 248 circle part 1 of 2
48 circle part 1 of 2tutulk
 
Minimum mean square error estimation and approximation of the Bayesian update
Minimum mean square error estimation and approximation of the Bayesian updateMinimum mean square error estimation and approximation of the Bayesian update
Minimum mean square error estimation and approximation of the Bayesian update
Alexander Litvinenko
 
Finite fields
Finite fields Finite fields
Finite fields
BhumikaPal1
 
K-means Clustering || Data Mining
K-means Clustering || Data MiningK-means Clustering || Data Mining
K-means Clustering || Data Mining
Iffat Firozy
 
Computer science-formulas
Computer science-formulasComputer science-formulas
Computer science-formulas
RAJIV GANDHI INSTITUTE OF TECHNOLOGY
 
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Leo Asselborn
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Victor Pereira
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
vaishnavi339314
 
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Yandex
 
Quantum factorization.pdf
Quantum factorization.pdfQuantum factorization.pdf
Quantum factorization.pdf
ssuser8b461f
 
circles_ppt angle and their relationship.ppt
circles_ppt angle and their relationship.pptcircles_ppt angle and their relationship.ppt
circles_ppt angle and their relationship.ppt
MisterTono
 

Similar to Metric k center (20)

parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph Motif
 
2.circle
2.circle2.circle
2.circle
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huliCRYPTOGRAPHY AND NUMBER THEORY, he ha huli
CRYPTOGRAPHY AND NUMBER THEORY, he ha huli
 
10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas10.1 Distance and Midpoint Formulas
10.1 Distance and Midpoint Formulas
 
2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...
2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...
2018 MUMS Fall Course - Statistical Representation of Model Input (EDITED) - ...
 
SPDE presentation 2012
SPDE presentation 2012SPDE presentation 2012
SPDE presentation 2012
 
48 circle part 1 of 2
48 circle part 1 of 248 circle part 1 of 2
48 circle part 1 of 2
 
Alex1 group2
Alex1 group2Alex1 group2
Alex1 group2
 
Minimum mean square error estimation and approximation of the Bayesian update
Minimum mean square error estimation and approximation of the Bayesian updateMinimum mean square error estimation and approximation of the Bayesian update
Minimum mean square error estimation and approximation of the Bayesian update
 
Finite fields
Finite fields Finite fields
Finite fields
 
K-means Clustering || Data Mining
K-means Clustering || Data MiningK-means Clustering || Data Mining
K-means Clustering || Data Mining
 
Computer science-formulas
Computer science-formulasComputer science-formulas
Computer science-formulas
 
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
 
Quantum factorization.pdf
Quantum factorization.pdfQuantum factorization.pdf
Quantum factorization.pdf
 
circles_ppt angle and their relationship.ppt
circles_ppt angle and their relationship.pptcircles_ppt angle and their relationship.ppt
circles_ppt angle and their relationship.ppt
 

Metric k center

  • 2. Outline • Preliminary • NP-hard • Unapproximability • Gonzalez Algorithm • Approximation ratio • Conclusion
  • 3. Preliminary • A metric space is a pair (M, d) where M is a set of nodes and d is a distance function on M such that: – d(x, y) >=0 (non-negative), – d(x, y) = 0 iff x=y (identity of indiscernibles), – d(x, y) = d(y, x) (symmetry) and – d(x, y) <= d(x, z) + d(y, z) (triangle inequality) • Notation overloading – Given x ∈ M and Y ⊆ M, let d(x, Y) = min {d(x, y): y ∈ Y}
  • 4. Metric K-Center Problem • Given a metric space (M, d), find k center C = {c1, c2, ..., ck} to minimize the radius – max { d(x, C): u ∈ M} • Geometric view – Voronoi diagram – Each node is covered by some center c1 c2 c3 c4
  • 5. NP-hard • Dominating set – Given a graph G=(V, E), a k-dominating set of size k is a set C = {c1, c2, ..., ck} ⊆ V such that each node v ∈ V is adjacet to some node in C. – To determine if a graph has a k-dominating set is known to be NP-hard • Theorem: Metrick K-center is NP-hard Proof: – Given G = (V, E), let d(x, y) = 2 if (x, y) ∉ E and d(x, y) = 1 otherwise. – (V, d) is a metric space. – G has a k-dominating set => radius of optimal k centers for (V, d) is 1 – G has no k-dominating set => radius of optimal k centers for (V, d) is 2 – G = (V, E) has a k-dominating  radius of optimal k centers for (V, d) is 1
  • 6. Unapproximibility • Theorem: Assuming NP≠P, Metrick K-center cannot be approximated within 2. Proof: – Given G = (V, E), let d(x, y) = 2 if (x, y) ∉ E and d(x, y) = 1 otherwise. – G has a k-dominating set => radius of optimal k centers for (V, d) is 1 – G has no k-dominating set => radius of optimal k centers for (V, d) is 2 – Assume for contradiction that we have a polynomial (2 –ε)- approximation algorithm called A – G has a k-dominating set  A(V, d) < 2 - ε – So we have a polynomial algorithm for the k-dominating set, -><-
  • 7. Gonzalez’s Algorithm (1985) • Input: a metric space (M, d) and a positive integer • Output: a set of k centers 1. C = {} 2. c1 := a randomly chosen node in M 3. C.add(c1) 4. for i in {2, ..., k}: ci := the node c ∈ M – C with max d(c, C) C.add(ci) 5. return C
  • 8. Approximation ratio • Theorem: Gonzalez’s algorithm has an approximation ratio of 2 • proof: – Let C = {c1, c2, ..., ck} be the output of Gonzalez algorithm and r be its radius. – Let ck+1 be the farest node from C. Note that • d(ci, cj) >= r for all i ≠ j – Let C’ = {c’1, c’2, ..., c’k} be the optimal solution and r* be its radius – By Pigenhole theorem we have two nodes ci, cj being covered by the same center c’ in C’ – r <= d(ci, cj) <= d(ci, c’) + d(cj, c’) <= d(ci, C’) + d(cj, C’) <= 2r* c’ ci cj <=r* >=r
  • 10. Conclusion • Gonzalez’s algorithm is simple yet optimal