Greedy facility location algorithms analyzed using dual fitting with factor-revealing LP

K Jain, M Mahdian, E Markakis, A Saberi… - Journal of the ACM …, 2003 - dl.acm.org
In this article, we will formalize the method of dual fitting and the idea of factor-revealing LP.
This combination is used to design and analyze two greedy algorithms for the metric …

A new greedy approach for facility location problems

K Jain, M Mahdian, A Saberi - Proceedings of the thiry-fourth annual …, 2002 - dl.acm.org
We present a simple and natural greedy algorithm for the metric uncapacitated facility
location problem achieving an approximation guarantee of 1.61. We use this algorithm to …

Provisioning a virtual private network: a network design problem for multicommodity flow

A Gupta, J Kleinberg, A Kumar, R Rastogi… - Proceedings of the thirty …, 2001 - dl.acm.org
Consider a setting in which a group of nodes, situated in a large underlying network, wishes
to reserve bandwidth on which to support communication. Virtual private networks (VPNs) …

Simultaneous optimization for concave costs: Single sink aggregation or single source buy-at-bulk

A Goel, D Estrin - Algorithmica, 2005 - Springer
We consider the problem of finding efficient trees to send information from k sources to a
single sink in a network where information can be aggregated at intermediate nodes in the …

Hierarchical placement and network design problems

S Guha, A Meyerson… - Proceedings 41st Annual …, 2000 - ieeexplore.ieee.org
Gives constant approximations for a number of layered network design problems. We begin
by modeling hierarchical caching, where the caches are placed in layers and each layer …

Primal–dual algorithms for connected facility location problems

C Swamy, A Kumar - Algorithmica, 2004 - Springer
Abstract We consider the Connected Facility Location problem. We are given a graph
G=(V,E) with costs {c_e\} on the edges, a set of facilities \F⊆V, and a set of clients \D⊆V …

Improved algorithms and data structures for solving graph problems in external memory

V Kumar, EJ Schwabe - Proceedings of SPDP'96: 8th IEEE …, 1996 - ieeexplore.ieee.org
Recently, the study of I/O-efficient algorithms has moved beyond fundamental problems of
sorting and permuting and into wider areas such as computational geometry and graph …

Modeling international facility location under uncertainty: A review, analysis, and insights

M Kchaou Boujelben, Y Boulaksil - IISE Transactions, 2018 - Taylor & Francis
In this article, we focus on international facility location models. First, we conduct an
extensive literature review on the subject and we propose a classification of the surveyed …

Cost-distance: Two metric network design

A Meyerson, K Munagala, S Plotkin - SIAM Journal on Computing, 2008 - SIAM
We present the Cost-Distance problem: finding a Steiner tree which optimizes the sum of
edge costs along one metric and the sum of source-sink distances along an unrelated …

Approximation algorithms for nonuniform buy-at-bulk network design

C Chekuri, MT Hajiaghayi, G Kortsarz… - SIAM Journal on …, 2010 - SIAM
Buy-at-bulk network design problems arise in settings where the costs for purchasing or
installing equipment exhibit economies of scale. The objective is to build a network of …