skip to main content
research-article

Greedy heuristics for the bounded diameter minimum spanning tree problem

Published:05 January 2010Publication History
Skip Abstract Section

Abstract

Given a connected, weighted, undirected graph G and a bound D, the bounded diameter minimum spanning tree problem seeks a spanning tree on G of minimum weight among the trees in which no path between two vertices contains more than D edges. In Prim's algorithm, the diameter of the growing spanning tree can always be known, so it is a good starting point from which to develop greedy heuristics for the bounded diameter problem. Abdalla, Deo, and Gupta described such an algorithm. It imitates Prim's algorithm but avoids edges whose inclusion in the spanning tree would violate the diameter bound. Running the algorithm from one start vertex requires time that is O(n3).

A modification of this approach uses the start vertex as the center of the spanning tree (if D is even) or as one of the two center vertices (if D is odd). This yields a simpler algorithm whose time is O(n2). A further modification chooses each next vertex at random rather than greedily, though it still connects each vertex to the growing tree with the lowest-weight feasible edge. On Euclidean problem instances with small diameter bounds, the randomized heuristic is superior to the two fully greedy algorithms, though its advantage fades as the diameter bound grows. On instances whose edge weights have been chosen at random, the fully greedy algorithms outperform the randomized heuristic.

References

  1. Abdalla, A., Deo, N., and Gupta, P. 2000. Random-tree diameter and the diameter constrained MST. Congressus Numerantium 144, 161--182.Google ScholarGoogle Scholar
  2. Achuthan, N. R., Caccetta, L., Caccetta, P., and Geelen, J. F. 1994. Computation methods for the diameter restricted minimum weight spanning tree problem. Australasian Journal of Combinatorics 10, 51--71.Google ScholarGoogle Scholar
  3. Althaus, E., Funke, S., Har-Peled, S., Könemann, J., Ramos, E. A., and Skutella, M. 2005. Approximating k-hop minimum-spanning trees. Operations Research Letters 33, 2, 115--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Beasley, J. E. 1990. OR-library: Distributing test problems by electronic mail. Journal of the Operational Research Society 41, 1069--1072.Google ScholarGoogle ScholarCross RefCross Ref
  5. Dahl, G. 1997. The 2-hop spanning tree problem. Tech. rep. 250, University of Oslo.Google ScholarGoogle Scholar
  6. Davis, L. 1991. Handbook of Genetic Algorithms. Van Nostrand Reinhold, New York.Google ScholarGoogle Scholar
  7. Deo, N. and Abdalla, A. 2000. Computing a diameter-constrained minimum spanning tree in parallel. In Algorithms and Complexity, G. Bongiovanni, G. Gambosi, and R. Petreschi, Eds. Number 1767 in LNCS. Springer-Verlag, Berlin, 17--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. dos Santos, A. C., Lucena, A., and Rebeiro, C. C. 2004. Solving diameter constrained minimum spanning tree problems in dense graphs. In Experimental and Efficient Algorithms: Proceedings of the 3rd International Workshop, WEA 2004, C. C. Rebeiro and S. L. Martins, Eds. Number 3059 in LNCS. Springer, Berlin, 458--467.Google ScholarGoogle ScholarCross RefCross Ref
  9. Garey, M. R. and Johnson, D. S. 1979. Computers and Intractibility: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gouveia, L. and Magnanti, T. L. 2003. Network flow models for designing diameter-constrained minimum-spanning and Steiner trees. Networks 41, 159--173.Google ScholarGoogle ScholarCross RefCross Ref
  11. Gruber, M. and Raidl, G. R. 2005a. A new 0-1 ILP approach for the bounded diameter minimum spanning tree problem. In Proceedings of the 2nd International Network Optimization Conference. Vol. 1. 178--185. Lisbon.Google ScholarGoogle Scholar
  12. Gruber, M. and Raidl, G. R. 2005b. Variable neighborhood search for the bounded diameter minimum spanning tree problem. In Proceedings of the 18th Mini Euro Conference on Variable Neighborhood Search, P. Hansen, N. Mladenovic, J. A. M. Pérez, B. M. Batista, and J. M. Moreno-Vega, Eds. Tenerife, Spain.Google ScholarGoogle Scholar
  13. Gruber, M. and Raidl, G. R. 2008. Heuristic cut separation in a branch&cut approach for the bounded diameter minimum spanning tree problem. In Proceedings of the 2008 Symposium on Applications and the Internet. Turku, Finland. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gruber, M., van Hemert, J., and Raidl, G. R. 2006. Neighborhood searches for the bounded diameter minimum spanning tree problem embedded in a VNS, EA, and ACO. In Proceedings of the 2006 Genetic and Evolutionary Computation Conference, M. Keijzer et al., Eds. Vol. 2. ACM Press, New York, 1187--1194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Handler, G. Y. 1978. Minimax location of a facility in an undirected graph. Transportation Science 7, 287--293.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Julstrom, B. A. and Raidl, G. R. 2003. A permutation-coded evolutionary algorithm for the bounded-diameter minimum spanning tree problem. In 2003 Genetic and Evolutionary Computation Conference Workshop Program, A. Barry, Ed. 2--7. Chicago.Google ScholarGoogle Scholar
  17. King, R. S. and Julstrom, B. 1982. Applied Statistics Using the Computer. Alfred Publishing Company, Sherman Oaks, CA.Google ScholarGoogle Scholar
  18. Kopinitsch, B. 2006. An ant colony optimisation algorithm for the bounded diameter minimum spanning tree problem. M.S. thesis, Institute of Computer Graphics and Algorithms, Vienna University of Technology.Google ScholarGoogle Scholar
  19. Prim, R. C. 1957. Shortest connection networks and some generalizations. Bell System Technical Journal 36, 1389--1401.Google ScholarGoogle ScholarCross RefCross Ref
  20. Raidl, G. R. and Gruber, M. 2008. A Lagrangean relax-and-cut approach for the bounded diameter minimum spanning tree problem. In International Conference on Numerical Analysis and Applied Mathematics 2008. AIP Conference Proceedings, vol. 1048. American Institute of Physics, 446--449.Google ScholarGoogle Scholar
  21. Raidl, G. R. and Julstrom, B. A. 2003. Greedy heuristics and an evolutionary algorithm for the bounded-diameter minimum spanning tree problem. In Proceedings of the 2003 ACM Symposium on Applied Computing, G. Lamont, H. Haddad, G. A. Papadopoulos, B. Panda, J. Carroll, R. Stansifer, W. Jones, R. Menezes, and W. Shoaff, Eds. ACM Press, New York, 747--752. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Singh, A. and Gupta, A. K. 2007. Improved heuristics for the bounded-diameter minimum spanning tree problem. Soft Computing 11, 10, 911--921. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sörensen, K. and Janssens, G. K. 2002. Generating solutions for the 2-hop constrained spanning tree and the simple plant location problem in order of decreasing cost. In Proceedings of the 16th Belgian Conference on Quantitative Methods for Decision Making. Brussels.Google ScholarGoogle Scholar

Index Terms

  1. Greedy heuristics for the bounded diameter minimum spanning tree problem

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Journal of Experimental Algorithmics
            ACM Journal of Experimental Algorithmics  Volume 14, Issue
            2009
            613 pages
            ISSN:1084-6654
            EISSN:1084-6654
            DOI:10.1145/1498698
            Issue’s Table of Contents

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 5 January 2010
            • Revised: 1 January 2009
            • Accepted: 1 January 2009
            • Received: 1 June 2006
            Published in jea Volume 14, Issue

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader