RESEARCH ARTICLE

A primal-dual approximation algorithm for the k-prize-collecting minimum vertex cover problem with submodular penalties

  • Xiaofei LIU 1 ,
  • Weidong LI , 2 ,
  • Jinhua YANG 3
Expand
  • 1. School of Information Science and Engineering, Yunnan University, Kunming 650500, China
  • 2. School of Mathematics and Statistics, Yunnan University, Kunming 650500, China
  • 3. Dianchi College of Yunnan University, Kunming 650228, China

Received date: 23 Nov 2021

Accepted date: 15 Apr 2022

Copyright

2023 Higher Education Press

Abstract

In this paper, we consider the k-prize-collecting minimum vertex cover problem with submodular penalties, which generalizes the well-known minimum vertex cover problem, minimum partial vertex cover problem and minimum vertex cover problem with submodular penalties. We are given a cost graph G=(V,E;c) and an integer k. This problem determines a vertex set SV such that S covers at least k edges. The objective is to minimize the total cost of the vertices in S plus the penalty of the uncovered edge set, where the penalty is determined by a submodular function. We design a two-phase combinatorial algorithm based on the guessing technique and the primal-dual framework to address the problem. When the submodular penalty cost function is normalized and nondecreasing, the proposed algorithm has an approximation factor of 3. When the submodular penalty cost function is linear, the approximation factor of the proposed algorithm is reduced to 2, which is the best factor if the unique game conjecture holds.

Cite this article

Xiaofei LIU , Weidong LI , Jinhua YANG . A primal-dual approximation algorithm for the k-prize-collecting minimum vertex cover problem with submodular penalties[J]. Frontiers of Computer Science, 2023 , 17(3) : 173404 . DOI: 10.1007/s11704-022-1665-9

1 Introduction

The minimum vertex cover problem (MVC) is one of the most important and fundamental problems in graph theory and combinatorial optimization [1,2]. In the MVC, we are given a graph G=(V,E) with vertex set V={v1,v2,,vn} and edge set E={e1,e2,,em}. For each vertex vV, there is an associated nonnegative cost c(v). The MVC finds a vertex set S to cover all the edges of the graph such that the total cost of the vertices in S is minimized, where an edge is said to be covered by S if at least one of its incident vertices is in S. For this problem, Karp [1] proved it is NP-hard. This result is improved by Khot and Regev [3], who proved that the MVC cannot be approximated within 2ε for any ε>0 under the unique game conjecture. Based on the LP-rounding, Hochbaum [4] presented a 2-approximation algorithm with a running time of O(n3). Based on the primal-dual framework, Bar-Yehuda and Even [5] proposed a linear-time 2-approximation algorithm.
Bshouty and Burroughs [6] proposed the minimum partial vertex cover problem (MPVC) which is a generalization of the MVC. In this variant, we are given an additional parameter k, which is called the covering requirement. The objective of the MPVC is to find a minimum cost subset of V that covers at least k edges in E. If k=m, the MPVC is exactly the MVC. For the MPVC, Bshouty and Burroughs [6] presented a 2-approximation algorithm with a running time of O(n3) based on the LP-rounding. On the basis of Lagrangian relaxation, Hochbaum [7] presented a 2-approximation algorithm with a running time of O(nmlogn2mlogn). Based on the local-ratio technique, Bar-Yehuda [8] presented a 2-approximation algorithm with a running time of O(n2). Furthermore, on the basis of the primal-dual framework, Gandhi et al. [9] presented a 2-approximation algorithm with a running time of O(n(nlogn+m)) and Julián [10] reduced the running time to O(nlogn+m) based on the pruning technique.
Karp [1] proposed the prize-collecting minimum vertex cover problem (PCMVC), which is another generalization of the MVC. In this variant, each edge e can be either covered by a vertex set or uncovered and a penalty π(e) is paid. The objective is to minimize the total cost of vertices in this set plus the overall penalty of uncovered edges. If π(e)= for every edge e, the PCMVC is exactly the MVC. For the PCMVC, based on the LP-rounding technique, Hochbaum [11] presented a 2-approximation algorithm with a running time of O(n3). Based on the primal-dual framework, Bar-Yehuda and Rawitz [12] proposed a linear-time 2-approximation algorithm.
Submodular function is a set function with the property of decreasing marginal return, and plays a key role in combinatorial optimization somewhat similar to that played by convex/concave function in continuous optimization. There has been a lot of work on the submodular function optimization [13-16]. The minimum submodular vertex cover problem (MSVC) is one type of submodular function optimization problem and its objective is to find a minimum cost subset S of V to cover all the edges, where the cost of S is determined by a submodular function. Iwata and Nagano [17] presented a combinatorial 2-approximation algorithm based on the primal-dual framework. If the submodular function is linear, the MSVC is exactly the MVC. Recently, Xu et al. [18] considered the minimum submodular vertex cover problem with submodular penalties (MSVCS), which is a generalization of the PCMVC and MSVC. In the MSVCS, the cost of vertex set and the penalty of uncovered edge set are determined by two submodular function, respectively. If the penalty of any edge set is infinity, the MSVCS is exactly the MSVC; If two submodular functions are all linear, the MSVCS is exactly the PCMVC. Xu et al. [18] presented a combinatorial 4-approximation algorithm by relaxing the dual program to a slightly weaker version, which was improved by Kamiyama [19] with a 3-approximation algorithm.
Motivated by the above work, in this paper, we consider the k-prize-collecting minimum vertex cover problem with submodular penalties (k-PCVCS), which is a generalization of the MVC [1], MPVC [6], and PCMVC [11]. The k-PCVCS finds a vertex set S that covers at least k edges, and the objective is to minimize the total cost of the vertices in S plus the penalty of the uncovered edge set, where km, and the penalty is determined by a submodular function. In this paper, we design a two-phase combinatorial algorithm based on the guessing technique and the primal-dual framework to address the k-PCVCS. When the submodular penalty cost function is normalized and nondecreasing, the proposed algorithm has an approximation factor of 3. When the submodular penalty cost function is linear, this problem is a special case of the P-prize-collecting set cover problem [20]. For this problem, the approximation factor of the algorithm in [20] is 4, which is the current best factor. In this paper, we prove that the approximation factor of the two-phase combinatorial algorithm is 2, which is the best factor if the unique game conjecture holds.
The remainder of this paper is structured as follows. In Section 2, we provide basic definitions and a formal problem statement. In Section 3, we focus on the k-PCVCS and propose the two-phase combinatorial algorithm. In Section 4, we provide a brief conclusion.

2 Preliminaries

Let E be a given ground set, and let π():2ER0 be a real-valued set function defined on all subsets of E. If
π(E1)+π(E2)π(E1E2)+π(E1E2),E1,E2E,
then π() is called a submodular function. The submodular function is nondecreasing if π(E1)π(E2), E1E2E. The submodular function π() is normalized if π()=0. If π() is normalized and
π(E1)+π(E2)=π(E1E2)+π(E1E2),E1,E2E,
then π() is called a linear function.
The k-prize-collecting minimum vertex cover problem with submodular penalties (k-PCVCS) is defined as follows: consider an instance I=(G;c,π;k), where G=(V,E) is a graph with V={v1,v2,,vn} and E={e1,e2,, em}, k is an integer satisfying 0km, c:VR+ is a cost function and π():2ER0 is a submodular penalty cost function. An edge e is covered by a set if at least one of the incident vertices of e is in this set. The k-PCVCS finds a pair (S,R), where SV is the vertex set that covers at least k edges, and RE is the set of edges uncovered by S. The objective is to minimize the cost c(S)+π(R), where
c(S)=v:vSc(v).
To obtain the expected approximation factor, a preprocessing step is required: guessing the maximum cost vertex vmax in an optimal solution, where
vmax=argmaxvSc(v),
and (S,R) is an optimal solution for instance I. Using a preprocessing step: guessing the maximum cost of a vertex in an optimal solution. We can assume that vmax is known.
Using vmax, we construct a graph G{vmax} by removing vertex vmax, i.e., G{vmax}=(V{vmax},Eδ({vmax})), where δ({vmax}) is the set of edges covered by vertex vmax. Then, we construct an auxiliary instance I{vmax}=(G{vmax};c,π;k|δ({vmax})|) of I=(G;c,π;k), where for any vertex vV{vmax}
c(v)={c(v),ifc(v)c(vmax);+,otherwise.
Let OPTI{vmax} be the optimal objective value of instance I{vmax}. We can obtain the following lemma.
Lemma 2.1 OPTI{vmax}+c(vmax)=OPTI, where OPTI=c(S)+π(R) is the objective value of the optimal solution (S,R) of instance I.
Proof By the definition of c() and vmax=argmaxvSc(v), we have
OPTI=v:vSc(v)=v:vSc(v).
Since S covers at least k edges in E, S{vmax} covers at least k|δ(vmax)| edges in Eδ({vmax}), and (S{vmax},R) is a feasible solution of instance I{vmax}, and we have
OPTI{vmax}c(S)c(vmax)+π(R)=OPTIc(vmax),
where the inequality follows from the OPTI{vmax} is the optimal objective value of instance I{vmax}, and the equality follows from the definition of c() in Eq. (1).
Let (S,R) be an optimal solution of instance I{vmax}. By the definition of c() and I{vmax}OPTIc(vmax)+, it is not hard to obtain that
c(v)=c(v),vS.
For instance I, S covers at least k|δ(vmax)| edges in Eδ({vmax}), and S{vmax} covers at least k edges in E. Thus, (S{vmax},R) is a feasible solution of instance I, and the optimal objective value of instance I is
OPTIc(S{vmax})+π(R)=c(S)+c(vmax)+π(R)=c(S)+π(R)+c(vmax)=OPTI{vmax}+c(vmax).
This statement and inequality Eq. (2) imply that the lemma holds.                        □

3 A combinatorial algorithm for k-PCVCS

In this section, we first present a two-phase primal-dual approximation algorithm for instance I{vmax}. Then, using this two-phase primal-dual algorithm and the guessing technique, we present a combinatorial approximation algorithm for instance I. If the submodular penalty cost function π() is normalized and nondecreasing, we prove that the approximation factor of this combinatorial algorithm is 3. In particular, if π() is linear, we prove that this approximation factor is reduced to 2.

3.1 A two-phase algorithm for instance I{vmax}

For simplicity of notation, we use I=(G;c,π;k) to denote I{vmax}=(G{vmax};c,π;k|δ({vmax})|).
We introduce a binary variable xv for each vertex vV, where
xv={1,ifvis selected to cover some edges,0,otherwise.
For each subset RE, we introduce a binary variable zR, where
zR={1,ifRis the set of the uncovered edges,0,otherwise.
We have the following integer linear program for the k-PCVCS.
minv:vVc(v)xv+R:REπ(R)zRs.t.v:vV(e)xv+R:REandeRzR1,eE,R:RE|R|zRmk,xv,zR{0,1},vV,RE,
where V(e) is the set of incident vertices of edge e, the first set of constraints of Eq. (3) guarantees that each edge eE is either covered by at least one of its incident vertices or in the set of uncovered edges, and the second constraint of Eq. (3) guarantees that the number of uncovered edges of any feasible solution is at most mk. Relaxing the integrality constraints, we obtain the linear program as follows.
minv:vVc(v)xv+R:REπ(R)zRs.t.v:vV(e)xv+R:REandeRzR1,eE,R:RE|R|zRmk,xv0andzR0,vV,RE.
Note that we need not to add the constraints xv1 and zR1 since they are automatically satisfied in an optimal solution. The corresponding dual program is
maxe:eEye(mk)γs.t.e:eδ({v})yec(v),vV,e:eRye|R|γπ(R),RE.ye0andγ0,eE,
where δ({v}) is the set of edges covered by vertex v. For a dual feasible solution (y,γ)=({ye}eE,γ) of Eq. (4), we say that a vertex vV is tight if e:eδ({v})ye=c(v), and an edge set RE is tight if e:eRye=π(R).
Then, we present the two-phase primal-dual algorithm:
Phase 1 We keep γ=0 and find a dual feasible solution of (y,0) such that each edge is covered by a tight vertex or is in a tight edge set. To obtain this feasible solution, we start from the trivial dual feasible solution of zero.
Initially, γ is frozen, the other dual variables are active, and their dual values are equal to 0. The dual values for the active dual variables are increased simultaneously until either some vertex or some edge set becomes tight. If a vertex becomes tight, then it is added to the tight vertex set Vtight, and the dual variables of all active edges covered by this vertex are frozen. Otherwise, if an edge set becomes tight, the dual variables of all active edges in this edge set are frozen. The process is iterated until all dual variables {ye}eE are frozen. For any eE, the dual value for any dual variables will no longer increase after becoming frozen, and let ye be the dual value when it is frozen. If |δ(Vtight)|k, then output pair (S,R):=(Vtight,Eδ(Vtight)) and stop the algorithm, where δ(Vtight) is the set of edges covered by Vtight; otherwise, go to Phase 2.
Phase 2 Based on increasing dual variable γ, we select some vertices added to the tight vertex set Vtight such that Vtight covers at least k edges. We start from the dual feasible solution (y,0) for dual program Eq. (4), which is proven in Lemma 3.3.
Initially, set the dual feasible solution (y,γ)=(y,0); all dual variables covered by Vtight are frozen, and the other dual variables are active. The dual value of the active dual variables are increased simultaneously until a vertex becomes tight. This vertex is added to the tight vertex set Vtight, and the dual variables of all active edges covered by this vertex are frozen. This process is iterated until |δ(Vtight)|k and output pair (S,R), where S=Vtight and R=Eδ(S).
For any eE, let ye be the dual value for any eE when it is frozen. Since the dual value for any eE will no longer increase after ye is frozen, (y,γ) is a dual feasible solution, which is proven in Lemma 3.5. Since the dual variable γ continues increasing until |δ(Vtight)|k, we have
γ=maxe:eE(yeye).
We propose the detailed primal-dual algorithm in Algorithm 1.
Next, we use an example to illustrate our algorithm: we are given an instance I=(G;c,π;k) (Fig.1), where G=(V,E) and k=3. The vertex cost is c(v1)=1, c(v2)=8, and c(v3)=c(v4)=9, and the penalty function
Fig.1 For instance I=(G;c,π;k), we illustrate Phase 1 in a, b and c; and illustrate Phase 2 in d and e

Full size|PPT slide

π({E})={2,ifEEand|T|=1,3,ifEEand|T|=2,4,ifEEand|T|=3,5,ifE=E.
Lemma 3.1 Algorithm 1 can be implemented in O(n16ρ+n17), where ρ is the time for one function evaluation, i.e., the time to determine π(S) given S.
Proof It is easy to obtain that the running time of Algorithm 1 is determined by the running time of Phase 1. Let Eact(j) be the set of active edges generated after the jth loop (or before the (j+1)th loop) of Phase 1, i.e., Eact(0)=E before the 1-loop.
In any loop of Phase 1, without loss of generality, we assume that the number of this loop is j+1, and simultaneously increase the dual variable {ye}eEact(j) until either some vertex v becomes tight or some edge set E becomes tight. The tight vertex v can be determined by calculating the minimum value
Δv=minv:Eact(j)δ(v)c(v)e:eδ(v)Eact(j)ye|Eact(j)δ(v)|.
Clearly, the value of Δv can be found in O(n) by {v:Eact(j)δ(v)}V and |V|=n.
The tight edge set ET can be determined by calculating the minimum value
ΔET=minE:Eact(j)Eπ(E)e:eEEact(j)ye|Eact(j)E|=minE1E2:E1Eact(j)andE2EEact(j)π(E1E2)e:eE2ye|E1|=minE1:E1Eact(j)minE2:E2EEact(j)(π(E1E2)e:eE2ye)|E1|=minE1:E1Eact(j)minE2:E2EEact(j)(wE1,j(S))|E1|=minE1:E1Eact(j)w(E1)|E1|,
where the relationship of the sets is shown in Fig.2, we define wE1,j(E1)=π(E1E2)e:eE2ye for any E2EEact(j), and w(E1)=minE2:E2EEact(j)(π(E1E2)e:eE2ye) for any E1Eact(j). This means, for any E1Eact(j), wE1,j():2EEact(j)R0 is a real-valued set function defined on all subsets of EEact(j), where the non negativity of wE1,j() comes from the second set of constraints of Eq. (4) and γ=0 in Phase 1.
Fig.2 The relationship of E, E1 and E2

Full size|PPT slide

Given an edges set E1Eact(j), for any two subsets E2(1),E2(2)EEact(j), we have
wE1,j(E2(1))+wE1,j(E2(2))=π(E1E2(1))e:eE2(1)ye+π(E1E2(2))e:eE2(2)yeπ(E1(E2(1)E2(2)))e:eE2(1)E2(2)ye+π(E1(E2(1)E2(2)))e:eE2(1)E2(2)ye=wE1,j(E2(1)E2(2))+wE1,j(E2(1)E2(2)),
where the inequality follows from the submodularity of π(). Thus, wE1,j() is a submodular function, and by [21]
w(E1)canbefoundinO(n7ρ+n8),
where w(E1)=minE2EEact(j)(wE1,j(E2)), and ρ is the time for one function evaluation, i.e., the time to determine π(E) given EE.
For any two subsets E1(1),E1(2)Eact(j), let
S1=argminS:SEEact(j)wE1(1),j(S)andS2=argminS:SEEact(j)wE1(2),j(S),
we have
w(E1(1))+w(E1(2))=wE1(1),j(S1)+wE1(2),j(S2)=π(E1(1)S1)e:eS1ye+π(E1(2)S2)e:eS2yeπ((E1(1)S1)(E1(2)S2))e:eS1S2ye+π((E1(1)S1)(E1(2)S2))e:eS1S2yeminS:SEEact(j)(π((E1(1)E1(2))S)e:eSye)+minS:SEEact(j)(π((E1(1)E1(2))S)e:eSye),=w(E1(1)E1(2))+w(E1(1)E1(2)),
where the first inequality follows from the submodularity of π(). Therefore, w() is a submodular function.
Thus, similar to the optimization problem of minimizing the ratio of a submodular function and a positive linear function [21], the value of ΔET can be computed in O(n15ρ+n16) by (5). Since at least one edge is frozen in each loop of Phase 1, and Algorithm 1 can be implemented in O(n16ρ+n17).  □
Let (S,R) be the optimal pair for the k-PCVCS, let OPT be the objective value for (S,R), and let (S,R) be the output pair by Algorithm 1 and OUT be the objective value for (S,R). Since (S,R) can be generated by either Phase 1 or Phase 2, we first consider the case in which (S,R) is generated by Phase 1.
Let (y,0) be the dual value after Phase 1.
Lemma 3.2 (y,0) is a feasible solution for dual program Eq. (4).
Proof In Phase 1, when any vertex becomes tight, the dual variable of the edges incident to this vertex will no longer increase, which means
e:eδ(v)yec(v),vV.
Similarly, we have
e:eEyeπ(E),EE.
Therefore, (y,0) is a feasible solution for dual program Eq. (4).                      □
Lemma 3.3 If the pair (S,R) is generated by Phase 1, the cost of the vertex set of S is
c(S)=v:vSc(v)2e:eδ(S)ye.
Proof Since any vertex vS is tight, we have
c(S)=v:vSc(v)=v:vSe:eδ(v)ye=e:eδ(S)ye|V(e)S|2e:eδ(S)ye,
where V(e) is the set of incident vertices of edge e and the first inequality follows from the fact that any edge in E is incident to two vertices.                    □
In Phase 1, let T be the set of tight edge sets, i.e., for any ETT, we have π(ET)=e:eETye. Let Etight=ET:ETTET.
Lemma 3.4.
π(Etight)=e:eEtightye.
Proof Considering any two different tight edge sets E1T and E2T in T, we have
π(E1T)=e:eE1Tye,andπ(E2T)=e:eE2Tye.
Therefore,
e:eE1TE2Tye+e:eE1TE2Tye=e:eE1Tye+e:eE2Tye=π(E1T)+π(E2T)π(E1TE2T)+π(E1TE2T)π(E1TE2T)+e:eE1TE2Tye,
where the first inequality follows from the submodularity of π() and the second inequality follows from inequality Eq. (6), which implies that
e:eE1TE2Tyeπ(E1TE2T).
Furthermore, this statement and inequality Eq. (6) imply that e:eE1TE2Tye=π(E1TE2T), which means that E1TE2T is a tight subset. By repeating the merging of the tight subsets in T, we obtain that Etight=ETTET is a tight subset, and the lemma holds.                     □
Then, we consider the case in which (S,R) is generated by Phase 2 Consistent with the above definition, let (y,0) be the value of the dual variables after Phase 1, and let (y,γ) be the value of the dual variables after Phase 2.
Lemma 3.5 (y,γ) is a feasible solution of dual program Eq. (4).
Proof In Algorithm 1, any dual variable of an edge that is covered by any tight vertex remains unchanged, which means
e:eδ(v)yec(v),vV.
Since γ keeps increasing in Phase 2, we have γ=maxeE(yeye) and
yeγye,eE.
Thus, for any edge set EE, we have
e:eEye|E|γ=e:eE(yeγ)e:eEyeπ(E),
where the last inequality follows from Lemma 3.2. Therefore, the lemma holds.                  □
Lemma 3.6 If the pair (S,R) is generated by Phase 2, the cost of vertex set S is
c(S)2e:eEye2e:eEδ(S{vlast})ye2(mk)γ+c(vlast),
where vlast is the last vertex added to the tight vertex set in Phase 2.
Proof Since vlast is the last vertex added to the tight vertex set in Phase 2,
|δ(S)|kand|δ(S{vlast})|<k.
Any edge eEδ(S{vlast})) is not covered by any tight vertex before the last iteration of Phase 2, and dual variables {ye}eEδ(S{vlast}) and γ both increase simultaneously until vertex vlast becomes tight. Thus, we have
ye=ye+γ,eEδ(S{vlast}).
Since any vertex vS is tight, we have
c(v)=e:eδ({v})ye,vS.
Thus, the cost of vertex set S is
c(S)=v:vSc(v)=v:vS{vlast}e:eδ(v)ye+c(vlast)=e:eδ(S{vlast})ye|V(e)(S{vlast})|+c(vlast)2e:eδ(S{vlast})ye+c(vlast)=2e:eEye2e:eEδ(S{vlast})ye+c(vlast)=2e:eEye2e:eEδ(S{vlast})(ye+γ)+c(vlast)=2e:eEye2e:eEδ(S{vlast})ye2|Eδ(S{vlast})|γ+c(vlast)2e:eEye2e:eEδ(S{vlast})ye2(mk)γ+c(vlast),
where the first inequality follows from the fact that any edge is incident to two vertices, and the second inequality follows from |E|=m, inequality Eq. (8) and γ0.     □
Theorem 3.7 If π() is a normalized and nondecreasing function, Algorithm 1 can output a feasible solution (S,R) of instance I satisfying
c(S)+π(R)3OPT+c(vlast),
where OPT is the optimal value of instance I.
Proof By Lemma 3.2 and Lemma 3.5, we have
eEyeOPTDPOPTandeEye(mk)γOPTDPOPT,
where OPTDP is the optimal value of dual program Eq. (4) and OPTDPOPT follows from the famous duality theorem.
Regardless of whether (S,R) is generated by Phase 1 or Phase 2, we have REtight. By the nondecreasing function π() and Lemma 3.4, we have
π(R)π(Etight)=e:eEtightye.
If (S,R) is generated by Phase 1, the objective value of (S,R) is
c(S)+π(R)2e:eδ(S)ye+e:eEtightye3eEye3OPT,
where the first inequality follows from Lemma 3.3, the second inequality follows from δ(S)E and EtightE, and the last inequality follows from inequality Eq. (9).
If (S,R) is generated by Phase 2, the objective value of (S,R) is
c(S)+π(R)2e:eEye2e:eEδ(S{vlast})ye2(mk)γ+c(vlast)+e:eEtightye2(eEye(mk)γ)+eEye+c(vlast)3OPT+c(vlast),
where the first inequality follows from Lemma 3.6, the second inequality follows from EtightE and ye0 for any eE, and the last inequality follows from inequality Eq. (9).
Therefore, the theorem holds.              □
In particular, if π() is a linear function, i.e., π(E)=e:eEπ({e}) for any EE, we have the following theorem.
Theorem 3.8 If π() is a linear function, Algorithm 1 can output a feasible solution (S,R) of instance I satisfying
c(S)+π(R)2OPT+c(vlast),
where OPT is the optimal value of instance I.
Proof Since REtight, any edge eR is tight and
π(R)=e:eRπ({e})=e:eRye.
If (S,R) is generated by Phase 1, the objective value of (S,R) is
c(S)+π(R)2e:eδ(S)ye+e:eRye2eEye2OPT,
where the first inequality follows from Lemma 3.3, the second inequality follows from R=Eδ(S), and the last inequality follows from inequality (9).
If (S,R) is generated by Phase 2, the objective value of (S,R) is
c(S)+π(R)2e:eEye2e:eEδ(S{vlast})ye2(mk)γ+c(vlast)+e:eRye2(eEye(mk)γ)+c(vlast)2OPT+c(vlast),
where the first inequality follows from Lemma 3.6, the second inequality follows from R=Eδ(S)Eδ(S{vlast}), and the last inequality follows from inequality Eq. (9). Therefore, the theorem holds.                   □

3.2 A combinatorial algorithm of the k-PCVCS

In fact, we cannot know the maximum cost vertex vmax in advance; however, we can guess this vertex by enumerating all the vertices in V. Thus, for each vV, the combinatorial algorithm constructs the auxiliary instance I{v} defined in Section 2, and we find a feasible solution (Sv,Rv) of instance I{v} using Algorithm 1. Let
v=argminvV(c(Sv)+π(Rv)+c(v)),
and the combinatorial algorithm outputs (S,R)=(Sv{v},Rv). We propose the detailed algorithm in Algorithm 2.
Theorem 3.9 If π() is a normalized and nondecreasing function, Algorithm 2 is a combinatorial 3-approximation algorithm for the k-PCVCS. Specifically, if π() is a linear function, Algorithm 2 is a 2-approximation algorithm.
Proof Let (S,R) be the optimal solution for instance I and OPTI be the objective value of S,R. Let vmax=argmaxvSc(v) and let I{vmax} be the auxiliary instance defined in Section 2. Let (Svmax,Rvmax) be the output solution of instance I{vmax} using Algorithm 1. By the definition of I{vmax}, we have
c(vlast)c(vmax),
where vlast is the last vertex added to Svmax.
Since v=argminvV(c(Sv)+π(Sv)+c(v)), the objective of (S,R) is
OUT=c(Sv{v})+π(Rv)c(Svmax{vmax})+π(Rvmax)=c(Svmax)+π(Rvmax)+c(vmax)3OPTI{vmax}+c(vlast)+c(vmax)3(OPTI{vmax}+c(vmax))3OPTI,
where the second inequality follows from Theorem 3.7, the third inequality follows from inequality Eq. (10), and the last inequality follows from Lemma 2.1.
If π() is a linear function, similar to the proof above, the objective of (S,R) is
OUTc(Svmax)+π(Rvmax)+c(vmax)2OPTI{vmax}+c(vlast)+c(vmax)2(OPTI{vmax}+c(vmax))2OPTI,
where the second inequality follows from Theorem 3.8.
For each vV, Algorithm 2 must run Algorithm 1 once. This statement and Lemma 3.1 imply that Algorithm 2 can be implemented in can be computed in O(n17ρ+n18).     □

4 Conclusions

In this paper, we consider the k-prize-collecting minimum vertex cover problem with submodular penalties (k-PCVCS), which strictly requires both δ(S)R= and δ(S)R=E to be established, where (S,R) is a feasible solution for k-PCVCS, and δ(S) is the set of edges covered by S. When the submodular penalty cost function is normalized and nondecreasing, we propose a combinatorial 3-approximation algorithm. In many practical situations, we can relax the condition of k-PCVCS as δ(S)R and δ(S)R=E. For this relaxed problem, for the submodular penalty cost function that is not normalized and nondecreasing, the proposed algorithm also has an approximation ratio of 3. When the submodular penalty cost function is linear, we prove the approximation factor of the proposed algorithm is reduced to 2, which is the best factor if the unique game conjecture holds.
In the real world, the penalty cost function may not be submodular, and the topic could be further studied in the following ways. The version with general π() penalties is worth considering, such as, π() is subadditive or supermodular. Recently, there have been many studies on the minimum vertex cover problem with hard capacities [22-24], in which each vertex v is associated with a capacity cv. The goal of this problem is to select a minimum cost vertex set S such that all edges are covered by S and each vertex vS covers at most cv edges in δ(v). Thus, the k-PCVCS with hard capacities, which can be viewed as a generalization of the k-PCVCS, deserves to be explored. It is possible to design a combinatorial 3-approximation algorithm, but it is a challenge.

Acknowledgements

The work was supported in part by the National Natural Science Foundation of China (Grant No. 12071417).
1
Karp R M. Reducibility among combinatorial problems. In: Miller R E, Thatcher J W, Bohlinger J D, eds. Complexity of Computer Computations. Boston: Springer, 1972, 85–103

2
Vazirani V V. Approximation Algorithms. Berlin, Heidelberg: Springer, 2001

3
Khot S, Regev O . Vertex cover might be hard to approximate to within 2 -ε. Journal of Computer and System Sciences, 2008, 74( 3): 335–349

4
Hochbaum D S . Approximation algorithms for the set covering and vertex cover problems. SIAM Journal on Computing, 1982, 11( 3): 555–556

5
Bar-Yehuda R, Even S . A linear-time approximation algorithm for the weighted vertex cover problem. Journal of Algorithms, 1981, 2( 2): 198–203

6
Bshouty N H, Burroughs L. Massaging a linear programming solution to give a 2-approximation for a generalization of the vertex cover problem. In: Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science. 1998, 298–308

7
Hochbaum D S. The t-vertex cover problem: extending the half integrality framework with budget constraints. In: Proceedings of International Workshop on Approximation Algorithms for Combinatorial Optimization. 1998, 111–122

8
Bar-Yehuda R . Using homogeneous weights for approximating the partial cover problem. Journal of Algorithms, 2001, 39( 2): 137–144

9
Gandhi R, Khuller S, Srinivasan A . Approximation algorithms for partial covering problems. Journal of Algorithms, 2004, 53( 1): 55–84

10
Mestre J . A primal-dual approximation algorithm for partial vertex cover: making educated guesses. Algorithmica, 2009, 55( 1): 227–239

11
Hochbaum D S . Solving integer programs over monotone inequalities in three variables: a framework for half integrality and good approximations. European Journal of Operational Research, 2002, 140( 2): 291–321

12
Bar-Yehuda R, Rawitz D . On the equivalence between the primal-dual schema and the local ratio technique. SIAM Journal on Discrete Mathematics, 2005, 19( 3): 762–797

13
Li Y, Du D, Xiu N, Xu D . Improved approximation algorithms for the facility location problems with linear/submodular penalties. Algorithmica, 2015, 73( 2): 460–482

14
Du D, Lu R, Xu D. A primal-dual approximation algorithm for the facility location problem with submodular penalties. Algorithmica, 2012, 63(1–2): 1–2

15
Liu X, Li W . Approximation algorithms for the multiprocessor scheduling with submodular penalties. Optimization Letters, 2021, 15( 6): 2165–2180

16
Liu X, Li W, Xie R. A primal-dual approximation algorithm for the k-prize-collecting minimum power cover problem. Optimization Letters, 2021,

DOI

17
Iwata S, Nagano K. Submodular function minimization under covering constraints. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science. 2009, 671–680

18
Xu D, Wang F, Du D, Wu C . Approximation algorithms for submodular vertex cover problems with linear/submodular penalties using primal-dual technique. Theoretical Computer Science, 2016, 630: 117–125

19
Kamiyama N . A note on the submodular vertex cover problem with submodular penalties. Theoretical Computer Science, 2017, 659: 95–97

20
Guo J S, Liu W, Hou B. An approximation algorithm for p-prize-collecting set cover problem. Journal of the Operations Research Society of China, 2021,

DOI

21
Fleischer L, Iwata S . A push-relabel framework for submodular function minimization and applications to parametric optimization. Discrete Applied Mathematics, 2003, 131( 2): 311–322

22
Kao M J, Shiau J Y, Lin C C, Lee D T . Tight approximation for partial vertex cover with hard capacities. Theoretical Computer Science, 2019, 778: 61–72

23
Cheung W C, Goemans M X, Wong S C W. Improved algorithms for vertex cover with hard capacities on multigraphs and hypergraphs. In: Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms. 2014, 1714–1726

24
Wong S C W. Tight algorithms for vertex cover with hard capacities on multigraphs and hypergraphs. In: Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms. 2017, 2626–2637

Outlines

/