{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article7585","name":"Network Design with Coverage Costs","abstract":"We study network design with a cost structure motivated by redundancy in data traffic. We are given a graph, g groups of terminals, and a universe of data packets. Each group of terminals desires a subset of the packets from its respective source. The cost of routing traffic on any edge in the network is proportional to the total size of the distinct packets that the edge carries. Our goal is to find a minimum cost routing. We focus on two settings. In the first, the collection of packet sets desired by source-sink pairs is laminar. For this setting, we present a primal-dual based 2-approximation, improving upon a logarithmic approximation due to Barman and Chawla (2012){BC12}. In the second setting, packet sets can have non-trivial intersection. We focus on the case where each packet is desired by either a single terminal group or by all of the groups. This setting does not admit an O(log^{{1}\/{4} - gamma} g)-approximation for any constant gamma under a standard assumption; we present an O(log g)-approximation when the graph is unweighted.\r\n\r\nOur approximation for the second setting is based on a novel spanner-type construction in unweighted graphs that, given a collection of g vertex subsets, finds a subgraph of cost only a constant factor more than the minimum spanning tree of the graph, such that every subset in the collection has a Steiner tree in the subgraph of cost at most O(log g) that of its minimum Steiner tree in the original graph. We call such a subgraph a group spanner.","keywords":["Network Design","Spanner","Primal Dual Method","Traffic Redundancy"],"author":[{"@type":"Person","name":"Barman, Siddharth","givenName":"Siddharth","familyName":"Barman"},{"@type":"Person","name":"Chawla, Shuchi","givenName":"Shuchi","familyName":"Chawla"},{"@type":"Person","name":"Umboh, Seeun","givenName":"Seeun","familyName":"Umboh"}],"position":4,"pageStart":48,"pageEnd":63,"dateCreated":"2014-09-04","datePublished":"2014-09-04","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Barman, Siddharth","givenName":"Siddharth","familyName":"Barman"},{"@type":"Person","name":"Chawla, Shuchi","givenName":"Shuchi","familyName":"Chawla"},{"@type":"Person","name":"Umboh, Seeun","givenName":"Seeun","familyName":"Umboh"}],"copyrightYear":"2014","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.APPROX-RANDOM.2014.48","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":["http:\/\/www.bluecoat.com","http:\/\/www.riverbed.com\/us\/solutions\/optimization"],"isPartOf":{"@type":"PublicationVolume","@id":"#volume6231","volumeNumber":28,"name":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX\/RANDOM 2014)","dateCreated":"2014-09-04","datePublished":"2014-09-04","editor":[{"@type":"Person","name":"Jansen, Klaus","givenName":"Klaus","familyName":"Jansen"},{"@type":"Person","name":"Rolim, Jos\u00e9","givenName":"Jos\u00e9","familyName":"Rolim"},{"@type":"Person","name":"Devanur, Nikhil R.","givenName":"Nikhil R.","familyName":"Devanur"},{"@type":"Person","name":"Moore, Cristopher","givenName":"Cristopher","familyName":"Moore"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article7585","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6231"}}}