{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article8064","name":"The Container Selection Problem","abstract":"We introduce and study a network resource management problem that is a special case of non-metric k-median, naturally arising in cross platform scheduling and cloud computing. In the continuous d-dimensional container selection problem, we are given a set C of input points in d-dimensional Euclidean space, for some d >= 2, and a budget k. An input point p can be assigned to a \"container point\" c only if c dominates p in every dimension. The assignment cost is then equal to the L1-norm of the container point. The goal is to find k container points in the d-dimensional space, such that the total assignment cost for all input points is minimized. The discrete variant of the problem has one key distinction, namely, the container points must be chosen from a given set F of points.\r\n\r\nFor the continuous version, we obtain a polynomial time approximation scheme for any fixed dimension d>= 2. On the negative side, we show that the problem is NP-hard for any d>=3. We further show that the discrete version is significantly harder, as it is NP-hard to approximate without violating the budget k in any dimension d>=3. Thus, we focus on obtaining bi-approximation algorithms. For d=2, the bi-approximation guarantee is (1+epsilon,3), i.e., for any epsilon>0, our scheme outputs a solution of size 3k and cost at most (1+epsilon) times the optimum. For fixed d>2, we present a (1+epsilon,O((1\/epsilon)log k)) bi-approximation algorithm.","keywords":["non-metric k-median","geometric hitting set","approximation algorithms","cloud computing","cross platform scheduling."],"author":[{"@type":"Person","name":"Nagarajan, Viswanath","givenName":"Viswanath","familyName":"Nagarajan"},{"@type":"Person","name":"Sarpatwar, Kanthi K.","givenName":"Kanthi K.","familyName":"Sarpatwar"},{"@type":"Person","name":"Schieber, Baruch","givenName":"Baruch","familyName":"Schieber"},{"@type":"Person","name":"Shachnai, Hadas","givenName":"Hadas","familyName":"Shachnai"},{"@type":"Person","name":"Wolf, Joel L.","givenName":"Joel L.","familyName":"Wolf"}],"position":25,"pageStart":416,"pageEnd":434,"dateCreated":"2015-08-13","datePublished":"2015-08-13","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Nagarajan, Viswanath","givenName":"Viswanath","familyName":"Nagarajan"},{"@type":"Person","name":"Sarpatwar, Kanthi K.","givenName":"Kanthi K.","familyName":"Sarpatwar"},{"@type":"Person","name":"Schieber, Baruch","givenName":"Baruch","familyName":"Schieber"},{"@type":"Person","name":"Shachnai, Hadas","givenName":"Hadas","familyName":"Shachnai"},{"@type":"Person","name":"Wolf, Joel L.","givenName":"Joel L.","familyName":"Wolf"}],"copyrightYear":"2015","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.APPROX-RANDOM.2015.416","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":["http:\/\/aws.amazon.com\/ec2\/","http:\/\/wikipedia.org\/wiki\/Cloud_computing#Private_cloud"],"isPartOf":{"@type":"PublicationVolume","@id":"#volume6243","volumeNumber":40,"name":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX\/RANDOM 2015)","dateCreated":"2015-08-13","datePublished":"2015-08-13","editor":[{"@type":"Person","name":"Garg, Naveen","givenName":"Naveen","familyName":"Garg"},{"@type":"Person","name":"Jansen, Klaus","givenName":"Klaus","familyName":"Jansen"},{"@type":"Person","name":"Rao, Anup","givenName":"Anup","familyName":"Rao"},{"@type":"Person","name":"Rolim, Jos\u00e9 D. P.","givenName":"Jos\u00e9 D. P.","familyName":"Rolim"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article8064","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6243"}}}