{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article9872","name":"Improved Hardness for Cut, Interdiction, and Firefighter Problems","abstract":"We study variants of the classic s-t cut problem and prove the following improved hardness results assuming the Unique Games Conjecture (UGC). \r\n\r\n* For Length-Bounded Cut and Shortest Path Interdiction, we show that both problems are hard to approximate within any constant factor, even if we allow bicriteria approximation. If we want to cut vertices or the graph is directed, our hardness ratio for Length-Bounded Cut matches the best approximation ratio up to a constant. Previously, the best hardness ratio was 1.1377 for Length-Bounded Cut and 2 for Shortest Path Interdiction.\r\n\r\n* For any constant k >= 2 and epsilon > 0, we show that Directed Multicut with k source-sink pairs is hard to approximate within a factor k - epsilon. This matches the trivial k-approximation algorithm. By a simple reduction, our result for k = 2 implies that Directed Multiway Cut with two terminals (also known as s-t Bicut} is hard to approximate within a factor 2 - epsilon, matching the trivial 2-approximation algorithm. \r\n\r\n* Assuming a variant of the UGC (implied by another variant of Bansal and Khot), we prove that it is hard to approximate Resource Minimization Fire Containment within any constant factor. Previously, the best hardness ratio was 2. For directed layered graphs with b layers, our hardness ratio Omega(log b) matches the best approximation algorithm.\r\n\r\nOur results are based on a general method of converting an integrality gap instance to a length-control dictatorship test for variants of the s-t cut problem, which may be useful for other problems.","keywords":["length bounded cut","shortest path interdiction","multicut; firefighter","unique games conjecture"],"author":{"@type":"Person","name":"Lee, Euiwoong","givenName":"Euiwoong","familyName":"Lee"},"position":92,"pageStart":"92:1","pageEnd":"92:14","dateCreated":"2017-07-07","datePublished":"2017-07-07","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":{"@type":"Person","name":"Lee, Euiwoong","givenName":"Euiwoong","familyName":"Lee"},"copyrightYear":"2017","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2017.92","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","isPartOf":{"@type":"PublicationVolume","@id":"#volume6283","volumeNumber":80,"name":"44th International Colloquium on Automata, Languages, and Programming (ICALP 2017)","dateCreated":"2017-07-07","datePublished":"2017-07-07","editor":[{"@type":"Person","name":"Chatzigiannakis, Ioannis","givenName":"Ioannis","familyName":"Chatzigiannakis"},{"@type":"Person","name":"Indyk, Piotr","givenName":"Piotr","familyName":"Indyk"},{"@type":"Person","name":"Kuhn, Fabian","givenName":"Fabian","familyName":"Kuhn"},{"@type":"Person","name":"Muscholl, Anca","givenName":"Anca","familyName":"Muscholl"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article9872","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6283"}}}