Abstract 1 Introduction 2 Budgeted Dependent Rounding 3 Application to Budgeted Santa Claus Problem 4 Conclusion References Appendix A Appendix

Cost Preserving Dependent Rounding for Allocation Problems

Lars Rohwedder University of Southern Denmark, Odense, Denmark Arman Rouhani Maastricht University, The Netherlands Leo Wennmann University of Southern Denmark, Odense, Denmark
Abstract

We present a dependent randomized rounding scheme, which rounds fractional solutions to integral solutions satisfying certain hard constraints on the output while preserving Chernoff-like concentration properties. In contrast to previous dependent rounding schemes, our algorithm guarantees that the cost of the rounded integral solution does not exceed that of the fractional solution. Our algorithm works for a class of assignment problems with restrictions similar to those of prior works.

In a non-trivial combination of our general result with a classical approach from Shmoys and Tardos [Math. Programm.’93] and more recent linear programming techniques developed for the restricted assignment variant by Bansal, Sviridenko [STOC’06] and Davies, Rothvoss, Zhang [SODA’20], we derive a O(logn)-approximation algorithm for the Budgeted Santa Claus Problem. In this new variant, the goal is to allocate resources with different values to players, maximizing the minimum value a player receives, and satisfying a budget constraint on player-resource allocation costs.

Keywords and phrases:
Matching, Randomized Rounding, Santa Claus, Approximation Algorithms
Category:
Track A: Algorithms, Complexity and Games
Copyright and License:
[Uncaptioned image] © Lars Rohwedder, Arman Rouhani, and Leo Wennmann; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Rounding techniques
Related Version:
Full Version: https://arxiv.org/abs/2502.08267
Funding:
Lars Rohwedder and Leo Wennmann: Supported by Dutch Research Council (NWO) project “The Twilight Zone of Efficiency: Optimality of Quasi-Polynomial Time Algorithms” [grant number OCEN.W.21.268].
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

A successful paradigm in the design of approximation algorithms is to first solve a continuous relaxation, which can typically be done efficiently using linear programming, and then to round the fractional solution x[0,1]d to an integer solution X{0,1}d. Careful choices need to be made in the rounding step so that the error introduced is low. Independent randomized rounding is one of the most natural rounding schemes. In the simplest variant, we independently set each variable Xi to 1 with probability xi and to 0 with probability 1xi. The advantage is that the value of every linear function (over the d variables) is maintained in expectation. Moreover, for linear functions with small coefficients, a Chernoff bound yields strong concentration guarantees for the value. Hence, if the initial solution x satisfies some linear constraints from the continuous relaxation, we can often argue with several Chernoff bounds combined by a union bound that they are still satisfied up to a small error by the rounded solution X.

In some cases, however, the problem dictates structures or hard constraints on the solution. For example, we might require X to be (the incidence vector of) a perfect matching in a given graph or the basis of a given matroid. Perfect matchings or bases are objects that are quite simple in many computational aspects, but it is typically very unlikely that independent randomized rounding on a fractional object, that is, a point in the convex hull of the objects we want, results in one of these objects. This motivates so-called dependent randomized rounding. Here, the goal is to achieve similar guarantees as independent randomized rounding, but with a distribution over a restricted set of objects, which necessarily introduces some dependency between variables. These rounding schemes are typically tailored to specific object structures and achieving comparable goals is already challenging for very simple structures.

For bipartite perfect matchings, a fundamental structure in combinatorial optimization, one cannot hope to achieve similar concentration guarantees to independent randomized rounding, due to the following well-known example. Given a cycle of length n2, there are only two perfect matchings, the two alternating sets of edges. If the values of a linear function over the edges alternate between 0 and 1, then the fractional matching, which takes every edge with 1/2 will have a function value of n/2, but each of the integral matchings incurs an additive distortion of Ω(n), much higher than the bound of O(n) that holds with high probability if each edge is picked independently with probability 1/2. If one considers b-matchings or other more general assignment problems, however, then there are non-trivial guarantees that can be achieved with dependent rounding. Gandhi, Khuller, Parthasarathy, and Srinivasan [11] show that between any two edges incident to the same vertex, they can establish negative correlation. Furthermore, their algorithm has the natural property of marginal preservation, which means that the probability of Xe=1 is equal to the fractional value xe for each variable Xe. Together this implies strong concentration guarantees at least for linear functions on the incident edges of each vertex. The following proposition is a consequence of their result.

Proposition 1.

Let G=(AB,E) be a bipartite graph and x[0,1]E represent a fractional many-to-many assignment. Furthermore, let c0E, and a1,,ak[0,1]E such that for each j{1,,k} there is some vAB with supp(aj)δ(v). Then, in randomized polynomial time, one can compute X{0,1}E satisfying with constant probability

Cost Approximation.

c𝖳X(1+ϵ)c𝖳x

Concentration.

|aj𝖳xaj𝖳X|O(max{logk,aj𝖳xlogk}) for all j{1,,k}

Degree Preservation.

X(δ(v)){x(δ(v),x(δ(v))}

Here, ϵ>0 is an arbitrarily small constant that influences the success probability.

A generalization to matroid intersection with a similar restriction was shown by Chekuri, Vondrack, and Zenklusen [7]. The same work also presents a dependent rounding scheme for a single matroid that outputs a basis satisfying similar concentration bounds on linear functions without a restriction on the support. In this study, we ask the following question:

Can we avoid an error in the cost for dependent rounding while maintaining comparable other guarantees?

We call a rounding algorithm cost preserving if it does not exceed the cost of the fractional solution we start with. Here, we focus on the stronger variant where distributions are only over objects that are cost preserving, although one might be satisfied with a sufficiently high probability of cost preservation in some cases. We have no evidence that such a relaxation would make the task significantly easier.

There are several situations where even the seemingly small cost approximation of (1+ϵ), as derived from marginal preservation and Markov’s inequality in the previously mentioned result, is unacceptable. For example, the cost of the fractional solution might come from a hard budget constraint c𝖳xC in the problem. Another situation is an extension of the objective function to potentially negative values, representing for example the task of maximizing profit = revenue - cost. Here, Markov’s inequality cannot be applied at all. Finally, an algorithm that preserves the cost provides polyhedral insights: every fractional object is in the convex hull of integer objects that marginally deviate in the considered linear functions. And similarly, the (non-integral) polytope of a relaxation is contained in an approximate integral polytope. It is easy to see that cost preservation is incompatible with marginal preservation and hence cannot be satisfied by the dependent rounding schemes above: consider d+1 variables x0,x1,,xd of which exactly one is selected, then this can be modeled by bases of a uniform matroid or a degree constraint in the assignment problem above. Suppose that c1==cd=1/(12d)>1 and c0=0 where the fractional solution is given by x1==xn=(12d)/d and x0=2d, leading to a cost of 1. For a marginal preserving distribution, the probability that the integral solution X has a cost lower than 1 (i.e., X0=1) is exponentially small. Note, however, that this is not an immediate counter-example to our stated goal: in this example, deterministically choosing X0=1 (and X1==Xd=0) still maintains |a𝖳xa𝖳X|1 for every a[0,1]d+1.

Our contributions

Our results are twofold. First, we show that one can obtain comparable guarantees to Proposition 1 while preserving costs.

Theorem 2.

Let G=(AB,E) be a bipartite graph and x[0,1]E represent a many-to-many assignment. Furthermore, let cE and a1,,ak[0,1]E such that for each j{1,,k} there is some vAB with supp(aj)δ(v). Then, in randomized polynomial time, one can compute X{0,1}E satisfying with constant probability

Cost Preservation.

c𝖳Xc𝖳x,

Concentration.

|aj𝖳xaj𝖳X|O(max{logk,aj𝖳xlogk}) for all j{1,,k},

Degree Preservation.

X(δ(v)){x(δ(v)),x(δ(v))}.

Note that in contrast to the previous result, we allow for negative components in the cost function c.

Second, we present a non-trivial application of our theorem to an allocation problem we call the Budgeted Santa Claus Problem (with identical valuations). Colloquially, it is often described as Santa Claus distributing gifts to children on Christmas. Formally, there are n resources  (gifts) to be distributed among m players 𝒫 (children). Each resource j has a specific value vj0. Additionally, there is a total budget of C0, and assigning a resource j to a player i incurs a cost denoted by cij0. The goal is a distribution of resources among the players where the least happy player is as happy as possible and the total cost does not exceed the budget C. Formally, we aim to find disjoint sets Ri, i𝒫, maximizing mini𝒫jRivj while ensuring that i𝒫jRicijC. Note that not all resources need to be assigned. However, the variant, where all resources must be assigned can be shown to be not more difficult than our problem, see Appendix A.1.

It is possible to consider an even more general variant where each value vij depends on both player i and resource j, which we call the unrelated valuations. Mainly, we restrict ourselves to identical valuations because the understanding of unrelated valuations in literature is rather poor – even without considering costs. In fact, much of the recent literature is focused on the so-called restricted assignment case of unrelated valuations (without costs), where vij{0,vj}, meaning each resource is either desired with a value of vj or worthless to a player. Among players who desire a particular resource, its value is the same. Our budgeted variant generalizes the restricted assignment case: observe that by setting costs cij{0,1} and C=0, we can restrict the set of players to which a resource can be assigned. In a non-trivial framework, we apply our dependent rounding theorem to obtain the following approximation guarantee.

Theorem 3.

There is a randomized polynomial time O(logn)-approximation algorithm for the Budgeted Santa Claus problem.

Other related work for dependent rounding

Saha and Srinivasan [15] also provide a dependent rounding scheme for allocation problems, focusing on combinations of dependent and iterative rounding. Bansal and Nagarajan [5] combine dependent rounding with techniques from discrepancy theory, known as the Lovett-Meka algorithm [14]. They prove that one can round a fractional independent set (or basis) of a matroid to an integral one, while maintaining comparable concentration guarantees to both Lovett-Meka and Chernoff-type bounds. We note that Bansal and Nagarajan also integrate costs in their framework, but they make the assumption that the costs are polynomially bounded, which is inherently different from our setting (apart from the fact that they consider matroids).

Another well-known dependent rounding scheme is the maximum entropy rounding developed by Asadpour, Goemans, Mądry, Gharan and Saberi [3]. This is used to sample a spanning tree, i.e., a basis of a particular matroid, while guaranteeing negative correlation properties and therefore Chernoff-type concentration. This result led to the first improvement over the longstanding approximation rate of Θ(logn) for the asymmetric traveling salesman problem (ATSP). However, all algorithms above guarantee marginal preservation, which means they cannot guarantee cost preservation.

At least superficially related to our work is the literature on multi-budgeted independence systems [8, 12]. Here, the goal is to find objects of certain structures, e.g., matchings or independent sets of matroids, subject to several (potentially hard) packing constraints of the form a𝖳xb for some a0n, b0. This can also be used to model cost preservation alike to our results. Chekuri, Vondrak, and Zenklusen [8] and Gradoni and Zenklusen [12] show various positive results in a similar spirit to ours. These results, however, are restricted to downward-closed structures where for a given solution, formed by a set of elements, all subsets are valid solutions as well. For example, Chekuri, Vondrak, and Zenklusen achieve strong concentration results for randomized rounding on matchings, but this relies on dropping edges in long augmenting paths or cycles in order to reduce dependencies. Gradoni and Zenklusen [12] give a rounding algorithm for a constant number of hard budgets, but this requires rounding down all components of a fractional solution. Hence, these results are unable to handle instances like matroid basis constraints, perfect matching constraints, or degree preservation as in Theorem 2.

Other related work for the Santa Claus problem

Omitting the costs in the variant we study, the problem becomes significantly easier and admits an EPTAS, see e.g. [13], which relies on techniques that contrast with the ones that are relevant to us. As mentioned before, the problem with costs generalizes the restricted assignment variant and therefore inherits the approximation hardness of 2ϵ due to [6]. Here and in the following, we use restricted assignment synonymous with the variant without costs, but vij{0,vj}. Bansal and Srividenko [6] developed a randomized rounding algorithm for the restricted assignment. Normally, this would lead to a similar logarithmic approximation rate as ours (for the problem without costs), but they show that combining it with the Lovász Local Lemma yields an even better rate of O(loglogm/logloglogm). Using similar techniques, the rate was improved to a constant by Feige [10]. Note that this randomized rounding uses intricate preprocessing that violates the marginal preserving property and thus cannot even maintain the cost of a solution in expectation. Based on local search, there is also a combinatorial approach, see e.g., [4, 2, 1], which yields a (better) constant approximation for restricted assignment. However, it is not at all clear how costs could be integrated in this framework.

Finally, a classical algorithm by Shmoys and Tardos [17] gives an additive guarantee, where the rounded integral solution is only worse by the maximum value vmax=maxijvij. Therefore, it even works in the unrelated case without increasing the cost. Notably, they state this result for the dual of minimizing the maximum value, namely the Generalized Assignment Problem. The mentioned guarantee for Santa Claus is followed by a trivial adaption, see Lemma 10. Although very influential, this is the only technique we are aware of which considers the problem with costs. Unfortunately, this additive guarantee does not lead to a multiplicative guarantee, since the optimum may be lower than vmax. In fact, it is well known that the linear programming relaxation used in [17] has an unbounded integrality gap even for restricted assignment [6]. Hence, one cannot hope to improve this by a simple modification. Nevertheless, this algorithm forms an important subprocedure in our result.

Notation

First, we introduce some necessary notation. Let S,T{0,1}E be edge sets in a bipartite graph G=(AB,E). For all TS, define S(T)=eTSe. Let P be the convex hull of degree preserving edge sets S[0,1]E. Moreover, for any vAB define δ(v)={eEv is incident to e}. For the sake of simplicity, we use the shorthand notation [q]={1,,q} for any q. Furthermore, for any vector a[0,1]E, the support of a is denoted by supp(a)={eEae0}.

2 Budgeted Dependent Rounding

This section will introduce a dependent randomized rounding procedure, which produces an integral solution satisfying certain concentration guarantees, while preserving the cost and the degree of the fractional solution. The formal properties are summarized in the following theorem.

See 2

Throughout this section, the proofs of the technical lemmas are deferred to Section 2.1. An oversimplified outline of our algorithm is as follows: imagine x is the average of two integral edge sets, then the result can be shown by decomposing the symmetric difference of both edge sets into cycles and paths. We reduce to this case by starting with many edge sets and iteratively merging pairs of them in a tree-like manner.

In order to find the initial integral edge sets, we compute a representation of x (or rather another similar assignment y) that is a convex combination of degree preserving edge sets such that its scalars satisfy a certain level of discreteness. Let P be the convex hull of degree preserving edge sets S{0,1}E, that is, those S that satisfy for all vAB

S(δ(v)){x(δ(v)),x(δ(v)}.

It can be shown that x is contained in P and, in particular, x is a convex combination of degree preserving sets. In the following lemma, we show something even stronger: there exists a fractional assignment y at least as good as x, which is the convex combination of only few edge sets and has few fractional variables in the support of each constraint.

Lemma 4.

There exists a convex combination y=i[k]λiSi where λi[0,1] and i[k]λi=1 and SiP{0,1}E with

c𝖳y c𝖳x (1)
aj𝖳y =aj𝖳x j{1,,k} (2)
|{eδ(v)ye{0,1}}| 2k vAB (3)

Considering y as a vertex solution of a linear program, the proof follows from analyzing the structure of polytope P. For our algorithm, however, the scalars λi are not discrete enough. Hence, we use the following lemma to round y to a more discrete assignment y.

Lemma 5.

Let 0 and y=i[k]λiSi where λi[0,1], i[k]λi=1, and Si{0,1}E. In polynomial time, we can compute y=i[k]λiSi where i[k]λi=1 and

λi 120, i{1,,k} (4)
λi =λi, i{1,,k},λi{0,1} (5)
|yeye| k12, eE (6)
cy𝖳 cy𝖳. (7)

We prove this lemma by constructing a flow network and the standard argument that integral capacities imply existence of an integral min-cost circulation.

Notably, this is the first time we incur a small error for the linear functions aj while the cost is preserved. More precisely, we use the lemma with :=2log(2k). From Equation 6 follows that for all eE

|yeye|k1212k. (8)

Therefore, the linear functions also slightly change. Using Equations 3 and 8, it holds that for all j{1,,k}

|aj𝖳xaj𝖳y|=|aj𝖳yaj𝖳y|=eE(aj)e|yeye|1. (9)

Since y is a convex combination of (integral) degree preserving sets in P, we have yP. In other words, the scalar rounding in Lemma 5 does in fact preserve the degree of y.

Next, we construct a complete binary tree 𝒯 with levels 0,1,,, where each node will be labeled with an edge set. When the algorithm finishes, the label of the root will be X{0,1}E and satisfy the properties stated in Theorem 2. In the following, we describe how the algorithm TreeMerge creates the labels on 𝒯. The lowest level  represents the fractional assignment y=i[k]λiSi where SiP{0,1}E are degree preserving edge sets. As we can write λi=hi/2 for some hi0 and all hi sum to 2, we can naturally label hi leaves of level  with Si for all i{1,,k}. Thus, y is the average of all labels of level . For all j{0,,1}, the labels of level j are derived from those in level j+1 such that each node’s label is closely related to those of its two children. Similar to the last level, each level j represents a (fractional) edge set yj by taking the average of all labels in this level.

One of the central goals in the construction of yj is to guarantee cyj𝖳cyj+1𝖳. We achieve this by creating two complementary labelings of level j and selecting the better of the two. Denote the labels of level j+1 by S2i1,S2i for all i{1,,2j}. Here, each pair S2i1,S2i represents the children of the i-th node in level j. For node i, we construct two potential labels Ti,Ti{0,1}E using a random procedure with the following guarantees.

Lemma 6.

Let S1,S2{0,1}E. There exists a random polynomial time procedure that constructs two random edge sets T,T{0,1}E with the following properties.

  • It holds that T+T=S1+S2 and 𝔼(T)=𝔼(T)=(S1+S2)/2.

  • For all vAB it holds that T(δ(v)),T(δ(v)){(S1(δ(v))+S2(δ(v)))/2,(S1(δ(v))+S2(δ(v)))/2}.

  • For all vAB and all eδ(v), there is at most one edge eδ(v){e} such that Te depends on Te. Likewise, there is at most one edge eδ(v){e} such that Te depends on Te.

The lemma can be derived in two steps. First, decompose the symmetric difference of S1 and S2 into cycles and paths. Second, for each of cycle and path, randomly select one of the alternating edge sets for T and the other for T. This random process is similar to other dependent rounding approaches, e.g. [7, 11], except that we also store T that contains the “opposite” to every decision in T.

We create one fractional assignment from the random edge sets Ti, i{1,,2j}, and one from Ti, i{1,,2j}, and pick the lower cost assignment for yj. Formally, let

zj=12ji[2j]Ti and zj=12ji[2j]Ti

From the fact that Ti+Ti=S2i1+S2i, it immediately follows that (zj+zj)/2=yj+1. If czj𝖳czj𝖳, set yj=zj. Otherwise, yj=zj. Consequently, we have that

cyj𝖳(czj𝖳+czj𝖳)/2=cyj+1𝖳. (10)

We determine the labels of level j by picking either Ti (if zj was chosen) or Ti (if zj was chosen). Repeating the procedure for all j{1,,0} results in a label for the root node that is identical to y0. We conclude by setting X=y0. As a last step before proving the main theorem, we bound how much the linear functions aj can change in each level.

Lemma 7.

Let vAB and a[0,1]E with supp(a)δ(v). Let yj+1[0,1]E be the fractional solution of the (j+1)-th level of TreeMerge and yj[0,1]E that of the j-th level. Let t=132lnk. Then with probability at least 11/k10, it holds that

|a𝖳yja𝖳yj+1|2j/2(t+a𝖳yj+1t). (11)

This lemma follows from a standard Chernoff bound. We are now in the position to prove Theorem 2 using the lemmas above.

Proof of Theorem 2.

Let =2log(2k). As explained throughout Section 2, we use Lemmas 4 and 5 to obtain a fractional degree preserving assignment yP with cy𝖳cx𝖳. Note that the rounding of x to y marginally changes the linear function values, but we are able to maintain |aj𝖳yaj𝖳x|1, see Equation 9. Afterwards, we use the algorithm TreeMerge to construct a complete binary tree 𝒯 with +1 levels and corresponding fractional solutions y+1=y,y,,y0=X. It remains to show that X satisfies all three properties from the theorem. By construction, more precisely Equation 10, it holds that

cX𝖳=cy0𝖳y+1=cy𝖳cx𝖳.

Thus, the cost is preserved. Next, we will show that the rounding of x to X also preserves the degree. Due to Lemmas 8, 4, and 5, we have that y=i[k]λiSi, where SiP{0,1}E form the labels of level of 𝒯. For all i{1,,k}, the fact that SiP implies

Si(δ(v)){x(δ(v)),x(δ(v))}. (12)

By induction over the tree 𝒯, we show that all labels and, in particular, X are indeed degree preserving. Equation 12 proves the base case. Let S1, S2 be the labels for two children of some node in 𝒯 and T,T be the two potential labels for the said node (derived using Lemma 6). From the third property of Lemma 6 directly follows that for all vAB

T(δ(v)),T(δ(v)){12S1(δ(v))+12S2(δ(v)),12S1(δ(v))+12S2(δ(v))}. (13)

By induction hypothesis, S1 and S2 are degree preserving, so

12S1(δ(v))+12S2(δ(v))x(δ(v)) and similarly
12S1(δ(v))+12S2(δ(v))x(δ(v)).

This concludes the induction step.

It remains to prove the concentration, i.e., that X marginally deviates from x in each of the given linear functions aj. We apply Lemma 7 together with a union bound over all k linear functions and all =2log(2k)k levels of 𝒯. Let t=30logk. As a consequence, with probability at least 11/k8, it holds for all levels i{1,,} and linear functions aj,j{1,,k} that

|ai𝖳yi+1ai𝖳yi|2i/2(t+a𝖳yi+1t). (14)

For some universal constant d, we prove that for all j{1,,k} and all i{0,,}

aj𝖳yid(1+t+a𝖳x). (15)

Let us first argue that this in fact implies the last part of the theorem. Using triangle inequality and geometric series, it holds that

|aj𝖳Xaj𝖳x|=|aj𝖳y+1aj𝖳y| i{0,,1}|aj𝖳yi+1aj𝖳yi|
i{0,,1}1(2)i(t+a𝖳yi+1t)
i{0,,1}1(2)i(t+d(1+t+a𝖳x)t)
=O(max{logk,a𝖳xlogk}).

Finally, we prove Equation 15. Let j{1,,k} and i{0,,1}. Let ii be the minimal index such that aj𝖳yi1+t+aj𝖳x. As aj𝖳y=aj𝖳y1+aj𝖳x, such i must exist. If i=i, we are done. If ii, then it follows from Equation 14 that

aj𝖳yi1(1+t+aj𝖳x)+2(i1)/2(t+(1+t+aj𝖳x))3(1+t+aj𝖳x).

For all i′′{i1,,i}, we have aj𝖳yi′′>t. Thus, the same equation implies

aj𝖳yi′′1aj𝖳yi′′+22(i′′1)/2aj𝖳yi′′=(1+12(i′′3)/2)aj𝖳yi′′.

Using the inequality 1+zexp(z) for all z, we have

aj𝖳yi aj𝖳yi1i′′=i1i+1(1+12(i′′3)/2)
aj𝖳yi1exp(i′′=i1i+112(i′′3)/2)
3eO(1)(1+t+aj𝖳x).

This shows Equation 15 and thereby concludes the proof.

2.1 Omitted Proofs of Dependent Rounding

In this section, we provide the proofs of the previously stated lemmas. Recall that P is the convex hull of integral degree preserving edge sets for x[0,1]E. Let the operator denote the symmetric difference (i.e., XOR) of two edge sets. We start by showing that P indeed contains x.

Lemma 8.

Let q=|E|. There exists a convex representation x=i[q]λiSiP where SiP{0,1}E and λi[0,1] and i[q]λi=1 such that for all vAB and i{1,,q} holds that Si(δ(v)){x(δ(v)),x(δ(v))}.

Proof.

We rely on a standard flow argument. To this end, construct a digraph Df=(Vf,Af) as follows. Let Vf={s,t}V be the set of vertices, As be a set of arcs directed from s to each aA, At be the set of arcs directed from each bB to t, and AE be a directed variant of E from A to B. Let Af=AsAEAt{(t,s)} be the set of arcs in Df. Set the capacity interval for arc (s,a)As as [x(δ(a)),x(δ(a))] and similarly for each arc (b,t)At as [x(δ(b)),x(δ(b))]. Moreover, set the capacity interval for each arc eE to [0,1] and for the arc (t,s) to [0,]. A function f:Af is called a circulation if f(δin(v))=f(δout(v)) for each vertex vVf.

One can naturally derive a feasible fractional circulation from the vector x[0,1]E: the flow from s to aA is x(δ(a)), which lies in [x(δ(a)),x(δ(a))], the circulation from bB to t is x(δ(b)), which lies in [x(δ(b)),x(δ(b))], the circulation on each arc (a,b)AE is xab, and the circulation on arc (t,s) is x(E). Hence, x satisfies the capacity and flow conservation constraints. It is well known, see e.g. [16, Corollary 13.10b], that for integral capacities the set of all feasible circulations (including x) forms an integral polytope. Thus, we can rewrite the circulation above as a convex combination of integral circulations. Each of these integral circulations corresponds to a degree preserving edge set.

Further, there always exists a comparable convex representation which has only few fractional variables in the support of each constraint.

See 4

Proof.

First, we argue about the structure of the edges of polytope P. Let S,T{0,1}E be the two vertices at the two ends of some edge of P. We claim that ST is a simple cycle or a simple path. Suppose not. If ST is acyclic, let D be a maximal path in ST; otherwise let D be a simple cycle contained in ST. Note that SDP and TDP and both points do not lie on the edge between S and T. However, (S+T)/2=(TD+SD)/2 contradicts that S and T are connected by an edge.

Let y be an optimal vertex solution of the linear program

minc𝖳 y
aj𝖳y =aj𝖳x j{1,,k}
y P

Due to Lemma 8, the linear program is feasible. The solution y must lie on a face F of P with dimension at most k. Consider an arbitrary vertex S of F. Furthermore, let T1,,Th, hk, be the vertices of F such that there is an edge between each Ti and S. Thus, we can write y=S+i[h]λi(TiS) where λ1,,λh0. By our previous argument, TiS is a simple cycle or path for each i{1,,h}. In particular, |(TiS)δ(v)|2 for each vAB. This implies that the last property holds for y.

Allowing a small rounding error, there always exists a convex representation where the scalars are integer multiples of a power of two.

See 5

Proof.

Using a standard flow argument, we construct a digraph Df=(Vf,Af) that represents a circulation network. For each arc in aAf, we adjust a capacity interval such that every feasible circulation corresponds to a solution that is “close” to x and preserves the cost. Let Vf={s,t}{vi:i[k]} where nodes vi correspond to each Si. The set of arcs Af contains arcs (t,s), (s,vi), and (vi,t) for i[k]. A function f:Af is called a circulation if f(δin(v))=f(δout(v)) for each vertex vVf. Set the capacity interval of arc (t,s) to [2,2] and the one of arcs (s,vi) and (vi,t) to [λi2,λi2] for i[k]. Moreover, define a linear cost function cost(s,vi)=eEce(Si)e, the contribution of Si to the total cost. Set cost(t,s)=cost(vi,t)=0. The scalars λi induce a natural circulation f: on arcs (s,vi) and (vi,t), we send a flow of λi2 and on arc (t,s), we send a flow of 2.

For integral capacities the set of feasible circulations forms an integral polytope, see e.g. [16, Corollary 13.10b]. Thus, there exists a minimum cost integral circulation. Let f¯ be the this integral circulation. We define λi=f¯(s,vi)/2 for each i{1,,k}, then

i[k]λi=i[k]f¯(s,vi)2=12f¯(t,s)=122=1.

Consequently, λi creates a valid convex combination for y where each λi is a multiple of 1/2. For each eE

|yeye|=|i[k]λi(Si)ei[k]λi(Si)e|=i[k]|λiλi|(Si)ei[k]12=k12.

Since the integer circulation minimizes the total cost, we have

cy𝖳=eEcei[k]λi(Si)e=12eEf¯(e)cost(e)12eEf(e)cost(e)=cx𝖳. (16)

Moreover, constructing Df and solving minimum cost flow can be done in polynomial time [16].

The TreeMerge algorithm described in Section 2 uses the following lemma to construct new random edge sets while preserving the degree of the former sets.

See 6

Proof.

For the randomized construction of T and T, we distinguish whether an edge is present in the symmetric difference S1S2 or not. For any edge eE where (S1)e=(S2)e, we set Te=((S1)e+(S2)e)/2 and Te=((S1)e+(S2)e)/2. Next, partition the edges in S1S2 into simple paths and cycles with E1˙˙Ek=S1S2 with the following property: each odd-degree vertex is the endpoint of exactly one path and no path ends in an even-degree vertex. This easily follows from iteratively removing cycles and maximal paths.

Let i{1,,k}. Choose Ci˙Di=Ei such that no two edges in Ci or in Di are adjacent. This is possible by alternatingly assigning edges to Ci and Di, as Ei is an even length cycle or a path. We make a uniform binary random decision Ri{0,1}, which is independent of all Ri, ii. This random variable indicates whether Ci is assigned to T or T (Di is then assigned to the other edge set). More precisely, for each eEi we set

Te={(Ci)eif Ri=0,(Di)eif Ri=1,andTe={(Di)eif Ri=0,(Ci)eif Ri=1. (17)

In particular, Te+Te=(Ci)e+(Di)e=1=(S1)e+(S2)e. Since both outcomes Ri=1 and Ri=0 have probability 1/2, it holds that 𝔼(Te)=𝔼(Te)=((Ci)e+(Di)e)/2=((S1)e+(S2)e)/2 for all eST. Thus, it follows that 𝔼(T)=𝔼(T)=(S1+S2)/2. Let ={δ(v)vAB}. Considering each vertex in a simple path or cycle is incident to at most two edges, we have |FEi|2 for all F and i{1,,k}. As the random choice for each path and cycle is independent, it holds that for all F and eF, there is at most one edge eF with ee such that Te depends on Te (and the same for T).

It remains to show that T(F),T(F){(S1(F)+S2(F))/2,(S1(F)+S2(F))(2)}. To this end, we distinguish whether a vertex vAB has even or odd degree. If |δ(v)| is even, then v is always incident to exactly one edge in Ci and one in Di, for each i{1,,k}. Hence, T(F)=T(F)=|δ(v)|/2=(S1(F)+S2(F))/2. If |δ(v)| is odd, then there is exactly one path that ends in v due to the choice of decomposition into cycles and paths. Consequently, the arguments above apply to all but one edge in δ(v) and therefore we have |T(F)T(F)|=1. This implies the claim.

The last lemma bounds the change of a linear function between two consecutive levels of TreeMerge.

See 7

Proof.

Let Ti, i[2j], be the random edge set created on the j-th level from the edge sets S2i1,S2i, i[2j] of the (j+1)-th level. Recall that the procedure from Lemma 6 actually creates two alternative edge sets Ti,Ti of which TreeMerge selects just one. However, the solution derived from Ti satisfies Equation 11 if and only if the one from Ti does. Hence, it suffices to show it for one of the two. Further, for the sake of convenience, we analyze the scaled expression |2ja𝖳yj2ja𝖳yj+1| instead of |a𝖳yja𝖳yj+1|. Due to Lemma 6, it holds that 𝔼(Ti)=(S2i1+S2i)/2. Thus,

𝔼[2ja𝖳yj]=a𝖳(i[2j]𝔼[Ti])=12a𝖳(i[2j+1]Si)=2ja𝖳yj+1.

Since TreeMerge independently constructs the Ti on the j-th level, any two random edge sets Ti and Ti+1 are independent. Moreover, it follows from Lemma 6 that for all Ti and eδ(v), there exists at most one edge eδ(v) such that (Ti)e depends on (Ti)e. Consequently, there exists a partition of δ(v) into P1 and P2 such that all variables (Ti)e, eP1, as well as (Ti)e, eP2 are independent. Let u=i[2j]Ui[0,1]E and w=i[2j]Wi[0,1]E where Ui,Wi{0,1}E are defined for all eE as

(Ui)e={1,if eδ(v) and (Ti)eP10,otherwiseand(Wi)e={1,if eδ(v) and (Ti)eP20,otherwise.

Hence, we have 2ja𝖳yj=a𝖳(u+w). Next, we show that

[|a𝖳u𝔼[a𝖳u]|>12t+12𝔼[a𝖳u]t]<12k10. (18)

For brevity, define μ=𝔼[a𝖳u]. We distinguish two cases. If t>4μ, then set δ=t/(4μ)>1. Notice that a𝖳u is the sum of independent variables, each contained in [0,1]. We have

[a𝖳u<μt/4] =0

It follows from a standard Chernoff bound that

[a𝖳u>μ+t/4] =[a𝖳u>(1+δ)μ]
exp(13δμ)
=exp(11lnk)
12k10.

If t4μ, then set δ=1/2t/μ(0,1]. Again by a Chernoff bound, we have

[|a𝖳uμ|>12μt] =[|a𝖳uμ|>δμ]
2exp(13δ2μ)
=2exp(11lnk)12k10.

By symmetry, Equation 18 holds for w as well. We conclude that with probability at least 11/k10, we have

|2ja𝖳yj2ja𝖳yj+1| |a𝖳u𝔼[a𝖳u]|+|a𝖳w𝔼[a𝖳w]|
12t+12𝔼[a𝖳u]t+12t+12𝔼[a𝖳w]t
t+𝔼[2ja𝖳yj]t
2j/2(t+a𝖳yj+1t).

3 Application to Budgeted Santa Claus Problem

In this section, we present our approximation algorithm the Budgeted Santa Claus Problem based on the dependent rounding scheme described in Section 2.

3.1 Linear Programming Formulation

Introducing an LP relaxation for the Budgeted Santa Claus Problem, we first reduce the problem to its decision variant. For a given threshold T0, the goal is to either find a solution of value T/α or determine that OPT<T, where OPT is the optimal value of the original optimization problem. This variant is equivalent to an α-approximation algorithm by a standard binary search framework.

Based on T, intuitively thought of as the optimal value, we partition the resources into two sets by size. Set consists of the big resources with {j:vjT/α} and set 𝒮 consists of the small resources 𝒮{j:vj<T/α}. We use assignment variables that indicate whether a particular resource is assigned to a particular player. For clarity, we use different symbols for big and small resources. Let xib[0,1] denote the portion of big resource b that player i𝒫 receives. Similarly, denote by zis[0,1] the portion of the small resource s𝒮 that player i receives. Unlike the original problem, we allow these assignments to be fractional in the relaxation. Since naive constraints on these variables lead to an unbounded integrality gap, see e.g. [6], we use non-trivial constraints inspired by an LP formulation of Davies, Rothvoss and Zhang [9]. Here, we make the structural assumption that in any solution, a player either receives exactly one big resource (and nothing else) or only small resources. Towards the goal of obtaining a solution of value T/α, any big resource is sufficient for any player and receiving more would be wasteful. If there is a solution of value T, then there is also a pseudo-solution such that each player either gets exactly one big resource (and nothing else) or a value of at least T from small resources only. Note that it might be that the former type of player only has a value of T/α. Thus, if TOPT, then the following relaxation called economical(T) is feasible and has a value at most C.

mini𝒫 [bcibxib+s𝒮ciszis] (19)
s𝒮vszis T(1bxib) i𝒫 (20)
zis 1bxib s𝒮,i𝒫 (21)
i𝒫xib 1 b (22)
i𝒫zis 1 s𝒮 (23)
bxib 1 i𝒫 (24)
zis,xib 0 s𝒮,b,i𝒫 (25)

The constraints (22) and (23) describe that each big or small resource is only assigned once. Justified by earlier arguments, constraint (24) ensures that each player receives at most one big resource. Considering constraint (21), we only need to verify that the constraint is valid for integer solutions. By our assumption, if player i receives one big resource, then it should not get any small resources, which is exactly what the constraint expresses. Conversely, if the player does not receive any big resources, the constraint is trivially satisfied. Similarly, there are two cases for Constraints (20). If player i receives one big resource, the constraint is trivially satisfied. Otherwise, it must receive a value of at least T in small resources. During our rounding procedure in Section 3.4, we essentially lose some value from small resources and can only guarantee a value of T/α for players without a big resource.

3.2 Technical Goals

Let (x,z) be a feasible solution to economical(T), where x and z represent the vectors of assignment variables corresponding to big and small resources, respectively. Formally, we have xib,zis[0,1] for i𝒫,b,s𝒮. We will define a randomized rounding procedure that constructs a distribution over the binary variables Xib{0,1} and Zis{0,1} describing whether a big resource b or small resource s𝒮 is assigned to player i𝒫. For notational convenience, define Yi=1bBXib as the indicator variable whether a player i does not get a big resource (and needs small resource). Similarly, let yi=1bxib be the corresponding value to Yi from the corresponding value from the LP variables.

Our goal is that the total cost of assignments does not exceed the budget C and the integral solution (X,Z) is an α-approximation solution with respect to the minimum value a player receives. In other words, we want to obtain an integral solution (X,Z) that satisfies the following two properties.

  1. 1.

    i𝒫[bcibXib+s𝒮cisZis]C.

  2. 2.

    Every player receives resources of value at least T/α with high probability.

We first apply our dependent rounding scheme to round the assignment of big resources to an integral one. To cover the players that do not receive big resources, i.e., those with Yi=1, we need to change the assignment of small resources as well. Initially, some small resources will be assigned fractionally and even more than once. In a second step, we transform the solution into one where each small resource is assigned only once – incurring a loss in the value that the players receive.

3.3 Rounding of Big Resources

The following lemma summarizes the properties we derive from the dependent rounding scheme. Note that while the assignment of small resources can change, it remains fractional for now.

Lemma 9.

Let (x,z) be a feasible solution to economical(T,C). There is a randomized algorithm that produces an assignment Xib{0,1}, i𝒫, b, and zis[0,1], i𝒫, s𝒮 such that with high probability

  1. 1.

    i𝒫bcibXib+i𝒫s𝒮ciszisC,

  2. 2.

    Each big resource is assigned at most once, i.e., b:i𝒫Xib1,

  3. 3.

    Each small resource is assigned at most O(logn) times, i.e., s𝒮:i𝒫zisO(logn),

  4. 4.

    Each player receives either one big resource or a value of at least T in small resources.

Proof.

We first describe the instance to which we will apply the dependent rounding procedure from Theorem 2. We build a bipartite graph Gx,z=(𝒫({d}),E), where 𝒫 is the set of players, is the set of big resources, and d is a dummy node. The role of d can be summarized as: every player who does not get a big resource selects the edge to d. Let graph Gx,z contain an edge (i,b)E labeled with cost cib between each big resource b and player i with xib>0. Let J denote the set of all these edges. For every player i with yi>0, add an edge (i,d) to the dummy node of cost s𝒮cis(zis/yi)n. Let K denote the set of these edges and set E=JK. Intuitively, xib is a fractional edge selection of edges in J and yi a fractional edge selection of K (where yi corresponds to edge (i,d)K). This fractional edge set satisfies the following.

  1. (i)

    For each player i, we have bxib+yi=1 due to the definition of yi.

  2. (ii)

    For each big resource b, we have i𝒫xib1, due to Constraint (22).

Applying the dependent rounding procedure of Theorem 2 with k=|𝒮|=n linear functions (we defer a precise definition to the end of the proof), we obtain an integral edge selection Xib{0,1}, i𝒫, b and Yi{0,1}, i𝒫. Here, similar to before, Yi defines the edge selection in K, i.e., edge (i,d) is selected if Yi=1. From (ii) and Theorem 2, it follows that i𝒫Xib1 for all b, which means that Property 2 of the lemma holds. Further,

i𝒫bcibXib+i𝒫:yi>0Yi(s𝒮ciszisyi) i𝒫bcibxib+i𝒫:yi>0(s𝒮ciszisyi)yi
i𝒫bcibxib+i𝒫s𝒮ciszis
C,

where the first inequality follows from the cost preservation property of Theorem 2 and the last inequality from the feasibility of (x,z). Notably, if yi=0, then Yi=0 as there does not exist an edge (i,d). In particular, Yi=1 implies that yi>0. We define the assignment of small resources as

zis={zis/yi if Yi=1,0 otherwise.

Due to Constraint (21), we have zisyi and hence zis[0,1]. Consequently, Property 1 immediately follows from the previous cost calculation and the definition of zis. From (i) and Theorem 2, we obtain bXib+Yi=1 for each i𝒫. In words, player i either gets a big resource or Yi=1. In the latter case holds that

s𝒮vszis=s𝒮vszis/yiT.

Here, the inequality follows from the definition of yi and Constraint (20). Therefore, Property 4 holds.

It remains to show Property 3, i.e, that every small resource is assigned at most O(logn) times. To this end, we define the linear functions provided to Theorem 2: for each small resource s𝒮, there is one linear function a(s)[0,1]K, i.e., specified by the edges incident to d. Implicitly, the coefficient for all other edges is zero. Thus, the linear function satisfies the support restriction of Theorem 2. For e=(i,d)K, we define ae(s)=zis/yi. Using Constraint (21), it holds that

e=(i,d)Kyiae(s)=e=(i,d)Kyizisyi=e=(i,d)Kzis1.

Finally, from the concentration bound of Theorem 2 follows

i𝒫zis=e=(i,d)KYizis=e=(i,d)KYizis/yi=e=(i,d)KYiae(s)O(logn).

3.4 Rounding of Small Resources

In the previous subsection, we described how big resources b were integrally assigned to the players. As some players did not receive any big resources and still need to be covered by small resources, let 𝒬 be the set of those players, i.e., players i𝒫 for which Yi=1. The linear program in the following lemma corresponds to the property of the assignment variables for small resources from the previous section.

Lemma 10.

Let 𝒬𝒫 and consider the LP small(T,β) defined as

s𝒮vszis T i𝒫
i𝒬zis β s𝒮
zis 0 i𝒬,s𝒮

If small(T,β) has a fractional solution z, then small(T/βmaxs𝒮vs,1) has an integral solution Z that can be found in polynomial time with

s𝒮i𝒬cisZiss𝒮i𝒬ciszis,
Proof.

Since small(T,β) is feasible, there exists a solution z. Further, we obtain a (fractional) solution z′′ to small(T/β,1) by dividing all variables of z by β. Using the approach by Shmoys and Tardos [17], we round z′′ to an integral solution. For the sake of completeness, we provide the proof below.

Assume without loss of generality that 𝒮={1,2,,|𝒮|} is ordered such that vsvs1 for all s=2,3,,|𝒮|. We construct an auxiliary bipartite graph G (see Figure 1 for an illustration).

Figure 1: Bipartite graph G where on left side there are k(i) copies of each player i for an instance of two players with edges (ui,,s) of weight cis for each s=s(i,1),s(i,1)+1,,s(i,).

The elements on the right side of G are elements of 𝒮. On the left side, there are k(i):=s𝒮zis′′ many vertices ui,1,,ui,k(i) for each i𝒬. In the fractional solution z′′, a player Q can get several small resources. Let k(i) denote their (rounded) number. Introducing ui,1,,ui,k(i) as copies of player iQ allows us to argue about matchings (where every vertex is only involved in one assignment). Suppose we add one edge between every two vertices of the different sides of the bipartite graph. It is straight-forward that there exists a (fractional) left-perfect matching by distributing the resources assigned in z′′ among the copies of each player. Due to the rounding in k(i), this matching gives a slightly lower value to each player, but stays within the bounds we are aiming for.

To round to a good integral matching, however, we require a specific definition of the fractional left-perfect matching. Essentially, we need a monotone assignment where the first copy ui,1 of player iQ has the highest value resources (the first in the order above) and the last player the lowest value resources. Then G only contains the edges that are actually used in this assignment.

This requires some careful definitions. For each i𝒬, we set s(i,0)=1. This describes the first resource that can be fractionally assigned to player i. For =1,2,,k(i), we choose s(i,) as the element in 𝒮 that satisfies

zi,1′′++zi,s(i,)1′′< and zi,1′′++zi,s(i,)′′.

Note that s(i,) exists, because the sum of all zi,j′′ is at least k(i). We only assign resources s(i,1),,s(i,) to copy ui,. Intuitively, the resources 1,2,,s(i,1)1 should be exclusively used for the copies ui,1,,ui,1. Simply because the sum of fractions associated with i (according to z′′) is not enough to cover the copies and ui, should not receive any of them in order to maintain the monotonicity goals. Similarly, as the sum of fractions of resources 1,2,,s(i,) belonging to i exceeds , they are enough to cover all players in ui,1,,ui,. Thus, it is not necessary to give any less valuable resources to ui,.

Consequently, for all i𝒬 and =1,2,,k(i), we introduce an edge (ui,,s) of weight cis for each s=s(i,1),s(i,1)+1,,s(i,). We now formally show that there is a left-perfect fractional matching of weight at most s𝒮i𝒬ciszis′′. Towards this, consider some i𝒬 and {1,2,,k(i)}. We select edge (ui,,s(i,1)) to an extend of

zi,1′′++zi,s(i,1)′′(1)[0,zi,s(i,1)′′].

For s=s(i,1)+1,,s(i,)1, we pick edge (ui,,s) to an extend of zi,s′′. Finally, we choose edge (ui,,s(i,)) to an extend of

(zi,1′′++zi,s(i,)1′′)[0,zi,s(i,)′′].

This fractional selection of edges satisfies the following properties.

  1. 1.

    For each i𝒬 and {1,2,,k(i)}, the total fractional amount of selected edges that are incident to ui, is exactly 1.

  2. 2.

    For each i𝒬 and s𝒮, the total fractional amount of selected edges that are between ui,1,,ui,k(i) and s is at most zi,s′′.

Property 2 implies that the total fractional amount that edges incident to s (over all i𝒬) are selected is at most 1. Hence, the total weight is at most the cost of z′′. For a bipartite graph, the set of all fractional matchings is precisely the convex hull of integral matchings, see e.g. [16, Chapter 18]. Furthermore, z′′ must lie on a facet spanned by only left-perfect matchings. Thus, there must also exist an integral left-perfect matching M of weight at most

i𝒬s𝒮zi,s′′ci,si𝒬s𝒮zi,sci,s.

We can find such a matching using standard algorithms for minimum weight bipartite matching. We interpret M as an integral assignment Z where each i𝒬 receives all s𝒮, for which there is an edge (ui,,s) in M for some {1,2,,k(i)}. Finally, we analyze how much value each i𝒬 receives in this assignment. Notice that all resources s𝒮 that are connected to ui, have a value of at least vs(i,). Therefore, i receives a total value of at least

vs(i,1)++vs(i,k(i)).

On the other hand, since zi,1′′++zi,s(i,)1′′+zi,s(i,)′′<+zi,s(i,)′′+1 for each , the total fractional amount of resources that i receives in z′′ with value at least vs(i,) is less than +1. As a result, the total value that i received in z′′ is at most

vs(i,0)++vs(i,k(i)).

This is at least T/β, because of z′′small(T/β,1). As a consequence, in Z player i receives a value of at least T/βvs(i,0)T/βmaxs𝒮vs.

3.5 Approximation Factor

Concluding the previous subsections, this section provides an α-approximation for the Budgeted Santa Claus Problem, where α=O(logn). See 3

Proof.

Let β=O(logn) be the value from Property 3 of Lemma 9. We define α=2β and run our binary search over value T, which is then used in our definition of big and small resources. Then we solve the LP relaxation economical(T). Let (x,z) be the resulting solution. If the cost of the solution is more than C, we fail (and increase the value of T). Assume now that (x,z) has a cost of at most C. In Lemma 9, using the dependent rounding procedure from Theorem 2, we show that the fractional assignments x of big resources to players can be rounded to an integral assignment X and the assignment of small resources z can be changed to z (which is still fractional), such that with high probability each small resource up to β times and the cost is still below C. Lemma 10 proves that z can be rounded to an integral assignment Z such that the cost does not increase and each player i that does not receive a big resource gets small resources of total value at least

Tβmaxs𝒮vs 2TαTα=Tα.

4 Conclusion

Based on the finding in this paper there are several interesting questions arising for future research. For the Budgeted Santa Claus Problem, a naturally arising question is whether the approximation factor of O(logn) can be improved. Notably, the special case of restricted assignment (without a budget constraint) admits a constant approximation due to Feige [10]. We are not aware of any hardness results indicating that such a result cannot hold for our problem. As an intermediate question, one could look at the bi-criteria approximation that approximates both the minimum player value and the cost by a constant. This would still generalize the aforementioned algorithm for restricted assignment.

Another intriguing question is whether a dependent rounding scheme exists for rounding matroid bases that simultaneously guarantees cost preservation and Chernoff-type concentration like SwapRounding [7] does. It seems likely that the techniques from this paper transfer at least to a limited class of matroids, namely strongly base-orderable matroids, because these have very strong decomposition properties for the symmetric difference of two bases. It might, however, require other ideas to generalize to arbitrary matroids.

References

  • [1] Chidambaram Annamalai, Christos Kalaitzis, and Ola Svensson. Combinatorial algorithm for restricted max-min fair allocation. ACM Trans. Algorithms, 13(3):37:1–37:28, 2017. doi:10.1145/3070694.
  • [2] Arash Asadpour, Uriel Feige, and Amin Saberi. Santa claus meets hypergraph matchings. In Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques, 11th International Workshop (APPROX 2008) and 12th International Workshop (RANDOM 2008), volume 5171 of Lecture Notes in Computer Science, pages 10–20. Springer, 2008. doi:10.1007/978-3-540-85363-3_2.
  • [3] Arash Asadpour, Michel X. Goemans, Aleksander Madry, Shayan Oveis Gharan, and Amin Saberi. An O(log n/log log n)-approximation algorithm for the asymmetric traveling salesman problem. Oper. Res., 65(4):1043–1061, 2017. doi:10.1287/OPRE.2017.1603.
  • [4] Étienne Bamas, Alexander Lindermayr, Nicole Megow, Lars Rohwedder, and Jens Schlöter. Santa claus meets makespan and matroids: Algorithms and reductions. In 35th Annual ACM-SIAM Symposium on Discrete Algorithms, (SODA 2024), pages 2829–2860. SIAM, 2024. doi:10.1137/1.9781611977912.100.
  • [5] Nikhil Bansal and Viswanath Nagarajan. Approximation-friendly discrepancy rounding. In 18th Integer Programming and Combinatorial Optimization Conference (IPCO 2016), volume 9682 of Lecture Notes in Computer Science, pages 375–386. Springer, 2016. doi:10.1007/978-3-319-33461-5_31.
  • [6] Nikhil Bansal and Maxim Sviridenko. The santa claus problem. In 38th Annual ACM Symposium on Theory of Computing, (STOC 2006), pages 31–40. ACM, 2006. doi:10.1145/1132516.1132522.
  • [7] Chandra Chekuri, Jan Vondrák, and Rico Zenklusen. Dependent randomized rounding via exchange properties of combinatorial structures. In 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS 2010), pages 575–584. IEEE Computer Society, 2010. doi:10.1109/FOCS.2010.60.
  • [8] Chandra Chekuri, Jan Vondrák, and Rico Zenklusen. Multi-budgeted matchings and matroid intersection via dependent rounding. In 22nd Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2011), pages 1080–1097. SIAM, 2011. doi:10.1137/1.9781611973082.82.
  • [9] Sami Davies, Thomas Rothvoss, and Yihao Zhang. A tale of santa claus, hypergraphs and matroids. In 31st Annual ACM-SIAM Symposium on Discrete Algorithms, (SODA 2020), pages 2748–2757. SIAM, 2020. doi:10.1137/1.9781611975994.167.
  • [10] Uriel Feige. On allocations that maximize fairness. In 19th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2008), pages 287–293. SIAM, 2008. URL: http://dl.acm.org/citation.cfm?id=1347082.1347114.
  • [11] Rajiv Gandhi, Samir Khuller, Srinivasan Parthasarathy, and Aravind Srinivasan. Dependent rounding and its applications to approximation algorithms. J. ACM, 53(3):324–360, 2006. doi:10.1145/1147954.1147956.
  • [12] Fabrizio Grandoni and Rico Zenklusen. Approximation schemes for multi-budgeted independence systems. In 18th Annual European Symposium (ESA 2010), volume 6346 of Lecture Notes in Computer Science, pages 536–548. Springer, 2010. doi:10.1007/978-3-642-15775-2_46.
  • [13] Klaus Jansen, Kim-Manuel Klein, and José Verschae. Closing the gap for makespan scheduling via sparsification techniques. Math. Oper. Res., 45(4):1371–1392, 2020. doi:10.1287/MOOR.2019.1036.
  • [14] Shachar Lovett and Raghu Meka. Constructive discrepancy minimization by walking on the edges. SIAM J. Comput., 44(5):1573–1582, 2015. doi:10.1137/130929400.
  • [15] Barna Saha and Aravind Srinivasan. A new approximation technique for resource-allocation problems. Random Struct. Algorithms, 52(4):680–715, 2018. doi:10.1002/RSA.20756.
  • [16] Alexander Schrijver et al. Combinatorial optimization: polyhedra and efficiency, volume 24. Springer, 2003.
  • [17] David B. Shmoys and Éva Tardos. An approximation algorithm for the generalized assignment problem. Math. Program., 62:461–474, 1993. doi:10.1007/BF01585178.

Appendix A Appendix

A.1 Santa Claus Problem where all resources need to be assigned

In the following, we show that the Budgeted Santa Claus Problem with the requirement that all items need to be assigned is not harder than the variant we study. For each resource j, adjust the cost of assigning j to any player i to cij=cijmini𝒫cij. This reduces the total budget by the sum of these minimum values across all resources, C=Cjmini𝒫cij. Then we solve the reduced problem without enforcing that all the resources have to be assigned. If some resources remain unassigned, we allocate them to the players with zero cost (i.e., players i𝒫 with cij=0). This ensures that all resources are assigned without exceeding the original budget, as the reduced budget C already accounted for these assignments. This reduction maintains the approximation ratio of the solution, as values remain the same and costs are not approximated.