Approximation Schemes for Orienteering and Deadline TSP in Doubling Metrics
Abstract
In this paper we look at various extensions of the classic Traveling Salesman Problem (TSP) on graphs with bounded doubling dimension and bounded treewidth and present approximation schemes for them. Suppose we are given a weighted graph with a start node , distances on the edges and integer . In -stroll problem the goal is to find a path from of minimum length that visits at least vertices. In -path we are given an additional end node and the path is supposed to go from to . The dual problem to -stroll is the rooted orienteering in which instead of we are given a budget and the goal is to find a walk of length at most starting at that visits as many vertices as possible. In the point-to-point orienteering (P2P orienteering) we are given start and end nodes and the walk is supposed to start at and end at . In the deadline TSP (which generalizes P2P orienteering) we are given a deadline for each and the goal is to find a walk starting at that visits as many vertices as possible before their deadline (where the visit time of a node is the distance travelled from to that node). The best approximation for rooted orienteering (or P2P orienteering) is -approximation [13] and -approximation for deadline TSP [4]. For Euclidean metrics of fixed dimension, Chen and Har-Peled present [16] a PTAS for rooted orienteering. There is no known approximation scheme for deadline TSP for any metric (not even trees). Our main result is the first approximation scheme for deadline TSP on metrics with bounded doubling dimension (which includes Euclidean metrics). To do so we first we present a quasi-polynomial time approximation scheme for -path and P2P orienteering on such metrics. More specifically, if is a metric with doubling dimension and aspect ratio , we present a -approximation that runs in time . Building upon these, we obtain an approximation scheme for deadline TSP when the distances and deadlines are integer which runs in time . The same approach also implies a bicriteria -approximation for deadline TSP for when distances and deadlines are in . For graphs with bounded treewidth we show how to solve -path and P2P orienteering exactly in polynomial time and a -approximation for deadline TSP in time .
Keywords and phrases:
Deadline Traveling Salesman Problem, Orienteering, Doubling Metrics, Approximation algorithmCategory:
APPROXFunding:
Kinter Ren: Supported by NSERC DG of the 2nd author.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Routing and network design problemsEditors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
We study a fundamental variant of the Traveling Salesman Problem (TSP) in which the “salesman” wants to visit as many customers as possible before their required service deadlines. Suppose we are given a weighted graph with a start node , deadlines , and a distance/length function . In the deadline TSP problem, our objective is to find a path (or a walk) starting at that visits as many nodes as possible by their deadlines. We say that the path visits node by its deadline if the length of the path, starting at until it visits (for the first time), is at most . A node might be visited multiple times, but it is counted only once. Alternatively, we can assume is a complete weighted graph where the edge weights satisfy triangle inequality, i.e. the is a metric space.
A special case of the deadline TSP is the rooted Orienteering problem, where all the nodes have a universal deadline (think of it as a budget for the length of the path travelled) and the goal is to find a path, starting at , of length at most that visits as many vertices as possible. Researchers have also studied another version of the Orienteering, known as point-to-point Orienteering problem, denoted by P2P orienteering, where we are given a start node , an end node , and a budget . Here, our objective is to find an - path of length at most that visits as many nodes (other than ) as possible. This too can be viewed as a special case of deadline TSP: the deadlines for each node are set as , and the deadline TSP path is completed by connecting it directly to the end node . Notice that P2P orienteering can be seen as the “dual” of the -path problem [12]. It is almost the same as the classical -stroll problem [9] (also known as the (path) -TSP problem [16]) except in -stroll we are given a start node and integer and the objective is to find a minimum-length path from visiting at least nodes, while in -path problem we are given an additional end node and the path is supposed to go from to . It is important to note that P2P orienteering and -path are equivalent in terms of exact algorithms. However, an approximation for one problem does not imply an approximation for the other.
Blum et al. [9] developed the first O(1)-approximation algorithm for the rooted orienteering problem in a general metric space. Their main approach involves a clever reduction to -TSP, via an intermediate problem. They introduced the concept of excess (also referred to as regret) for a path and formulated the related minimum-excess problem, demonstrating that an approximation for the latter extends to an approximation for the orienteering problem. Given a path that includes two vertices , let denote the length of the sub-path from to . The excess of an -path , denoted by , is the difference between the length of the path and the distance between the endpoints of the path, and the minimum-excess problem seeks to find an - path of minimum-excess that visits at least nodes. Moreover, they [9] demonstrated that the min-excess problem can be approximated using algorithms for -stroll, implying that an approximation algorithm for -stroll leads to an approximation algorithm (with a constant factor loss in the ratio) for the orienteering problem, via the intermediate min-excess problem. Applying a similar approach and concentrating on enhancing the approximation algorithm for the -stroll, the factor has been refined to the currently best -approximation, which also extends to P2P orienteering [13] in a general metric space.
Chen and Har-Peled [16] developed the first Polynomial-Time Approximation Scheme (PTAS) for the rooted orienteering problem in a fixed-dimensional Euclidean space. The prior reduction by [9] increases the approximation ratio by a constant factor and can not provide a PTAS. To achieve a PTAS for the rooted orienteering problem, Chen and Har-Peled [16] introduced the concept of -excess for a path (extending the notion of the excess of a path) and defined -approximation for -TSP. Roughly speaking, the -excess of a path is the difference between its length and the length of the best approximation of the path using straight lines between only nodes of the path (as opposed to considering the length of the line connecting the two endpoints of the path, as in the min-excess path). This notion is formally defined soon. An -approximation for rooted -TSP is any path that starts from the root and visits points and whose length is at most + , where denotes the length of the optimal rooted -TSP path and is the -excess for the optimal path. Note that the upper bound provided by -approximation for the -TSP may be significantly tighter than that by -approximation (namely, ), especially when is sufficiently large, as the -excess of a path can be much smaller than the length of the path. In fact, Chen and Har-Peled [16] showed that the algorithm of Mitchell for classic TSP on Euclidean plane [29] provides a -approximation for the rooted -TSP problem on the that metric and this leads to a PTAS for the rooted orienteering problem.
Deadline TSP seems substantially more difficult to approximate. For deadline TSP Bansal et al. [4] presented an -approximation and extended that to an -approximation for the Time-Window TSP problem (where each node , other than a deadline , has also “release” time , and it is “counted” if the time it is visited along the output path falls in the interval ). They also provided a bicriteria approximation: one that produces a -approximate solution that violates the deadlines by . The -approximation remains the best known approximation for deadline TSP on general metrics (in polynomial time). More recently, Friggstad and Swamy [20] presented an -approximation for deadline TSP which runs in time where is the diameter of the graph; for this they assume that distances (and so deadlines) are all integers. Approximations for both orienteering and deadline TSP for other metrics (such as directed graphs) have been obtained as well (discussed in Section 1.2). For instance, for deadline TSP on trees Farbstein and Levin [18], present a bicriteria -approximation (i.e. -approximation and violating the deadlines by ).
To the best of our knowledge, there is no true approximation scheme for deadline TSP on any metrics (even on Trees). Our goal in this work has been to obtain an approximation scheme for deadline TSP on bounded doubling dimensions (which includes Euclidean metrics as a special case). We should note that the best known approximation for deadline TSP on Euclidean metrics is the same as general metrics: -approximation in polynomial time and -approximation in time .
1.1 Our Results and Techniques
By scaling we assume all distances are between 1 and . Our main result of the paper is a Quasi-Polynomial Time Approximation Scheme QPTAS (under mild conditions) for deadline TSP on doubling metrics. (see the full version of our paper [31] for all missing proofs)
Theorem 1.
Suppose is a graph with doubling dimension , start nodes and deadline for as an instance of deadline TSP where distances (and deadlines) are integer values. There is a (randomized) -approximation for deadline TSP that runs in time .
This is the first approximation scheme for any non-trivial metrics for deadline TSP. We note that not violating any of the deadlines is the critical. Along the way to obtain this goal we present a number of other results that are used as building blocks in the proof of this main theorem. As a starting point we show that orienteering can be solved exactly in polynomial time on graphs with bounded treewidth and how this can be turned into a QPTAS for deadline TSP on such metrics when the distances are integer and is quasi-polynomial in .
Theorem 2.
Given a graph with treewidth , there is an exact algorithm with running time is for solving the -path or P2P orienteering problem. Furthermore, there is an approximation scheme for deadline TSP on such graphs with integer distances with running time .
Proof of this Theorem (see the full version [31]) is simpler and has some of the main ideas used in the subsequent theorems; so is a good starting point. We should note that recently (independently and after the first version of our paper [31] appeared), [10] considered orienteering on graph with bounded treewidth and obtained a -approximation by designing a different dynamic programming.
Next we focus on metrics with bounded doubling dimension.
Theorem 3.
Given a graph with doubling dimension , start and end nodes and integer . There is a (randomized) -approximation for -path that runs in time.
We actually show a stronger bound on the length of the -path solution produced by this theorem which bounds the excess or regret similar to [16] for Euclidean metrics. Although getting a QPTAS for -path on doubling metrics isn’t difficult using the known techniques, one needs the stronger bound obtained here (with respect to excess) as it is crucially used to prove the following:
Theorem 4.
Given a graph with doubling dimension , start and end nodes and length budget . There is a (randomized) -approximation for P2P orienteering that runs in time .
Building upon these theorems we then have the tools needed to prove Theorem 1. We note that the algorithm of this theorem can be adapted to obtain a (randomized) bicriteria -approximation for deadline TSP (i.e. cost at most the optimum while violating the deadlines by at most ) that works even when distances are in (instead of integer) with the same running time.
Limitations of known techniques.
The reason that our running time in Theorems 1, 3, and 4, includes in the exponent is that our algorithm uses the (randomized) hierarchical decomposition of such metrics [32], which produces a decomposition of height ). A natural question is: why can’t we get rid of the dependence on (like [32])? One should note that for most vehicle routing problems on Euclidean or doubling metrics, one can assume that by a standard scaling of distances at a loss of in approximation factor (for e.g. this has been the first step in [2, 32, 7] for designing approximation schemes for TSP on Euclidean and doubling metrics). This however does not work for budgeted versions (such as orienteering or deadline TSP) as a feasible solution for the scaled version might violate the budget(s) by a factor in the original version. In other words, once we scale the distances (by factor) to reduce to an instance with distances, a solution in the new instance will not yield a feasible solution in the original as the hard budget constraint (on the total distance) may be violated. Another point worth mentioning is that, although one can get an approximation scheme (with time ) for -path on doubling metrics by embedding them into -treewidth metrics [33] and using Theorem 2, this will not lead to an approximation scheme for orienteering or deadline TSP as one needs a stronger guarantee, like we obtain in the proof of Theorem 3. Again, this is for the same reason that obtaining a true (and not bicriteria) PTAS for Orienteering on Euclidean metrics [16] required stronger -path algorithms. In general, embedding results cannot be used for budgeted versions of vehicle routing (such as orienteering or deadline TSP).
A natural question is: can’t one extend the known techniques developed for designing PTAS’s for TSP on various metrics (such as planar metrics [28] or doubling metrics [7, 3]) to the setting of orienteering or deadline TSP? It appears the answer is not easy for orienteering and deadline TSP. In general, budgeted versions seem more difficult on any metrics. Extending the ideas of [7] to orienteering or deadline TSP encounters some problems. The very first one (as mentioned above) is the assumption that distances are bounded by by scaling and losing a -factor. This can be done for -path but not in the budgeted settings such as orienteering or deadline TSP. Even if one bypasses this issue, the algorithm of [7] considers tours that are sparse or dense (we have a similar breakdown in our proof). However, for both situations [7] considers (approximate) portal respecting tours. Such tours might have large excess (or regret); so although they will have an approximately optimal overall length, they don’t have the stronger bound (with respect to the excess) needed to obtain a P2P orienteering solution (see [13, 16]). Furthermore, our algorithm for deadline TSP has a step (similar to [20]) that needs to guess a set of vertices whose “excess” (which is defined to be the difference of its visit time in optimum vs. the shortest path distance to the root) is growing geometrically. This requires guessing many vertices. So overall, there are several obstacles to overcome to turn these algorithms into a PTAS. Nonetheless we hope that ideas developed here (in the proof of Theorem 1) can be used and extended to obtain a PTAS for deadline TSP in doubling or maybe Euclidean metrics.
1.2 Related Works
The seminal works of Arora [2] and Mitchell [29] presented the first PTAS for Euclidean TSP and some of its variants such as -TSP. However, extending this to orienteering proved to be challenging. For orienteering on Euclidean plane Arkin et al. [1] presented a -approximation. The first PTAS for rooted orienteering on Euclidean metrics was given by Chen and Har-Peled [16]. More recently Gottlieb et al. [23] presented a more efficient PTAS for rooted orienteering on Euclidean metrics.
For orienteering on general metrics there are several -approximations [9, 13, 19], with the current best being -approximation by [13]. For orienteering on directed graphs Chekuri and Pál [15] present a quasi-polynomial time for various problems including deadline TSP, such as an -approximation for time window in quasi-polynomial time. Nagarajan and Ravi [30] also present poly-logarithmic approximations for directed variants of -TSP and Orienteering, some of these results were improved in [8]. Chekuri et al. [13] present an -approximation for the time-window version and an -approximation for P2P orienteering on directed graphs. There is also a line of research on stochastic orienteering (e.g. see [25, 5, 27]).
As said earlier, the best known result for deadline TSP on general metrics is by [4] which is an -approximation. They also provide a bicriteria . Assuming distances (and deadlines) are integers, this implies an -approximation where is the maximum deadline. Different extensions of deadline TSP have been studied also. For instance, Bansal et al. [4] present an -approximation for the time-window version and an -approximation when the time window values are integer. Chekuri et al. [13] prove that any -approximation for P2P orienteering implies an -approximation for the time-window version where opt is the optimal value and and are the sizes of the largest and smallest windows. For the variant of time-window TSP where there are multiple time-windows given for each node, Garg et al. [22] proved an -hardness of approximation even on trees. There are other variants of orienteering and deadline TSP that have been studied (see [13, 15, 20, 21]).
Some variants of vehicle routing problems have been studied on doubling metric as well. Talwar [32] presented a QPTAS for TSP on such metrics. Bartal et al. [7] building upon the work of Talwar presented a PTAS for TSP on doubling metrics. Several variants of TSP, such as Capacitated Vehicle Routing Problem (CVRP) or TSP with neighborhoods have approximation schemes on doubling metrics [11, 26].
2 Preliminaries
We consider a metric space as a (complete) weighted graph . By scaling we assume the minimum pair-wise distance is 1 and diameter is . For and , we let denote the ball of radius around . The doubling dimension [24] of a metric space is the smallest value such that for all , for all , every ball can be covered by the union of at most balls of the form , where . A metric is called doubling when its doubling dimension is a constant. For a subset , the diameter of , denoted by , is defined as .
We now formally define the problems. We consider a metric space which is induced by an edge-weighted graph . Let be a path in , starting at and ending at . The length of the path is denoted by . We use to denote the number of vertices on the path. If is a walk then is the number of distinct nodes in . Let a -jump of be a path of size obtained from by bypassing some of its intermediate points. The optimum -jump of , denoted by , is the -jump of with the maximum length. We define the -excess of (see [16]), denoted by , to be the difference between the length of and the length of , i.e. . Observe that may be significantly smaller than , especially when is sufficiently large.
In -path, we are given a start node , an end node , and a target integer . The goal is to find a minimum length path from to that visits at least nodes. An -approximation for -path is an algorithm that finds a path with where where is the optimum solution. We study the following extension of -path to multi-path in Section 3 where we design our algorithms for P2P orienteering.
Definition 5 (multi -path).
Given a graph , pairs of nodes , , and a target integer , the goal of multi -path is to find paths from to in such that:
-
the total number of distinct nodes visited by all paths is at least . (a node might be visited by multiple paths, but it is counted only once.)
-
the total length of all paths is minimized.
Notice that multi -path becomes -path when .
In P2P orienteering, we are given a start node , an end node , and a budget . The objective is to find an - path with that maximizes the count of distinct nodes visited.
For any path in and nodes in , let denote the subpath from to in . In deadline TSP, we are given a start node and deadlines for each node in . A feasible solution is a path starting at . We say that such a path visits node by its deadline if . The objective is to find a path starting at to maximize the count of distinct nodes visited within their deadlines.
For graphs of bounded doubling dimension, like earlier works on problems on such metrics, we rely on a hierarchical decomposition of . Suppose is a doubling metric with diameter . We employ the hierarchical decomposition of metric spaces by means of probabilistic partitioning. The decomposition is essentially the one introduced by Bartal [6], and subsequently used by others. In particular, Talwar [32] used this to design the first approximation scheme (QPTAS) for TSP and other problems in doubling metrics. A cluster in the metric is a subset of nodes in . A decomposition of the metric is a partitioning of into clusters. A hierarchical decomposition of is a sequence of partitions of , where each partition is a refinement of the previous one. Normally this is represented by a tree (called the split-tree), where each node of corresponds to a cluster. We use to both refer to a node in as well as the cluster (set of nodes in ) it corresponds to. The root node of corresponds to the single set and the leaf nodes correspond to singleton sets . The children of each node correspond to a partition of where each part has diameter about half of that of . The union of all subsets corresponding to the vertices at each level of constitutes a partition of .
Theorem 6 ([32]).
There is a hierarchical decomposition of , i.e. a sequence of partitions , , , where is a refinement of , , and , and satisfies the following:
-
1.
corresponds to the leaves and corresponds to the root of the split-tree , and height of is , where and is the diameter of the metric.
-
2.
For each at level , cluster , has diameter at most .
-
3.
The branching factor of is at most .
-
4.
For any , the probability that they are in different sets corresponding to nodes in level of is at most .
3 An Approximation Scheme for -path and Orienteering in Doubling Metrics
Before we can give the proof of Theorem 1 we prove Theorems 3 and 4 as our algorithm for Theorem 1 builds upon the idea in these proofs. Suppose that (a graph with bounded doubling dimension ), , and budget are given as an instance of P2P orienteering. Let . We assume is quasi-polynomial in which case is polylogarithmic.
Overview.
Before we present our approximation scheme for P2P orienteering on let us review the algorithm of Chen and Har-Peled [16] for P2P orienteering on Euclidean plane. They showed that the algorithm of Mitchell [29] for Euclidean TSP in fact implies a -approximation for -path, i.e. an algorithm that finds a path with where , where is the optimum -path solution. Using this approximation algorithm to solve the orienteering problem (with the assumption that is the guessed value of the optimum solution for orienteering), they show that one can break the path obtained by the algorithm into segments, each containing vertices; this will be a -jump; once we remove one segment that has the longest length the total length of the path is dropped by at least , and therefore the length of the resulting path is at most the length of the optimum path and hence below the given budget and the total number of nodes is at least . This yields the approximation scheme for orienteering (via -path). The algorithm for -approximation of -path is essentially the algorithm of Mitchell [29] for Euclidean TSP which breaks the problem into (polynomially many) subinstances, each defined by a window (a minimum bounding box). Mitchell defines a vertical (or horizontal) line that cuts a windows a cut and for a parameter if the number of edges of the optimum path that cross is no more than then this cut is sparse; else is dense. If is sparse one can guess the edges of the optimum in time and break the problem into independent instances. If there is no sparse cut then the value of the optimum in this window is large. In this case using either Mitchell’s [29] scheme (using bridges) or Arora’s scheme [2] for TSP (making paths portal respecting paths) one can modify the solution for the problem restricted to to a near optimum one of length at most , where is the restriction of the optimum path to window . We should point out that this idea of partitioning sub-instances into sparse and dense regions has been used in other works (e.g. in [7] to obtain a PTAS for TSP on doubling metrics).
Our QPTAS for orienteering on doubling metrics builds upon this idea of sparse and dense sub-instances, but the difficulty is we do not have a polynomial size set of windows or cuts as in the Euclidean case. We first try to find a good approximation for -path on with a similar stronger upper bound on the quality of the solution: a solution with a stronger upper bound of the form . We show the existence of a near-optimum solution for -path which has some structural properties. Suppose that is a hierarchical decomposition of as in Theorem 6. Consider an arbitrary node of the hierarchical decomposition at level with children . Roughly speaking we would like this near optimum solution to have very few edges crossing between different clusters ’s when we focus on or these edges be portal-respecting if we impose some portals for each as in the algorithm for TSP on doubling metrics [32]. The existanse of such a structured near optimum allows us to find it using a DP on .
For simplicity of presentation, suppose (for -path) is known (let’s call this “Assumption 1”). As said above, consider with children . We also consider the restriction of to , denoted by and let denote the diameter of . We consider two cases based on whether holds or not. If the inequality holds we call sparse with respect to ; else we call it dense.
Sparse case.
If , we show in this case the expected number of edges of crossing between different subgraphs is ; this uses property 4 of Theorem 6. For simplicity assume this actually holds with high probability instead of “in expectation” (call this “Assumption 2”)
Dense case.
If we modify to a near optimum one by making to be portal respecting when it crosses between (as was done for TSP for e.g. in [32]). We consider each of and generate a set of portals for it. We make portal respecting, that is, we modify it such that it crosses between different subgraphs only through portals to reduce the number of times it crosses between different subgraphs to be poly-logarithmic. We show the expected increase of length of in is bounded by , which holds by Theorem 6. Again, assume that this actually holds with high probability instead of “in expectation” every time we do this (call this “Assumption 3”)
We modify to a structured near optimum solution as follows. Starting from the root of , and let initially . We modify as we go down the tree : for each node , if (restriction of to ) is sparse w.r.t. we make no modification going down to children of . However, if is dense w.r.t. , we make portal respecting when crossing between the subgraphs corresponding to children of . This increases the length of by at most . Given that height of is , the total increase in length of over all steps can be bounded to be .
We have made a number of assumptions above that we should remove. We don’t know (Assumption 1) and whether it is sparse or dense in each step we are going down the tree . To remove this assumption we guess both cases of whether is sparse or dense at each step and add both into the DP. To remove Assumptions 2 and 3, we repeat the random decomposition of Theorem 6 many times at each step. In other words, imagine we do parallel (or non-deterministic) runs of the decomposition at each step we want to partition a cluster. Then instead of things holding in expectation, one can show that in at least one such decomposition Assumptions 2 and 3 actually hold with high probability. This idea of repeating random decompositions has been used in earlier works, most recently by [17] to present approximation scheme for -MST on minor free graphs. This non-deterministic decomposition can be described as a tree itself, which we call a -split-tree. Recall that in the hierarchical decomposition we would partition each cluster into where each has diameter at most and . In a -split-tree we consider many such (independent) partitions of in each step when we decompose . This will help us to show that for at least one partition, the properties that are shown to hold in expectation (Assumptions 2 and 3) actually hold with high probability for at least one partition of . We don’t know which of the several parallel decompositions we run at each step will have this property; so we guess and try all of them in our DP.
In the next subsection we formalize this and present our structural theorem that proves the existence of a nearly optimum solution with certain properties. We then show in Subsection 3.2 that the structural theorem in fact shows the existence of a -approximation for -path. In Subsection 3.3 we show how we can find that using a suitable DP. Finally in Subsection 3.4 we prove that we show an approximation scheme for P2P orienteering.
3.1 Structural Theorem
Let be any feasible solution and be an optimal solution to -path. For a subgraph (or subset of vertices) we use to denote the restriction of to .
Definition 7.
is called -dense with respect to if ; otherwise is -sparse.
We will set . A set is a -cover for if for any , there exists such that . A set is a -packing if for any two distinct points and in , holds. A set is a -net for if is a -packing and a -cover for . We can find a -net for any graph easily by iteratively removing balls of radius . The center of these balls forms a -net.
Consider a set . A random partition of is a partition of that is obtained by taking a random -net of (i.e. the centers chosen iteratively are picked randomly); so the balls of the net have diameter and we know that . Note that the algorithm for proving Theorem 6 essentially starts from the single cluster (as the root of the decomposition) and at each step, when we have a cluster , it is decomposed into parts by taking a random partition of . We say an edge is crossing if and are in different parts of i.e. and for . Such an edge is called a bridge-edge. The following lemma (implied by Theorem 6) shows one property of bridge-edges of .
Lemma 8 ([32]).
For any edge with , the probability that crosses (and so is a bridge-edge) is at most for some constant .
Consider . We consider the set of edges of that are bridge-edges, denoted as , i.e. . Suppose is -sprase with respect to , i.e. . We upper bound the number of bridge-edges of , i.e. the size of in this case.
Lemma 9.
If is -sprase with respect to , then for some constant .
Now suppose is -dense with respect to . Again consider the (random) partition of . For each , we further consider a -net of it where ( recall and is the constant in Lemma 8), denoted as and we call them the portal set for . The following packing property of doubling metrics bounds the size of :
Proposition 10 ([24]).
Let be a doubling metric with doubling dimension and diameter , and let be a -packing. Then .
Using this proposition: . We are going to modify such that when it crosses between different clusters in (i.e. uses bridge-edges) it does so via portals only. This means after the modification it will use portal-edges; those bridge-edges whose both end-points are portals. We say a path is portal respecting with respect to if for any edge of crossing between two parts , it only cross through portals, i.e. and . The following lemma shows that one can modify to be portal respecting with respect to with a small increase of length.
Lemma 11.
can be changed to another path that is portal respecting with respect to such that .
Proof.
We start with and whenever an edge of is crossing two parts that are not portals we replace that edge with a path between via the closest portals in and . Consider any edge in that crosses , say and . Let be the nearest portal to in and be the nearest portal to in . Replace edge in by the edges , , . The increased length incurred is , which is at most by triangle inequality. Note that because is a -net of then and . Thus the increased length incurred is at most . Recall that for , the probability that crosses is at most . Thus in expectation, the increased length of after making it portal respecting with respect to is at most . Now we formalize the idea of parallel runs of the hierarchical decomposition of Theorem 6. Note that the algorithm for proving Theorem 6 starts from the single cluster (as the root of the decomposition) and at each step uses a random partition to the current cluster to decompose it into clusters of diameter half the size. This continues until we arrive at singleton node clusters (leaves of the split-tree). We call one random partition of a cluster a split operation. The -split-tree hierarchical decomposition of a doubling metric is obtained by considering random partitions of (instead of just one) at each step. A -split-tree decomposition has two types of nodes that appear in alternating layers: cluster nodes and split nodes. For each cluster we have split nodes in the -split-tree (each corresponding to a random partition of ) and these split nodes are all children of . For each split node that is a child of , it will have children that are clusters obtained by decomposing according to the random partition corresponding to . We continue until leaf nodes are cluster nodes with constant size.
Definition 12.
A -split tree for is a rooted tree with alternating levels of cluster nodes and split nodes. A cluster node corresponds to a subset of . The root of , corresponds to the single cluster and each leaf node corresponds to a set of size of vertices. Each non-leaf cluster node has split nodes as its children. Each split node corresponds to a (random) partition of into clusters of diameter . Each of those clusters becomes cluster children of the split node. So each split node has (cluster) children.
Suppose is a -split-tree for and is a partial function from (some) cluster nodes of to one of their split node children with the following properties:
-
for some child split node of (where is the root of ).
-
if every ancestor split node of is in the image of then is defined.
Note that this function induces a “standard” hierarchical decomposition split-tree as in Theorem 6 as follows: start at the root node of and let root of tree be and repeat the following procedure: at each step, being at a cluster node pick (a split node child of ) and consider the cluster children of , say , and create nodes corresponding to these as children of in . Recursively repeat the procedure from each of them. This builds a split-tree tree . We call such a (partial) function a determining function for and we say is induced by on : .
For any cluster and the split node defined by , we use to denote the number of bridge-edges of in , i.e. . Let , we can build a -split tree for in the following way. We start by making to be the root of and iteratively add levels to . For a cluster node , we generate its children split nodes as follows: we compute independent random partitions of , denoted as , . Each (where ) is obtained by taking a random -net for . Let be the set of bridge-edges of , i.e. edges in crossing : . For each , we further consider the portal set which is a -net of it. Let be the set of portal edges of : . Since is a doubling metric and is a net, we find the following bound on the sizes of the portals: which is bounded by . We create a child split node for for each .
For a split node , let be its parent cluster node and let be the partition (i.e. the -net for ) corresponding to . Then for each we create a child cluster node for . The number of the children cluster nodes of is at most . We continue this process until each leaf node is a cluster node with . From the construction above we know if is a child of a split node which is a child of . Thus there are at most levels in . If we define the height of as the number of levels of cluster nodes then the height of is at most . The branching factor of is then the product of the branching factor of a cluster node and a split node, which is at most . Hence the size of is . Now we are ready to prove the following structure theorem for a near optimum solution.
Theorem 13 (structure theorem).
Let graph with doubling dimension , start and end nodes , and integer be given as an instance of -path. Assuming is an optimum solution and we can construct a -split-tree where with probability at least there exists a determining function and a corresponding split-tree hierarchical decomposition of and a nearly optimal solution such that visits at least vertices and for any cluster we have either:
-
1) , or
-
2) and .
Proof.
Suppose is a -split-tree for . We build iteratively based on and at the same time build and hence from the top to bottom.
Initially we set to be and start from the root cluster node of . At any point when we are at a cluster node we consider whether is sparse or dense with respect to :
Sparse case.
If , i.e. is -sparse with respect to , we don’t modify for when going down from to any split node of . Consider any child split node of and let be the partition of according to the split node . Consider the number of edges of that are bridge-edges based on this partition i.e. (where ). According to Lemma 9, . Let the event be the event that . By Markov inequality . Recall there are many children split nodes of , i.e. independent random partitions of . Thus the probability that for at least one child split node of , event holds is at least . In this case we select split node and define and consider each cluster child node of iteratively ( has not changed in this step).
Dense case.
Suppose is -dense with respect to . Consider an arbitrary split child of . We will modify going down the split node to be portal respecting with respect to as described in Lemma 11. Assume . For each let be a set of portals. If we go down the split node we modify to be portal-respecting for each . Note that the set of edges crossing after making it portal respecting with respect to is a subset of . Thus is at most which is at most in this case. According to Lemma 11, the expected increase of length of after making it portal respecting with respect to is at most . Let be the event that the increase of length of after making it portal respecting with respect to is at most . By Markov inequality, . Recall there are many children split nodes of . Thus the probability that for at least one child split node of we have is at least . In this case we set for this particular split node for which happens.
Therefore, regardless of whether is sparse or dense w.r.t. , such exists for cluster with the probability at least and we can define . Once we have defined for clusters at a level of , we have determined the clusters at the same level of . Note there are at most cluster nodes in one level of . Thus with probability at least such split nodes exist for all cluster nodes in one level. Since height of (and ) is , thus with probability at least (assuming that is polylogarithmic in ) such is well defined over all levels. Note the increase of length of only occurs when is -dense with respect to and for any of these clusters in , the increase of length by modifying to be portal respecting with respect to is at most . Since this -factor increase occurs each time we go down the decomposition form a cluster to the next cluster level down, and the height of the decomposition is , thus inductively, for any cluster in : for some depending on . Replacing with we get .
3.2 -approximation for -path
In this section we show a stronger bound on the length of the near optimum solution guaranteed by Theorem 13. Recall that a -approximation for -path is a path with where where is the optimum solution. We prove that path in Theorem 13 is in fact an -approximation for .
Recall that in the proof of the structure theorem, the increase in length of only happens in cases when is dense with respect to a cluster in and we make the path portal respecting. Consider such a dense cluster in the hierarchical decomposition , i.e. is -dense with respect to . We show has high -excess in this case and the increased length of in can be upper bounded by a factor of -excess of .
Lemma 14.
Let be a set of disjoint clusters and be a path. Then .
Proof.
Intuitively, this is saying if passes through several (disjoint) clusters in then the excess of is at least as big as sum of excess of in those clusters.
Suppose start-end node of are and let be the path just consisting of . By definition of the excess, . Now consider following path , which starts at and follows but when it encounters a cluster in and it visits for the first time it directly connects the start and end node of the subpath of in . When it encounters a cluster in that is visited before, then bypasses entirely, i.e. directly connects the last vertex in before it enters this time and the first vertex in after it visits after it exits this time. From the construction of , if , then . Clearly for any cluster : . Thus .
Theorem 15.
Let graph with doubling dimension , start and end nodes , and integer be given as an instance of -path. Suppose and are as guaranteed by Theorem 13. Let , then is a -approximation.
Proof.
Note that in the proof of Theorem 13, the increase of length of only occurs when is -dense with respect to a cluster . We generate a set of disjoint clusters in : we start from (the root of ) to generate iteratively. If is -dense with respect to then add to , if is -sprase with respect to and is a non-leaf cluster node then iteratively consider all children cluster nodes of . Let be the set of cluster nodes returned by this process. From the construction of , clusters in are disjoint, and for each cluster , is -dense with respect to and .
Let be the optimal -jump of and let be the subpaths divided by the vertices in this -jump, i.e. is the subpath of whose start and end are and , respectively. By definition of excess, . For the set and each , by Lemma 14, . Thus , which is . Recall from the proof of Theorem 13 that we modify when it is -dense with respect to (i.e. ) and we always have , which implies ; in a sense is also (almost) -dense with respect to . Since , thus and .
As in the proof Theorem 13, for any cluster , . Thus .
We should note that we can generalize this proof slightly as follows. Suppose that we pick some arbitrary -jump of (instead of the optimum) and consider which are the subpaths of defined by that -jump. Then the same arguments show that which implies . Using this one can show that at the end . This slightly more general version will be used later when designing our algorithm for deadline TSP.
3.3 Finding A Near Optimum Solution For -path
In this section we prove Theorem 3 by showing how we can find a near optimum solution for -path as guaranteed by Theorem 15 using Dynamic Programming (DP). The DP is built on the -split tree we compute. Consider an arbitrary cluster node in and the restriction of the near optimum solution in the subgraph , denoted by . The set of edges of might be a collection of disjoint paths; one can imagine following along , it enters and exits multiple times and each time it enters it follows a path in until it exits again (assuming that are not in ). If we denote the start-end of these subpaths in as , (for some ) and if then is a feasible solution for multi -path with start-end pairs and parameter . This suggests a subproblem in our DP table will corresponds to an instance of multi-path -path in a cluster .
We define a subproblem in the DP as an instance of multi-path -path with specified cluster node , integer and start-end pairs of vertices and the goal is to find a set of paths such that is a - path in and while minimizing . We use to denote the subproblem defined above and let the entry of the table store the optimal value of the solution to multi-path -path for this subproblem. One should note that in the proof of Theorem 13, when we build from , each time we go down a node of the split-tree, we might have a number of bridge-edges (when is -sprase with respect to the current cluster ) or portal-edges (when is dense with respect to the current cluster ). When is sprase, the number of bridge-edges is at most (it was event in the sparse case) and when is dense then the number of portal-edges is at most . Therefore, each step restricted to might be chopped up into at most subpaths, each with a new start-end point in a cluster that is part of the partition of . Given that the height of the split-tree is , the total number of start-end points for the instance of multi -path at any cluster node is at most . This upper bounds in our subproblems.
Now we describe how to fill in the entries of the table. The base cases are when the cluster has constant size . Such instances can be solved using exhaustive search in time.
Consider an arbitrary entry where for all split nodes children of and every cluster children of them the entries of the table are computed. Consider any child split node of in and let be the children cluster nodes of in . Recall is the corresponding partition of and is the set of bridge-edges in (crossing ). For each let be its portal set and recall is the set of edges crossing only through . We guess for each such that . We show how to guess start-end pairs for each and check the consistency of them. To do so we consider two cases: in the first case (meaning we guess we are in the sparse case) we guess a subset of of size at most ; in the second case (meaning we assume we are in the dense case) we guess a subset of of size at most . Let be the subset guessed in either case. Furthermore for each edge in , we guess it is in which one of the paths with start-end pair and for each path with start-end pair we guess the order of the guessed edges appearing on the path. Specifically speaking, let be the edges guessed in the path with source-sink pair appearing in this order. Let be the children cluster nodes of that the path encounters following , i.e. crosses between and , crosses between and , , and crosses between and . Then we set and the endpoint of in to be a start-end pair in , the endpoint of in and the endpoint of in to be a start-end pair in , , the endpoint of in and to be a start-end pair in . By doing so we generate start-end pairs for each and we sort them based on their ordering in - path and in the increasing order of . This defines start-end pairs for each .
Lemma 16.
We can compute all entries in time .
The goal is to compute where and are specified in the -path instance. Proof of Theorem 3 follows from this lemma and Theorems 13 and 15.
Proof of Lemma 16.
Formally, to compute :
-
Consider any child split node of , let be the children cluster nodes of (where can depend on ).
-
Guess (i.e. try all possible values) for each such that .
-
Let be the corresponding partition of and be the bridge-edges of . For each let be the portal set for it and let be the set of portal-edges of . We consider both of the following two cases: 1) we guess a subset of of size at most ; 2) we guess a subset of ; in both cases we denote the set of guessed edges as .
-
For each edge in , we guess it is in which one of the paths with start-end pair and for each path with start-end pair we guess the order of the guessed edges appearing as described above. We generate for each accordingly. Then:
-
We set , where the minimum is taken over all tuples as described above.
Based on the structure theorem and the recurrence given above it is straightforward to see that this recurrence computes the best as guaranteed in Theorem 15.
Now we analyze the running time. First we show the time required to compute one entry of the DP table is . In the recursion, for a cluster node , there are children split nodes of to consider. For a certain split node , let be children cluster nodes of , there are at most guesses to for such that , which is at most because . For : there are two cases, if then , there are at most many possible ’s to consider; if , then because in this case there are at most many possible ’s to consider. To generate for each : for a certain and for each edge in we guess it is in which one of paths with start-end pair and for each path with start-end pair we guess the order of the edges appearing, which is at most guessings. Note at each recursion it may increase at most many the number of start-end pairs and the depth of the recursion is . Thus and .
We show the size of the dynamic programming table is at most . Recall an entry of the table is of the form . For , there are at most cluster nodes in because the size of is at most . For , there are at most possible value of to consider. For , there are at most start-end pairs to consider, which is at most because is at most .
Therefore, computing the whole DP table and finding the near optimum path as in Theorem 15 takes at most time.
3.4 Approximating P2P Orienteering on Doubling Metrics
In this section we prove Theorem 4 using the results of previous section for -path.
Lemma 17.
Let be graph with constant doubling dimension and given an instance of a P2P orienteering on with specified budget , start node and end node . Let be the optimal for this instance and . Then we can get a - path that visits at least vertices in with the length at most .
Proof.
Let and assume that (otherwise we can find in polynomial time by exhaustive search in time ). We construct a subsequence of to define a -jump of : Let , . Note that and . Let be the subpaths of divided by , i.e. is a subpath of with the source and sink .
For each we consider the -excess of it and let be the subpath with maximum -excess among , i.e. . Note Then let be the path exactly the same as except directly connects and in . From the construction of ,
| (1) | |||
| (2) |
We consider as a feasible solution for a -path instance with and . By Theorem 15, we can compute a -approximation for this instance where , denoted as :
| (3) | |||
| (4) |
where the 2nd line uses (2). We consider the -jump of defined by . Note that this is is also a -jump of . By the definition of excess and how we obtained from (by short-cutting ):
| (5) |
Thus, using (4) and (5): , where the last inequality follows from the fact that is the largest among all indices.
However, for the P2P orienteering instance, and in Lemma 17 are unknown in advance. Therefore, we will consider all possible integers and for each we get the approximation for -path on with specified and . We return the maximum such that the length of path we get for -path is at most . This completes the proof of Theorem 4.
4 An Approximation Scheme for Deadline TSP in Doubling Metrics
In this section we prove Theorem 1. Our algorithm builds upon ideas from [20] for -approximation for deadline TSP for general metrics combined with new ideas as well as those developed in the previous section to get an approximation scheme for deadline TSP on doubling metrics. Friggstad and Swamyy [20] present an -approximation for deadline TSP running in time assuming that all distances are integers and at least 1. They use the notion of regret which is the same as -excess. Note if path visits and then then short-cutting the subpath (replacing it with edge ) will save a length which is exactly . They guess a sequence of vertices of an optimal solution (with ) such that the -excess of the subpaths of optimal increase geometrically: , where is some constant satisfying . They consider a set of P2P orienteering instances with start node , end node , and length budget . These instances are not independent however, hence this is a more general problem that we call multi-path orienteering with group budget constraints (see [20]). They show given an -approximation for P2P orienteering, at an another -factor loss, one can turn it into an -approximation for multi-group multi-path orienteering. Then they concatenate these paths; these paths are not respecting the deadlines however. In order to make them deadline respecting, from every three consecutive paths they shortcut two of them, so another -factor loss. The saving for the shortcutting of two paths is enough for the deadline of every vertex in the third path being satisfied. To obtain -approximation for P2P orienteering instances with groups, they use known reductions from the problem of maximum coverage with group budgets to classic maximum coverage and use algorithm of [14] to get a constant approximation via a reduction to classic P2P orienteering (see [20] for more details). Putting everything together, to obtain an -approximation for deadline TSP they lose factor in three steps.
In our setting in order to get a -approximation for deadline TSP on graphs with bounded doubling dimension, we have to change all these steps so that we don’t lose more than factor in any step. It turns out it becomes significantly more complex to maintain an at most loss in any step. As in [20], we assume distances are integer and (this can be done as pointed out in [20] by scaling).
Overview of the proof.
Suppose we have guessed a sequence of vertices of an optimum solution where the -excess of the sub-path is (at least) , where (for simplicity assume the increase in excess is exactly ). We also assume we have guessed the lengths of these sub-paths, say . Note that the vertices visited in all must have a deadline at least as big as the visit time of in (which we have guessed since we know all previous ’s, ); let denote this set of vertices. Let be the P2P orienteering instance with start-end pair , budget , where the vertices allowed to visit are . Note that the sub-paths form a solution to these instances for . If we have ’s and ’s, we can try to solve these instances simultaneously (our DP described for P2P orienteering can be expanded to handle when we have instances to be solved on the same ground set simultaneously).
One problem is that the vertices visited in might be violating their deadlines slightly. We will show that this violation will be small (using the assumption that the excess of subpath was ) and that by using a similar technique as we did to convert an approximation for -path to an approximation for P2P orienteering we can drop a small fraction of vertices visited in all instances such that the total saving in time achieved for all with is enough to ensure all the (remaining) vertices in are visited before their deadline. Now we start explaining the details of the proof.
Let be a graph with constant doubling dimension , given a start node and deadline for all as an instance of deadline TSP on . Suppose is a constant (will be fixed to be later and let . Let be an optimum solution for this instance and be a sequence of vertices in satisfying the following properties:
-
is the start node of .
-
is the first vertex in after with , except possibly for (the last vertex of ).
So each vertex is the first vertex along the optimum after such that the -excess of the subpath is at least . We will be guessing these vertices ’s eventually and try to find (good) approximations of . We can assume that , otherwise we can compute exactly using exhaustive search. We also denote the vertex on immediately before by . Note , thus (where ) for some constant . For each , we break into subpaths of (almost) equal sizes, denoted as , by selecting a -jump as follows. Assume where and , let then , , and if we consider then we obtain by letting . Suppose is the optimum -jump of , which is the -jump with the maximum length. Recall that is the -excess of and with we have .To simplify the notation we denote the -excess of subpath by . We also use to denote the -excess of path . From the definition of it follows that and . Let be an arbitrary vertex in that falls in between and . We use to denote the length of from to (i.e. following along from the start node to ). Define . Note that the visiting time of in (and hence the deadline of ) is lower bounded by .
Let . Observe that if we consider broken up into several legs , , then it is a P2P orienteering instance with start node , end node and given extra intermediate nodes and the path is supposed to go through these intermediate nodes in this order; so it consists of legs where leg is between and uses vertices in and total budget .
Definition 18 (multiple-groups-legs orienteering).
Let be a graph, given groups each with legs, where leg of group (, ) has start and end node pair and can use vertices from (we have the property that end-node of leg is the same as start node of leg : ), total budget for all the legs of group is . The goal is to find a collection of paths , for , , such that is a - path (and so concatenation of all legs of group gives a single path from start node of the first leg to the last node of leg ), such that and is maximized.
Note () is a feasible solution of the multiple groups-legs orienteering instance with groups and legs , start and end node pairs , budgets and subset . Consider the instance restricted to group alone an instance of multiple-leg P2P orienteering where we have to find a -path that goes through all ’s in order (so has legs) and has budget ; call this instance . Note is a feasible solution to , thus the optimal of visits at least many vertices in . We consider all ’s concurrently, i.e. an instance with pairs of start-end nodes for group where each group is also required to go through vertices of in that order and thus has legs where each leg has start-end pair , total budget for all the legs of group , and the subset , , for leg of group . For a path , let be the set of vertices visited in . Using an argument similar to that of Theorem 13 we can show there is a -approximation i.e. a set of paths such that is a -path and if we define concatenation of different legs of group by then:
| (6) | |||
| (7) |
We also show that if is visited by then if denotes the segment of path from to , then the length of the segment from to in can be upper bounded:
| (8) |
We will prove the existence of such paths with a structure in the next theorem and also how to find these using a DP. For now suppose we have found such paths as described above. We concatenate all these paths to obtain the final answer . We show the vertices of are visited before their deadlines and hence we have an approximation for deadline TSP. Given the bounds given for the sizes of ’s in (6), the number of vertices visited overall (respecting their deadlines) is at least .
To see why the vertices in respect their deadlines consider an arbitrary node . Note that each contains the vertices in (as those are the vertices that define legs of the ’th group). Suppose is visited in , i.e. between and . Therefore, the visit time of in , i.e. is bounded by:
where the last inequality follows from the fact that and so .
So we need to show the existence of as described and how to find them. The road to get these paths is an extension of what we had for multi-path orienteering in the previous section and is obtained by a DP that computes multi-group-legs with multiple paths (i.e. instances ’s) concurrently. The proof of following theorem is an extension of that of Theorems 13 and 15.
Theorem 19 (multi-groups-legs multi-paths orienteering structure theorem).
Let be a graph with constant doubling dimension , given and for all as an instance of deadline TSP and be an optimal solution. Let (), (, ), , and as described above for . Consider a multi-groups-legs orienteering instance with groups and legs , start and end node pairs , budgets , and subset . then we can construct a -split-tree (with ) such that with probability at least there exists a determining function and a corresponding split-tree hierarchical decomposition of and a structured solution of the multi-groups-legs orienteering instance , (, ) such that if we define for each , then:
-
1.
.
-
2.
and for any vertex visited by , say visited in we have the length of the path from to in , denoted by , satisfies: .
-
3.
For any cluster and a partition of defining its children in , let are the set of bridge-edges and portal-edges of cut by the partition, we have either:
-
or
-
.
-
Using a more complex DP and we can find a near optimum structured solution as guranteed by this Theorem. This DP tries to solve multi-groups-legs multi-paths orienteering simultaneously.
References
- [1] Esther M. Arkin, Joseph S. B. Mitchell, and Giri Narasimhan. Resource-constrained geometric network optimization. In Ravi Janardan, editor, Proceedings of the Fourteenth Annual Symposium on Computational Geometry, Minneapolis, Minnesota, USA, June 7-10, 1998, pages 307–316. ACM, 1998. doi:10.1145/276884.276919.
- [2] Sanjeev Arora. Polynomial time approximation schemes for euclidean traveling salesman and other geometric problems. J. ACM, 45(5):753–782, 1998. doi:10.1145/290179.290180.
- [3] Sandip Banerjee, Yair Bartal, Lee-Ad Gottlieb, and Alon Hovav. Novel properties of hierarchical probabilistic partitions and their algorithmic applications. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024, pages 1724–1767. IEEE, 2024. doi:10.1109/FOCS61266.2024.00107.
- [4] Nikhil Bansal, Avrim Blum, Shuchi Chawla, and Adam Meyerson. Approximation algorithms for deadline-tsp and vehicle routing with time-windows. In László Babai, editor, Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004, pages 166–174. ACM, 2004. doi:10.1145/1007352.1007385.
- [5] Nikhil Bansal and Viswanath Nagarajan. On the adaptivity gap of stochastic orienteering. CoRR, abs/1311.3623, 2013. arXiv:1311.3623.
- [6] Yair Bartal. Probabilistic approximations of metric spaces and its algorithmic applications. In 37th Annual Symposium on Foundations of Computer Science, FOCS ’96, Burlington, Vermont, USA, 14-16 October, 1996, pages 184–193. IEEE Computer Society, 1996. doi:10.1109/SFCS.1996.548477.
- [7] Yair Bartal, Lee-Ad Gottlieb, and Robert Krauthgamer. The traveling salesman problem: Low-dimensionality implies a polynomial time approximation scheme. SIAM J. Comput., 45(4):1563–1581, 2016. doi:10.1137/130913328.
- [8] MohammadHossein Bateni and Julia Chuzhoy. Approximation algorithms for the directed k-tour and k-stroll problems. Algorithmica, 65(3):545–561, 2013. doi:10.1007/S00453-011-9610-6.
- [9] Avrim Blum, Shuchi Chawla, David R Karger, Terran Lane, Adam Meyerson, and Maria Minkoff. Approximation algorithms for orienteering and discounted-reward tsp. SIAM Journal on Computing, 37(2):653–670, 2007. doi:10.1137/050645464.
- [10] Kevin Buchin, Mart Hagedoorn, Guangping Li, and Carolin Rehs. Orienteering (with time windows) on restricted graph classes. In International Conference on Current Trends in Theory and Practice of Computer Science, pages 151–165. Springer, 2025. doi:10.1007/978-3-031-82670-2_12.
- [11] T.-H. Hubert Chan and Shaofeng H.-C. Jiang. Reducing curse of dimensionality: Improved PTAS for TSP (with neighborhoods) in doubling metrics. In Robert Krauthgamer, editor, Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, pages 754–765. SIAM, 2016. doi:10.1137/1.9781611974331.CH54.
- [12] Kamalika Chaudhuri, Brighten Godfrey, Satish Rao, and Kunal Talwar. Paths, trees, and minimum latency tours. In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings., pages 36–45. IEEE, 2003. doi:10.1109/SFCS.2003.1238179.
- [13] Chandra Chekuri, Nitish Korula, and Martin Pál. Improved algorithms for orienteering and related problems. ACM Transactions on Algorithms (TALG), 8(3):1–27, 2012. doi:10.1145/2229163.2229167.
- [14] Chandra Chekuri and Amit Kumar. Maximum coverage problem with group budget constraints and applications. In International Workshop on Randomization and Approximation Techniques in Computer Science, pages 72–83. Springer, 2004. doi:10.1007/978-3-540-27821-4_7.
- [15] Chandra Chekuri and Martin Pál. A recursive greedy algorithm for walks in directed graphs. In 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings, pages 245–253. IEEE Computer Society, 2005. doi:10.1109/SFCS.2005.9.
- [16] Ke Chen and Sariel Har-Peled. The euclidean orienteering problem revisited. SIAM Journal on Computing, 38(1):385–397, 2008. doi:10.1137/060667839.
- [17] Vincent Cohen-Addad. Bypassing the surface embedding: approximation schemes for network design in minor-free graphs. In Stefano Leonardi and Anupam Gupta, editors, STOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, pages 343–356. ACM, 2022. doi:10.1145/3519935.3520049.
- [18] Boaz Farbstein and Asaf Levin. Deadline TSP. Theor. Comput. Sci., 771:83–92, 2019. doi:10.1016/J.TCS.2018.11.016.
- [19] Zachary Friggstad and Chaitanya Swamy. Compact, provably-good lps for orienteering and regret-bounded vehicle routing. In Friedrich Eisenbrand and Jochen Könemann, editors, Integer Programming and Combinatorial Optimization - 19th International Conference, IPCO 2017, Waterloo, ON, Canada, June 26-28, 2017, Proceedings, volume 10328 of Lecture Notes in Computer Science, pages 199–211. Springer, 2017. doi:10.1007/978-3-319-59250-3_17.
- [20] Zachary Friggstad and Chaitanya Swamy. A constant-factor approximation for directed latency in quasi-polynomial time. J. Comput. Syst. Sci., 126:44–58, 2022. doi:10.1016/J.JCSS.2021.12.001.
- [21] Jie Gao, Su Jia, Joseph S. B. Mitchell, and Lu Zhao. Approximation algorithms for time-window TSP and prize collecting TSP problems. In Ken Goldberg, Pieter Abbeel, Kostas E. Bekris, and Lauren Miller, editors, Algorithmic Foundations of Robotics XII, Proceedings of the Twelfth Workshop on the Algorithmic Foundations of Robotics, WAFR 2016, San Francisco, California, USA, December 18-20, 2016, volume 13 of Springer Proceedings in Advanced Robotics, pages 560–575. Springer, 2016. doi:10.1007/978-3-030-43089-4_36.
- [22] Naveen Garg, Sanjeev Khanna, and Amit Kumar. Hardness of approximation for orienteering with multiple time windows. In Dániel Marx, editor, Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 - 13, 2021, pages 2977–2990. SIAM, 2021. doi:10.1137/1.9781611976465.177.
- [23] Lee-Ad Gottlieb, Robert Krauthgamer, and Havana Rika. Faster algorithms for orienteering and k-tsp. Theor. Comput. Sci., 914:73–83, 2022. doi:10.1016/J.TCS.2022.02.013.
- [24] Anupam Gupta, Robert Krauthgamer, and James R Lee. Bounded geometries, fractals, and low-distortion embeddings. In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings., pages 534–543. IEEE, 2003. doi:10.1109/SFCS.2003.1238226.
- [25] Anupam Gupta, Ravishankar Krishnaswamy, Viswanath Nagarajan, and R. Ravi. Running errands in time: Approximation algorithms for stochastic orienteering. Math. Oper. Res., 40(1):56–79, 2015. doi:10.1287/MOOR.2014.0656.
- [26] Aditya Jayaprakash and Mohammad R. Salavatipour. Approximation schemes for capacitated vehicle routing on graphs of bounded treewidth, bounded doubling, or highway dimension. ACM Trans. Algorithms, 19(2):20:1–20:36, 2023. doi:10.1145/3582500.
- [27] Haotian Jiang, Jian Li, Daogao Liu, and Sahil Singla. Algorithms and adaptivity gaps for stochastic k-tsp. In Thomas Vidick, editor, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020, January 12-14, 2020, Seattle, Washington, USA, volume 151 of LIPIcs, pages 45:1–45:25. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPICS.ITCS.2020.45.
- [28] Philip N. Klein. A linear-time approximation scheme for TSP in undirected planar graphs with edge-weights. SIAM J. Comput., 37(6):1926–1952, 2008. doi:10.1137/060649562.
- [29] Joseph SB Mitchell. Guillotine subdivisions approximate polygonal subdivisions: A simple polynomial-time approximation scheme for geometric tsp, k-mst, and related problems. SIAM Journal on computing, 28(4):1298–1309, 1999. doi:10.1137/S0097539796309764.
- [30] Viswanath Nagarajan and R. Ravi. The directed orienteering problem. Algorithmica, 60(4):1017–1030, 2011. doi:10.1007/S00453-011-9509-2.
- [31] Kinter Ren and Mohammad R. Salavatipour. Approximation schemes for orienteering and deadline tsp in doubling metrics, 2024. doi:10.48550/arXiv.2405.00818.
- [32] Kunal Talwar. Bypassing the embedding: algorithms for low dimensional metrics. In László Babai, editor, Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004, pages 281–290. ACM, 2004. doi:10.1145/1007352.1007399.
- [33] Kunal Talwar. Bypassing the embedding: algorithms for low dimensional metrics. In Proc. of 36th ACM Symp. on Theory of Computing (STOC), 2004. doi:10.1145/1007352.1007399.
