Streaming Algorithms for Network Design
Abstract
We consider the Survivable Network Design problem (SNDP) in the single-pass insertion-only streaming model. The input to SNDP is an edge-weighted graph and an integer connectivity requirement for each . The objective is to find a minimum-weight subgraph such that, for every pair of vertices , and are -edge/vertex-connected. Recent work by [45] obtained approximation algorithms for edge-connectivity augmentation, and via that, also derived algorithms for edge-connectivity SNDP (EC-SNDP). In this work we consider vertex-connectivity setting (VC-SNDP) and obtain several results for it as well as improved results for EC-SNDP.
-
We provide a general framework for solving connectivity problems including SNDP and others in streaming; this is based on a connection to fault-tolerant spanners. For VC-SNDP we provide an -approximation in space, where is the maximum connectivity requirement, assuming an exact algorithm at the end of the stream. Using a refined LP-based analysis, we provide an -approximation where is the integrality gap of the natural cut-based LP relaxation. These are the first approximation algorithms in the streaming model for VC-SNDP. When applied to the EC-SNDP, our framework provides an -approximation in space, improving the -approximation of [45] using space; this also extends to element-connectivity SNDP.
-
We consider vertex connectivity-augmentation in the link-arrival model. The input is a -vertex-connected spanning subgraph , and additional weighted links arrive in the stream; the goal is to store the min-weight set of links such that is -vertex-connected. We obtain constant-factor approximations in near-linear space for . Our result for is based on using the SPQR tree, a novel application for this well-known representation of -connected graphs.
Keywords and phrases:
Streaming Algorithms, Survivable Network Design, Fault-Tolerant SpannersCategory:
APPROXFunding:
Chandra Chekuri: Supported in part by NSF grant CCF-2402667.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Streaming, sublinear and near linear time algorithms ; Theory of computation Routing and network design problemsAcknowledgements:
This work was conducted in part while Chandra Chekuri, Sepideh Mahabadi and Ali Vakilian were visitors at the Simons Institute for the Theory of Computing as part of the Data Structures and Optimization for Fast Algorithms program. The authors thank Ce Jin for his contributions during the early stage of the project. The authors also thank an anonymous reviewer for pointers to efficient constructions and improved bounds for fault-tolerant spanners, and for pointing out an error in the previous version.Editors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Network design is a classical area of research in combinatorial optimization that has been instrumental in the development and advancement of several important algorithmic techniques. Moreover, it has practical applications across a wide variety of domains. In many modern real-world settings, graphs are extremely large, making it impractical to run algorithms that require access to the entire graph at once. This motivates the study of graph algorithms in the streaming model of computation; this is a commonly used model for handling large-scale or real-time data. There has been an extensive line of work on graph algorithms in the streaming setting. In addition to its practical utility, this line of work has led to a variety of new theoretical advances that have had auxiliary benefits well-beyond what was initially anticipated. Some well-studied problems in the streaming model include matching [56, 38, 6, 5, 46], max-cut [47], spanners [8, 30, 2, 50, 33, 34], sparsifiers [2, 50], shortest paths [32, 41], and minimum spanning tree [2, 66, 60], among many others.
We consider the Survivable Network Design problem (SNDP). The input to this problem is an undirected graph with non-negative edge-weights and a non-negative integer connectivity requirement for each unordered pair of vertices . The objective is to find a minimum-weight subgraph such that, for every pair of vertices , there exist disjoint -paths in . If the paths for the pairs are required to be edge-disjoint, the problem is referred to as edge-connectivity SNDP (EC-SNDP), and if they are required to be vertex-disjoint, it is known as the vertex-connectivity SNDP (VC-SNDP). We refer to the maximum connectivity requirement as . SNDP is a fundamental problem that generalizes many well-known polynomial-time solvable problems, including minimum spanning tree (MST) and - shortest path, as well as several NP-hard problems, including Steiner Tree and Steiner Forest. We define some special cases of interest:
-
-Connected Subgraph: This is the special case in which for all . We denote the edge version as -ECSS and the vertex version as -VCSS; the goal is to find a min-weight -edge-connected and -vertex-connected spanning subgraph respectively.
-
Connectivity Augmentation: In this problem, we are given a partial solution for “free”, with the guarantee that each is at least connected in . The goal is to find a min-weight set of edges that augments the connectivity of each pair to . The edges are often referred to as links. We refer to the augmentation version of the edge/vertex spanning problems as -EC-CAP and -VC-CAP respectively: here we are given a -connected graph and the goal is to increase its connectivity to .
In this work, we study SNDP in the insertion-only streaming model. Formally, the algorithm reads the edges of a graph sequentially in an arbitrary order, processing each edge as it arrives. The goal is to solve graph problems over the streamed edges in a single pass, using a memory significantly smaller than storing the entire set of edges. While there has been significant recent progress for EC-SNDP in the streaming model, VC-SNDP remains essentially unexplored. One reason for this is that vertex-connectivity network design problems often do not share the same structural properties as their edge-connectivity counterparts. For instance, in the offline setting, EC-SNDP admits a -approximation via a seminal iterated rounding algorithm of Jain [44]. On the other hand, the best known approximation for VC-SNDP is [22]; moreover, the dependence on is known to be necessary [16]. Another example highlighting the difficulty of vertex-connectivity problems is -CAP: -EC-CAP is known to reduce to or -EC-CAP for all [28] (see also [52, 18]), but no such structure exists for the vertex-connectivity setting. Thus the main motivating question for this paper is the following:
Question 1.
What is the approximability of vertex-connectivity problems in the streaming setting?
We briefly discuss prior work on streaming algorithms for EC-SNDP and several of its special cases. As mentioned earlier, streaming algorithms for shortest path and MST are both well-studied. We note an important distinction between these two problems: while MST admits an exact algorithm in words of space, the current best known streaming algorithm for - shortest path is an approximation in -space. Thus, any problem that contains - shortest path as a special case incurs this limitation, while global connectivity problems such as MST are likely to have better trade-offs. Some other special cases of SNDP that have been studied in the streaming model include the Steiner forest problem in geometric setting [24], and testing -connectivity [71, 72, 66, 4]. The -EC-CAP problem was recently studied in the streaming model by [45], where they primarily considered two models:
-
Link arrival: In this model, the partial solution is given up-front and does not count towards the space complexity of the algorithm. The weighted links arrive in the stream.
-
Fully streaming: In this model, the edges of the partial solution, along with the additional weighted links used in augmentation, both arrive in the stream. They may arrive in an interleaved fashion; that is, the algorithm may not know the full partial solution when processing some links in .
Both models are practically useful in their own right. Note that an -approximation for -CAP in the link-arrival model implies an -approximation for -ECSS if we make passes over the stream, as we can augment the connectivity of the graph by one in each pass. This is particularly useful in situations where is a small constant and the best approximation ratio for link-arrival is significantly better than that of fully-streaming. In the link-arrival model, [45] obtained a tight -approximation for -EC-CAP in space; note that while one can obtain a better than in the offline setting, there is a lower bound of in the semi-streaming setting. In the fully streaming model, they obtained an -approximation in space for the connectivity augmentation problem using a spanner approach (a -spanner is a sparse subgraph that preserves all distances to within a factor of ). By building on this, and using the reverse augmentation framework of Goemans et al. [39], they achieved an -approximation for EC-SNDP with maximum connectivity requirement ; the space usage is . They further showed that any -approximation for this problem requires at least space.111While they only mentioned , it is straightforward to show that in general, the number of edges in an feasible solution of an SNDP instance with maximum connectivity requirement can be as large as . Hence, is a trivial lower bound too. Although the space complexity of their algorithm nearly matches the lower bound, their approximation for EC-SNDP is worse by a factor. A natural question is the following.
Question 2.
Is there an -approximation for EC-SNDP using -space?
1.1 Results and Techniques
We make significant progress towards our motivating questions and obtain a number of results; a summary is provided in Table 1. In all weighted graphs throughout the paper, we assume the weight function where ; thus and we do not explicitly include in the space complexity. We remark that designing streaming algorithms where the total number of stored edges is independent of , as explored in [45], is an interesting technical question in its own right. We also note that all our algorithms assume an exact algorithm at the end of the stream, as the focus of this paper is optimizing the tradeoff between space and approximation ratio. We refer the reader to Section 2.1 for a discussion on how these algorithms can be made efficient.
A framework for SNDP.
Our first contribution is a general and broadly applicable framework to obtain streaming algorithms with low space and good approximation ratios for SNDP; this is provided in Section 2. This framework applies to both edge and vertex connectivity, as well as an intermediate setting known as element-connectivity. 222Here, the vertex set is divided into two types: reliable () and non-reliable (). Elements denote the set of edges and the set of non-reliable vertices . For , a set of -paths are element-disjoint if they are disjoint on elements. This framework addresses Question 1 and partially resolves Question 2 affirmatively. All the results below use -space for vertex-connectivity and element-connectivity problems, and -space for edge-connectivity problems, where is the maximum connectivity requirement and is a parameter that allows for an approximation vs. space tradeoff. 333When is an even integer, the space used is a factor of more than when is odd. The results stated in this section assume that is an odd integer.
-
For EC-SNDP, the framework yields -approximation, improving upon the -approximation from [45]. For an -approximation, the space bound of our algorithm is off by only a factor of from the known lower bound. These bounds also hold for element-connectivity, providing the first such results for this variant.
-
For VC-SNDP, the framework yields an -approximation.
-
For VC-SNDP, the framework yields an -approximation where is the integrality gap of the natural LP relaxation. Using this, we obtain improved algorithms for several important special cases including -VCSS and -VC-CAP.
Algorithms for -VC-CAP
Our second contribution is for -VC-CAP in the link-arrival model; this is provided in Section 3. This is a global connectivity problem and does not include the --shortest path problem as a special case; hence we hope to obtain better bounds that avoid the overhead of using spanners. We obtain the following approximation ratios for -VC-CAP; both algorithms use space: (a) for , we obtain a -approximation algorithm, and (b) for , we obtain a -approximation algorithm. Following the earlier discussion, this implies that with passes of the stream, we obtain a constant-factor approximation in near-linear space for -VCSS for .
| Problem | Approx. | Space | Note |
|---|---|---|---|
| EC-SNDP | [45] | ||
| [Here] | |||
| bits [45] | lower bound | ||
| -VC-CAP | [Here] | fully streaming () | |
| bits [Here] | fully streaming lower bound | ||
| [Here] | (link arrival) | ||
| [Here] | (link arrival) | ||
| VC-SNDP | [Here] | ||
| bits [Here] | lower bound | ||
| -VCSS | [71, 19, 59] | for unweighted graphs | |
| [Here] | |||
| bits [Here] | lower bound |
Techniques.
Our general framework for SNDP and related problems is based on a connection to fault-tolerant spanners which were first introduced in [55] in geometric settings and then extensively studied in the graph setting. These objects generalize the notion of spanners to allow faults and are surprisingly powerful. Recent work has shown that, similar to ordinary spanners, optimal vertex fault-tolerant spanners and near-optimal edge fault-tolerant spanners can be constructed using a simple greedy algorithm, which enables their use in the streaming setting [12, 9]. Using these spanners alone suffices to obtain an -approximation. Obtaining our refined approximation bounds requires additional insight: we combine the use of fault-tolerant spanners with an analysis via natural LP relaxations for SNDP. This improved analysis has a key benefit. It allows us to directly improve the factor for problems with corresponding integrality gap better than – this applies to several of the problems we consider, such as EC-SNDP, ELC-SNDP and -VCSS.
For -VC-CAP, we aim to augment a spanning tree to a -vertex-connected graph. To do so, we borrow ideas from the edge-connectivity setting: we root the tree arbitrarily, and for each node , we store the link that “covers” the most edges in the path from to the root. This does not quite suffice in the vertex-connectivity setting, thus some additional care is required. Our main contribution is an algorithm for -VC-CAP. Here we need to augment a -vertex-connected graph to a -vertex-connected graph. In edge-connectivity, this reduces to cactus-augmentation (which can essentially be reduced to augmenting a cycle). However this does not hold for the vertex-connectivity setting. Instead, we use the SPQR-representation of a -vertex-connected graph: this is a compact tree-like data structure that captures all the 2-node cuts of a graph and was introduced by Di Battista and Tamassia [26] that dynamically maintains the triconnected components (and thus all -node cuts) of a graph. It was initially developed in the context of planar graphs [25, 27]. We use this tree-like structure to combine ideas from -VC-CAP with ideas from cactus augmentation in the edge-connectivity setting to obtain our result. The algorithm is tailored to the particulars of the SPQR representation and is technically quite involved. We refer the reader to Figure 4 for an example of a -connected graph and its SPQR tree.
1.2 Related Work
Offline Network Design.
There is substantial literature on network design; here we briefly discuss some relevant literature. EC-SNDP admits a -approximation via the seminal work on iterated rounding by Jain [44] and this has been extended to ELC-SNDP [35, 21]. We note that the best known approximation for Steiner Forest, the special case with connectivity requirements in , is . Steiner tree is another important special case, and for this there is a -approximation [14]. Even for -ECSS the best known approximation is , although better bounds are known for the unweighted case. Recently there has been exciting progress on -EC-CAP, starting with progress on the special case of weighted TAP (tree augmentation problem which corresponds to ). For all , -EC-CAP admits a (-approximation [69] – see also [67, 68, 13, 15, 37]. In contrast to the constant factor approximation results for edge-connectivity, the best known approximation for VC-SNDP is due to Chuzhoy and Khanna [22]. Moreover, even for the single-source setting it is known that the approximation ratio needs to depend on for sufficiently large [16]. The single-source problem admits an -approximation [61, 63] and subset -connectivity admits an -approximation [54]. Several special cases have better approximation bounds. When , VC-SNDP admits a -approximation [35, 21] which also implies that -VCSS for and -VC-CAP for admit a -approximation. For -VCSS a -approximation is known when is large compared to [65, 20]. For smaller value of improved bounds are known – see [64]. These are also the best known bounds for -VC-CAP when is large compared to . For large , -VC-CAP and -VCSS admit an and -approximation respectively with more precise bounds known in various regimes [64]. We note that many of the approximation results (but not all) are with respect to a natural cut-cover LP relaxation. This is important to our analysis since some of our results are based in exploiting the integrality gap of this LP relaxation. Many improved results are known for special cases of graphs including unweighted graphs, planar and graphs from proper minor-closed families, and graphs arising from geometric instances. We focus on general graphs in this work.
Streaming Graph Algorithms.
Graph problems in the streaming model have been studied extensively, particularly in the context of compression methods that reduce the graph size and preserve connectivity within a factor of (i.e., spanners) [31, 8, 30] or approximate cuts within a factor (i.e., cut sparsifiers and related problems) [1, 51, 48, 49]. These problems have also been widely explored in the dynamic streaming model, where edges are both inserted and deleted. While graph sketching approaches have sufficed to yield near-optimal algorithms for sparsifiers [2], the state-of-the-art for spanners in dynamic streams remained multi-pass algorithms until recently [2, 47]. Filtser et al. [34] developed the first single-pass algorithm for -spanners using space in dynamic streams. Though this result has a large approximation factor, Filtser et al. conjectured that it may represent an optimal trade-off.
Another line of research related to our work is testing connectivity in graph algorithms. This problem has been studied for both edge-connectivity and vertex-connectivity [31, 71, 66], as well as in dynamic settings [2, 23, 40, 7]. Specifically, -connectivity for both edge- and vertex-connectivity can be tested using space even in dynamic streams [2, 7].
Finally, for the problem of -ECSS, [45] designed a -pass algorithm within the augmentation framework [39] that finds an -approximate solution using space.
Due to space constraints, this version of the paper serves as an extended abstract. Please see the full version [17] for more detailed description of technical details and related work.
1.3 Preliminaries
We provide preliminary background on connectivity. Let be an undirected graph. Two vertices are -edge (-vertex) connected if contains edge-disjoint (vertex-disjoint) -paths. Let be a subset of vertices. We denote the set of edges crossing by ; . We drop when it is implicit from the context. Some additional notation (following prior work [61, 21, 35]) is required for vertex connectivity. A biset is a pair of sets where . We say that an edge crosses a biset if one of its endpoints is in and the other is in . We define .
Menger’s theorem is a fundamental result characterizing the relation between the maximum connectivity of and the minimum cut between a pair of vertices. Its formulation is as follows:
Theorem 2 (Menger’s theorem).
Two vertices are -edge connected iff for each set such that and , . Similarly, are -vertex connected iff for each biset such that and , .
1.3.1 Fault-Tolerant Spanners in Streaming
Definition 3 (Fault-Tolerant Spanners).
A subgraph is an -vertex-fault-tolerant (-VFT) -spanner of if, for every subset of vertices of size at most , all pairwise distances in are preserved within a factor of . That is, for all , we have where and denote the induced subgraphs and , respectively. Similarly, we can define -edge-fault-tolerant (-EFT) -spanner.
A natural algorithm for constructing fault-tolerant spanners, which is a straightforward adaptation of the standard greedy algorithm of [3] for spanners, is to process the edges in an arbitrary order and add an edge in the spanner if there exists a set of vertices of size at most such that their removal increases the distance of in the so-far-constructed spanner to at least .
Theorem 4 ([12]).
For any -vertex graph , the greedy algorithm for the -VFT -spanner returns a feasible subgraph of size .
This bound on spanner size is tight and fully matches the known lower bound for VFT [9].
Theorem 5 ([11]).
For any -vertex graph , the greedy algorithm for the -EFT -spanner returns a feasible subgraph of size
The bound on the spanner size is tight for constant odd , and is off from the best known lower bound [9] by only quadratic factors of for non-constant odd , and only for even .
It is straightforward to show that for unweighted graphs, the greedy algorithm for spanners can be implemented in insertion-only streams with a space complexity equal to the size of . Moreover, for the remainder of the paper, we assume that , as setting it any larger does not yield asymptotic improvements in the space complexity of the spanner.
Weighted graphs.
Although running the greedy algorithm with edges in the increasing order of edge weights provides the same guarantee on size and stretch for fault-tolerant spanners (cf. [12]), the algorithm is no longer implementable in the streaming setting. A standard technique to address this issue is bucketing. Given a weighted graph with weight function , we partition the edges of into buckets, where the th bucket contains edges with weights in the range , for . We use bucket for zero-weight edges. Then, we construct a fault-tolerant spanner in each bucket (treating it as an unweighted graph) using the greedy algorithm for unweighted -FT spanners. This increases the space by a factor of and the spanner distortion by a factor of . If and by setting , this process can be used to obtain a single-pass streaming algorithm that returns:
-
An -VFT -spanner of size using words of space;
-
An -EFT -spanner of size using words of space.
2 Generic Framework for Streaming Algorithms for Network Design
In this section, we describe our generic framework for streaming algorithms for network design problems. The algorithm, described in Algorithm 1, is both simple and practical.
As the algorithm only constructs and stores a fault-tolerant spanner with the given parameters and in the stream, its space complexity follows directly from the discussion in Section 1.3.1. Specifically, the space complexity is in VC-SNDP and in EC-SNDP. However, the approximation analysis of the algorithms is technical. The rest of this section is dedicated to analyzing the approximation performance of Algorithm 1, and we will mainly focus on vertex-connectivity requirements. For this section, we assume the offline algorithm used at the end of the stream is an exhaustive search: we enumerate all subgraphs of and check feasibility for each, returning the solution of minimum cost. Note that this is possible since feasibility of SNDP (for both edge and vertex connectivity) can be checked in linear space by checking connectivity via augmenting path based max-flow routines. Section 2.1 contains a discussion of alternate choices of algorithm and the resulting tradeoffs of runtime, space, and approximation ratio.
Before analyzing our framework, we present an observation on the structure of VFT spanners (or EFT spanners) that is used in our analysis for all variants.
Observation 6.
Given a weighted graph , let denote the VFT spanner of constructed by Algorithm 1 with parameters . If with , then contains at least vertex-disjoint -paths, each containing at most edges that all have weights in .
Proof.
We perform iterations, and in each iteration , we find a -path of length at most that is vertex-disjoint from the previously constructed -paths . To do this, we define the set of vertices and find a -path in . Initially, set . Since , by the properties of the -VFT -spanner , there exists a -path , which is a path containing at most edges, each with weight belonging to , and is vertex-disjoint from .
A Simple Analysis Based on Integral Solutions.
Given any optimal solution OPT to the VC-SNDP instance on , one can use Observation 6 to construct an -approximate solution on the output of Algorithm 1 as follows: for each , if , add to the solution. Else, add the vertex disjoint - paths given by Observation 6 to the solution. This gives us the following theorem; the formal proof is deferred to a full version [17].
Theorem 7.
Let be the VFT spanner of a weighted graph as constructed in Algorithm 1 with parameters . Then an optimal solution of VC-SNDP on () is within a -factor of an optimal solution of VC-SNDP on ().
Corollary 8.
There exists an algorithm for VC-SNDP in insertion-only streams that uses space and outputs a -approximate solution.
An Improved Analysis via Fractional Solutions.
We show a refined analysis of the framework which shows that an -VFT -spanner contains an -approximate fractional solution for the given VC-SNDP instance. This is particularly interesting as it demonstrates that a fault-tolerant spanner preserves a near-optimal fractional solution for VC-SNDP on the given graph . In other words, fault-tolerant spanners serve as coresets for network design problems. The standard (bi)cut-based relaxation is as follows:
| (VC-SNDP-LP) | ||||||
Here, when , is defined as , where . Otherwise, . In particular, observe that for every biset with , .
Theorem 9.
Let be the VFT spanner of a weighted graph as constructed in Algorithm 1 with parameters . Then the weight of an optimal fractional solution of VC-SNDP on () is within a -factor of the optimal solution of VC-SNDP on ().
We note a small but important difference between the algorithm implied by theorem above, and the one earlier. We increase the by a factor of which is needed for the proof below.
Proof.
Let , where , be the output of Algorithm 1 with . Recall that for every , is a -VFT -spanner for the edges in with weights in .
Let be an optimal solution for the VC-SNDP instance on . Starting from OPT, we construct a feasible fractional solution supported only on , for the standard (bi)cut-based relaxation (i.e., VC-SNDP-LP) of the VC-SNDP instance, with cost at most .
Then, the fractional solution is constructed from OPT as follows (in Figure 1).
Construction of from OPT
-
Initialize as an all-zero vector, i.e., for all .
-
for each
-
let denote the weight class to which the weight of belongs.
-
if then
-
else let be vertex-disjoint -paths in , each of length at most
-
for each ,
-
-
Note that our algorithm does not need to explicitly construct ; this is only for analysis purposes.
First, we prove the feasibility of for VC-SNDP-LP(). Consider a biset with . Note that for this to hold, it requires that . In the optimal solution OPT, there are at least edges in . Let and respectively denote the number of edges in that belong to and those that do not; i.e., and . Note that since for every , if then the fractional solution satisfies the connectivity requirement of .
Next, consider the case in which . We select edges from the edge set and denote them as . For each , consider the vertex-disjoint -paths in , as shown in Observation 6, and used in the construction of (see Figure 1). Since are vertex-disjoint and is crossing the biset , at least
of the paths must have an edge crossing distinct from , where the last inequality holds because for every biset with , . Without loss of generality, let us denote of these distinct edges by . Then, by the construction of ,
Note that the second inequality holds because and are disjoint and no edge appears more than times in the second summation (i.e., ). Hence, for every edge , its value is at most , because which is defined as the number of times appears in the collection , is at most . So, is a feasible solution for VC-SNDP-LP().
For the cost analysis, note that for every edge in weight class , either , or it contributes in increasing the values at most units on edges whose weight belong to . Therefore, .
Corollary 10.
There exists a -approximation algorithm for VC-SNDP in insertion-only streams that uses space, where is the integrality gap of the cut-based LP relaxation.
Implications for VC-SNDP and special cases.
The main advantage of the fractional analysis is for those cases where the integrality gap of the LP is small. We point out some such cases and note that this is particularly useful for EC-SNDP and ELC-SNDP, which we discuss later.
-
For finding the cheapest vertex-disjoint - paths, there is an algorithm that uses space and outputs a -approximate solution. This follows from the fact that the flow-LP is optimal for - disjoint paths.
We believe that the regime of being small compared to is the main interest in the streaming setting. For large values of , and approximation bounds can be derived for -VC-CAP and -VCSS, respectively, via known integrality gaps (see [64] and [62]). We omit formal statements in this version.
EC-SNDP.
The proof technique that we outlined for VC-SNDP applies very broadly and also hold for EC-SNDP and ELC-SNDP. The proofs use the fact that the corresponding integrality gaps are [44, 35]. We state below the theorem for EC-SNDP and defer ELC-SNDP and proof details to the full version [17].
Theorem 11.
There exists a streaming algorithm for EC-SNDP that uses space and outputs an -approximate solution.
2.1 Efficient Streaming Algorithms
The general framework and corresponding streaming algorithms discussed so far aim to optimize the tradeoff between space usage and approximation ratio. However, these algorithms, as described, may run in exponential time. In this section we outline approaches to obtain polynomial-time algorithms and the necessary space/approximation tradeoffs. We consider the two parts of the framework, (1) the streaming algorithm for storing a fault-tolerant spanner and (2) the algorithm at the end of the stream, separately.
Streaming Algorithm.
The standard greedy algorithm for -FT spanners runs in time and this is not computationally efficient for large values of . The study of polynomial-time constructions of such spanners is an active research question [29, 10, 11]. In particular, the following polynomial-time constructions can be implemented in the streaming setting. In all the methods described, the key modification is to replace the naïve -time test (i.e., checking whether there exists a set of f edges or vertices whose removal increases the distance between and in the remaining subgraph to at least ) with a polynomial-time test.
-
VFT: Bodwin, Dinitiz and Robelle [10] proposed a randomized implementation of the greedy approach for -VFT -spanners. In their method, when testing whether to add an edge , the algorithm randomly samples induced subgraphs of the current spanner. Each subgraph includes , and each of the remaining vertices is included independently with probability . Then, the edge is added to the spanner if, in at least fraction of the sampled subgraphs, the distance between and exceeds . They show that this algorithm succeeds with high probability. It is simple to see that this can be implemented in the streaming setting in space that is proportional to the size of the spanner. Hence, it is possible to construct an -VFT -spanner of optimal size, i.e., , in polynomial time in the streaming model, that succeeds with high probability.
-
EFT: Dinitz and Robelle [29] provided a simple polynomial-time construction of -EFT -spanners with slightly increased size complexity, i.e., , which can be implemented efficiently in the streaming model too. Specifically, in their approach, when testing whether to add an edge , they perform iterations as follows: starting with an initially empty set of edges , in each iteration they attempt to find a path of length at most between and in and add it to , where is the current spanner. If such a path exists, it is added to . If, in any iteration, no such path is found in , then the edge is added to the spanner . Otherwise, it is not added. Later, Bodwin, Dinitz, and Robelle [11] provided an improved analysis of the same (polynomial time) algorithm, achieving size bounds only slightly worse than those of the greedy approach with an exponential-time test. Their result constructs -EFT -spanners of size for odd . For even , the spanner size is .
Calculating Feasible Solution.
In all the described algorithms, we perform an exponential time exhaustive search, by enumerating all possible solutions, on the constructed spanner to find an optimal solution after the stream terminates. The spanner effectively serves as a coreset for the problem. Since most of the problems considered in this paper are NP-hard, one could instead run known polynomial time approximation algorithms in the offline setting. We discuss some such approximation algorithms of interest.
The best known approximation for EC-SNDP is a 2-approximation via iterated rounding [44]. However, this requires exactly solving the cut-based LP; it is unclear if this can be done in linear space, especially given that this LP is exponentially sized. There is a primal-dual 2-algorithm for the connectivity augmentation problem [70]; this can be implemented in linear space. While the algorithm does not directly solve the LP, the analysis shows that it is a 2-approximation with respect to the optimal fractional solution. This can be repeatedly applied to obtain an -approximation (where is the maximum connectivity requirement) for EC-SNDP [39]. For vertex-connectivity, The best known approximation for VC-SNDP employs a reduction to element connectivity. Given an -approximation for ELC-SNDP that uses space, one can obtain a -approximation in space [22]. Some algorithms for special cases of VC-SNDP (such as single-source, -VC-CAP, etc.) may be modified to run in linear space; we omit details for brevity and refer the reader to related work discussed in Section 1.2.
Combining the two parts, we achieve the following efficient streaming algorithms, where is the space usage for the corresponding streaming problem (i.e. for vertex-connectivity instances, and for edge-connectivity instances):
-
Integral Solution Approach. If there exists a polynomial time -approximation algorithm for the SNDP problem with space complexity , where is the size of the input graph, our framework returns an -approximate solution in polynomial time, using space.
-
Fractional Soultion Approach. If there exists a polynomial time algorithm for the SNDP problem that returns an integral solution within an -factor of the optimal fractional solution to the cut-based LP relaxation of the problem, with space complexity (where is the size of the input graph), then our framework returns an -approximate solution in polynomial time, using space.
3 Vertex Connectivity Augmentation in Link-Arrival Model
We consider -VC-CAP in the link arrival setting. Let denote the given underlying -vertex-connected graph, and let , denote the weighted links arriving in the stream. Recall that we aim to find the min-weight subset such that is -vertex-connected. For ease of notation, we write -connected to mean -vertex-connected. We show that for , we can obtain constant-factor approximations in near-linear space.
3.1 One-to-Two Augmentation
We outline the proof of the following theorem; details are deferred to the full version [17].
Theorem 12.
There exists a streaming algorithm for -VC-CAP with edge weights , in an insertion-only stream, that uses space and outputs a -approximate solution.
We assume without loss of generality that the 1-connected graph is a tree; if not, we can fix a spanning tree of as the underlying graph, and consider all remaining edges as -weight links in the stream. For , we let denote the set of links with . We fix a root of the tree . For each , we let denote the subtree of rooted at and denote the set of children of . For , we let denote the lowest common ancestor of and in ; this is the vertex furthest from the root such that . We overload notation and write for to be the LCA of its endpoints. We let denote the number of edges in the unique tree path between and . We use the following lemma.
Lemma 13 ([57]).
Given any set of nodes with links appearing in an insertion-only stream, one can store a minimum spanning tree on using memory space.
The streaming algorithm is given in Algorithm 2. For each vertex and each weight bucket , we store the link with closest to the root. Furthermore, for each , we consider a contracted graph with nodes, where each subtree for is contracted into a node. We maintain an MST on this contracted graph.
It is easy to see that the number of links stored is . In order to bound the approximation ratio, we fix an optimal solution OPT on . We will show that there exists a feasible solution such that . We construct SOL as follows:
-
For each , let be such that . Add links and to SOL.
-
For each
-
–
For each , if OPT contains a link between and , mark as “good”;
-
–
Contract all supernodes of corresponding to “good” vertices into one “good” supernode. Let be an MST on . Add to SOL.
-
–
It is not difficult to verify that . We show feasibility in Lemma 14, concluding the proof of Theorem 12.
Lemma 14.
is a 2-connected graph.
Proof.
We want to show that for all , is connected. Fix . Since OPT is feasible, it suffices to show that for all with , there exists a - path in that does not use . Fix . If the (unique) - path in does not contain , then we are done. Thus we assume is on the - tree path. We case on whether or not is the of and . Let . Let be the children of such that and .
-
Case 1: (see Fig 3) Suppose . If or are not marked as “good”, then and correspond to separate supernodes of and thus and must be connected via . and remain connected despite the deletion of , so and are connected via .
Suppose instead both and are marked as “good”. Since is good, there must be some link . Let be the vertex incident to in , and let be the weight class of . Then must have an endpoint in , since . Furthermore, , since . Similarly, there must be some such that contains a link with one endpoint in . Since remains connected despite the deletion of , we obtain our desired - path.
-
Case 2: (see Fig 3) If , then is either in or in . Suppose without loss of generality that ; the other case is analogous. Let be the weight class of . Then ; the first inequality holds since . Thus has one endpoint in . Furthermore, since . Since remains connected despite the deletion of , this gives us our desired - path in .
3.2 Two-to-Three Augmentation
In this section, we outline the key ideas of the proof of the following theorem:
Theorem 15.
There exists a streaming algorithm for -VC-CAP with edge weights , in an insertion-only stream, that uses space and outputs a -approximate solution.
We provide background on SPQR trees in Section 3.2.1 and a technical overview of the -VC-CAP streaming algorithm in Section 3.2.2. The detailed algorithm and all proofs are deferred to the full version [17]. To avoid confusion with two-vertex cuts , we denote edges/links as or . For any , , we let denote the edges in with one endpoint in and the other in .
3.2.1 SPQR Trees
An SPQR tree is a data structure that gives a tree-like decomposition of a 2-connected graph into triconnected components. SPQR trees were first formally defined in [26] although they were implicit in prior work [25], and the ideas build heavily on work in [43]. Let be a 2-connected multigraph (parallel edges are allowed as they may arise during the recursive construction of SPQR trees).
Definition 16.
A separation pair is a pair of vertices such that at least one of the following hold:
-
1.
has at least two connected components . For each , we call the set a separation class. We let denote an additional separation class containing all parallel edges between and .
-
2.
contains at least two parallel edges and . Here the separation classes are (all parallel edges between and ) and .
Note that the separation classes partition the edge set .
Definition 17.
For a separation pair with separation classes , choose such that both and have at least 2 edges. The split operation introduces a new virtual edge and replaces with two new multigraphs and . Note that and remain 2-connected.
The SPQR tree of a graph is constructed via the following recursive procedure. Note that each node of corresponds to a subgraph of (with additional virtual edges).
-
1.
If has no separation pair, then is the singleton tree with one node and no edges. We write to denote the graph corresponding to tree node .
-
2.
Else, we split on separation pair to obtain and virtual edge . We recursively construct SPQR trees on . Let be the nodes of respectively containing edge – this is well defined, since the split operation partitions the edges of and is contained in both and . We let ; that is, we combine and via an edge between and . We say the tree edge is associated with the virtual edge .
If there are two adjacent tree nodes such that and are both cycles or , we merge and by combining them and removing their shared virtual edge. After this process, for every , is either (1) exactly two vertices with three or more parallel edges, (2) a simple cycle, or (3) a three-connected graph with at least 4 vertices. These are referred to as P, S, and R nodes respectively. See Fig 4 for an example. SPQR trees can be constructed in linear-time [42].
SPQR trees have the following nice properties, given mostly by [43, 26]. Each virtual edge is in exactly two tree nodes and is associated with a unique tree edge. Each edge in is in exactly one tree node. The total size is bounded; that is, . Most importantly, SPQR trees provide a nice characterization of all 2-cuts of . Let be a 2-cut of . Then, one of the following must be true:
-
1.
for a P-node . The components of correspond to subtrees of .
-
2.
There exists a virtual edge associated with a tree edge such that at least one of and is an R-node; the other is either an R-node or an S-node. The components of correspond to subtrees of .
-
3.
and are non-adjacent nodes of a cycle for an S-node . The components of are the subtrees corresponding to the two components of .
3.2.2 The Streaming Algorithm
We provide a high level description of the algorithm. Let be the given 2-connected graph, and let be its SPQR tree. Let be the root of . There are three possible type of 2-vertex cuts in . Intuitively, one can think of (1) as corresponding to a node being deleted in the tree, (2) corresponding to an edge being deleted in the tree, and (3) to handle connectivity within cycle nodes.
“Tree” Cuts.
To handle 2-vertex-cuts of the first two types (see Figures 6, 6), we follow a similar approach to 1-VC-CAP (Section 3.1). Additional difficulty arises from the fact that may contain multiple “copies” of each vertex in ; recall that if is part of a separation pair, then it is duplicated during the “split” operation. Thus an incoming link does not necessarily correspond to a unique “tree link” . Our algorithm strategically chooses which tree link to assign each to in order to ensure feasibility. For each tree node , we store the link minimizing the distance from to , where is the node containing closest to the root and is the node containing furthest from the root. For each P-node , we store an MST on the graph obtained by contracting all subtrees of . The approximation and space analysis is similar to (although more technically involved than) that of 1-VC-CAP.
“Cycle” Cuts.
We build on work by [52, 53, 45] for augmenting a cycle graph to be 3-edge-connected in the unweighted setting. The idea is to bidirect links: each link is replaced with two directed links and . For a 2-edge cut , it suffices to include a directed link such that and . It is easy to see that for , the directed link covers a superset of the cuts covered by , and the same holds for for ; see Fig 8. Thus we can store at most two incoming links per vertex and obtain a 2-approximation in linear space.
We employ a similar idea for covering 2-vertex cuts of type (3). Let be some S-node. The main differences in this setting are handling vertex failures instead of edge failures, and, more importantly, the fact that two components of can be connected via links not in . For example, the components can be connected by a link between the two subtrees of corresponding to the two components of . We handle this by first subdividing each virtual edge (by adding a dummy node), and then mapping each vertex in to its corresponding point on the cycle (see Fig 8). We use this mapping to view each link as a link between two cycle nodes, and follow a similar approach to augmenting a cycle graph. The key technical challenge lies in the fact that a single link may map to multiple S-nodes in the tree, leading to a large blow-up in the approximation factor. We circumvent this by showing that for each , we can restrict attention to at most three S-nodes in the tree: the ones containing and and the LCA of the corresponding tree nodes.
4 Lower Bounds for Streaming Network Design
We describe a lower bound for the vertex-connectivity tree-augmentation problem (VC-TAP), i.e., -VC-CAP.
Theorem 18.
Consider the unweighted VC-TAP where both and arrives as a stream in an arbitrary order. Any single-pass algorithm returning a better than -approximation requires space.
Proof.
Let be a fixed graph on vertices with girth strictly larger than . Consider the INDEX problem: Alice has a bit string from , representing a subgraph . Alice then sends a message to Bob, who must recover the -th bit of the string for a given index , or equivalently, determine whether for a specified edge . It was shown by Miltersen et al. [58] that any bounded-error randomized protocol for INDEX requires a message of size bits. Note that the graph and its edges are known to both Alice and Bob.
We now use the streaming algorithm for VC-TAP to design a protocol for the INDEX problem. Alice and Bob jointly construct a TAP instance for as follows:
-
First, Alice sets and feeds it into . She then sends the memory contents of to Bob. To determine whether , Bob constructs a chain and feeds to , where , , and the intermediate vertices are ordered so that for . Here, the graph is defined as with the edge removed.
-
Bob then determines that if and only if returns an approximate solution with cost less than for the instance .
Next, we prove the correctness of the described protocol that uses .
-
If : In this case, the optimal solution for augmenting the chain is to add the single edge , completing a spanning cycle. Hence, will report an approximate solution of cost at most and Bob can correctly decide .
-
If : To show that Bob can correctly decide , it suffices to show that any feasible augmentation set has size at least .
We assume for all . Since is -vertex-connected, the intervals covers all . This is because, once we add an edge , removing any vertex in does not disconnect the graph, as the connectivity is preserved by the edge . We can assume, without loss of generality, that and , with , by keeping a minimal feasible subset of . This is because if and , then removing still leaves all cuts covered by . Moreover, if , the removing any nodes in will leave the graph disconnected.
Note that . Now we inductively prove for every that . The base case is immediate: . For the inductive step , we have
Hence, this shows that . So contains a cycle of length at most . Since has girth at least , we conclude .
Theorem 18 immediately implies the following for -VC-CAP.
Corollary 19.
Any algorithm approximating -VC-CAP with a factor better than in fully streaming requires space.
Moreover, by Theorem 18 and the fact that any feasible solution for -VCSS and VC-SNDP (in general) has size , the following corollaries hold.
Corollary 20.
Any algorithm approximating -VCSS with a factor better than , in insertion-only streams, requires space.
Corollary 21.
Any algorithm approximating VC-SNDP with maximum connectivity requirement with a factor better than , in insertion-only streams, requires space.
References
- [1] Kook Jin Ahn and Sudipto Guha. Graph sparsification in the semi-streaming model. In International Colloquium on Automata, Languages, and Programming, pages 328–338. Springer, 2009. doi:10.1007/978-3-642-02930-1_27.
- [2] Kook Jin Ahn, Sudipto Guha, and Andrew McGregor. Graph sketches: sparsification, spanners, and subgraphs. In Symposium on Principles of Database Systems (PODS), pages 5–14, 2012. doi:10.1145/2213556.2213560.
- [3] Ingo Althöfer, Gautam Das, David Dobkin, Deborah Joseph, and José Soares. On sparse spanners of weighted graphs. Discrete & Computational Geometry, 9(1):81–100, 1993. doi:10.1007/BF02189308.
- [4] Sepehr Assadi and Aditi Dudeja. A simple semi-streaming algorithm for global minimum cuts. In Symposium on Simplicity in Algorithms (SOSA), pages 172–180. SIAM, 2021. doi:10.1137/1.9781611976496.19.
- [5] Sepehr Assadi, Sanjeev Khanna, and Yang Li. On estimating maximum matching size in graph streams. In Proceedings of the Symposium on Discrete Algorithms (SODA), pages 1723–1742, 2017. doi:10.1137/1.9781611974782.113.
- [6] Sepehr Assadi, Sanjeev Khanna, Yang Li, and Grigory Yaroslavtsev. Maximum matchings in dynamic graph streams and the simultaneous communication model. In Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms (SODA), pages 1345–1364, 2016. doi:10.1137/1.9781611974331.CH93.
- [7] Sepehr Assadi and Vihan Shah. Tight bounds for vertex connectivity in dynamic streams. In Symposium on Simplicity in Algorithms (SOSA), pages 213–227. SIAM, 2023. doi:10.1137/1.9781611977585.CH20.
- [8] Surender Baswana. Streaming algorithm for graph spanners–single pass and constant processing time per edge. Inf. Process. Lett., 106(3):110–114, 2008. doi:10.1016/J.IPL.2007.11.001.
- [9] Greg Bodwin, Michael Dinitz, Merav Parter, and Virginia Vassilevska Williams. Optimal vertex fault tolerant spanners (for fixed stretch). In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1884–1900. SIAM, 2018. doi:10.1137/1.9781611975031.123.
- [10] Greg Bodwin, Michael Dinitz, and Caleb Robelle. Optimal vertex fault-tolerant spanners in polynomial time. In Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 2924–2938. SIAM, 2021. doi:10.1137/1.9781611976465.174.
- [11] Greg Bodwin, Michael Dinitz, and Caleb Robelle. Partially optimal edge fault-tolerant spanners. In Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 3272–3286. SIAM, 2022. doi:10.1137/1.9781611977073.129.
- [12] Greg Bodwin and Shyamal Patel. A trivial yet optimal solution to vertex fault tolerant spanners. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (PODS), pages 541–543, 2019. doi:10.1145/3293611.3331588.
- [13] Jarosław Byrka, Fabrizio Grandoni, and Afrouz Jabal Ameli. Breaching the 2-approximation barrier for connectivity augmentation: a reduction to steiner tree. In Symposium on Theory of Computing (STOC), pages 815–825, 2020. doi:10.1145/3357713.3384301.
- [14] Jarosław Byrka, Fabrizio Grandoni, Thomas Rothvoß, and Laura Sanità. Steiner tree approximation via iterative randomized rounding. Journal of the ACM (JACM), 60(1):1–33, 2013. doi:10.1145/2432622.2432628.
- [15] Federica Cecchetto, Vera Traub, and Rico Zenklusen. Bridging the gap between tree and connectivity augmentation: unified and stronger approaches. In Symposium on Theory of Computing (STOC), pages 370–383, 2021. doi:10.1145/3406325.3451086.
- [16] Tanmoy Chakraborty, Julia Chuzhoy, and Sanjeev Khanna. Network design for vertex connectivity. In Proceedings of the fortieth annual ACM symposium on Theory of computing, pages 167–176, 2008. doi:10.1145/1374376.1374403.
- [17] Chandra Chekuri, Rhea Jain, Sepideh Mahabadi, and Ali Vakilian. Streaming algorithms for network design, 2025. doi:10.48550/arXiv.2503.00712.
- [18] Joseph Cheriyan, Tibor Jordán, and Ramamoorthi Ravi. On 2-coverings and 2-packings of laminar families. In 7th Annual European Symposium (ESA), pages 510–520. Springer, 1999.
- [19] Joseph Cheriyan, Ming-Yang Kao, and Ramakrishna Thurimella. Scan-first search and sparse certificates: an improved parallel algorithm for -vertex connectivity. SIAM Journal on Computing, 22(1):157–174, 1993. doi:10.1137/0222013.
- [20] Joseph Cheriyan and László A Végh. Approximating minimum-cost k-node connected subgraphs via independence-free graphs. SIAM Journal on Computing, 43(4):1342–1362, 2014. doi:10.1137/120902847.
- [21] Joseph Cheriyan, Santosh Vempala, and Adrian Vetta. Network design via iterative rounding of setpair relaxations. Combinatorica, 26(3):255–275, 2006. doi:10.1007/S00493-006-0016-Z.
- [22] Julia Chuzhoy and Sanjeev Khanna. An -approximation algorithm for vertex-connectivity survivable network design. In 2009 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 437–441, 2009. doi:10.1109/FOCS.2009.38.
- [23] Michael S. Crouch, Andrew McGregor, and Daniel M. Stubbs. Dynamic graphs in the sliding-window model. In Algorithms - ESA 2013 - 21st Annual European Symposium, volume 8125 of Lecture Notes in Computer Science, pages 337–348. Springer, 2013. doi:10.1007/978-3-642-40450-4_29.
- [24] Artur Czumaj, Shaofeng H-C Jiang, Robert Krauthgamer, and Pavel Veselỳ. Streaming algorithms for geometric steiner forest. In 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022), 2022.
- [25] Giuseppe Di Battista and Roberto Tamassia. Incremental planarity testing. In 30th Annual Symposium on Foundations of Computer Science (FOCS), pages 436–441, 1989.
- [26] Giuseppe Di Battista and Roberto Tamassia. On-line maintenance of triconnected components with spqr-trees. Algorithmica, 15(4):302–318, 1996. doi:10.1007/BF01961541.
- [27] Giuseppe Di Battista and Roberto Tamassia. On-line planarity testing. SIAM Journal on Computing, 25(5):956–997, 1996. doi:10.1137/S0097539794280736.
- [28] E A Dinits, Alexander V Karzanov, and Micael V Lomonosov. On the structure of a family of minimal weighted cuts in a graph. Studies in Discrete Optimization, pages 290–306, 1973.
- [29] Michael Dinitz and Caleb Robelle. Efficient and simple algorithms for fault-tolerant spanners. In Proceedings of the 39th Symposium on Principles of Distributed Computing, pages 493–500, 2020. doi:10.1145/3382734.3405735.
- [30] Michael Elkin. Streaming and fully dynamic centralized algorithms for constructing and maintaining sparse spanners. ACM Trans. Algorithms, 7(2):20:1–20:17, 2011. doi:10.1145/1921659.1921666.
- [31] Joan Feigenbaum, Sampath Kannan, Andrew McGregor, Siddharth Suri, and Jian Zhang. On graph problems in a semi-streaming model. Theoretical Computer Science, 348(2-3):207–216, 2005. doi:10.1016/J.TCS.2005.09.013.
- [32] Joan Feigenbaum, Sampath Kannan, Andrew McGregor, Siddharth Suri, and Jian Zhang. Graph distances in the data-stream model. Journal on Computing, 38(5):1709–1727, 2008. doi:10.1137/070683155.
- [33] Manuel Fernández V, David P Woodruff, and Taisuke Yasuda. Graph spanners in the message-passing model. In Innovations in Theoretical Computer Science Conference, 2020.
- [34] Arnold Filtser, Michael Kapralov, and Navid Nouri. Graph spanners by sketching in dynamic streams and the simultaneous communication model. In Proceedings of the Symposium on Discrete Algorithms (SODA), pages 1894–1913, 2021. doi:10.1137/1.9781611976465.113.
- [35] Lisa Fleischer, Kamal Jain, and David P Williamson. Iterative rounding 2-approximation algorithms for minimum-cost vertex connectivity problems. Journal of Computer and System Sciences, 72(5):838–867, 2006. doi:10.1016/J.JCSS.2005.05.006.
- [36] Takuro Fukunaga, Zeev Nutov, and R Ravi. Iterative rounding approximation algorithms for degree-bounded node-connectivity network design. SIAM Journal on Computing, 44(5):1202–1229, 2015. doi:10.1137/13094503X.
- [37] Mohit Garg, Fabrizio Grandoni, and Afrouz Jabal Ameli. Improved approximation for two-edge-connectivity. In Symposium on Discrete Algorithms (SODA), pages 2368–2410, 2023. doi:10.1137/1.9781611977554.CH92.
- [38] Ashish Goel, Michael Kapralov, and Sanjeev Khanna. On the communication and streaming complexity of maximum bipartite matching. In Symposium on Discrete Algorithms (SODA), pages 468–485, 2012. doi:10.1137/1.9781611973099.41.
- [39] Michel X. Goemans, Andrew V. Goldberg, Serge A. Plotkin, David B. Shmoys, Éva Tardos, and David P. Williamson. Improved approximation algorithms for network design problems. In Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 223–232. ACM/SIAM, 1994. URL: http://dl.acm.org/citation.cfm?id=314464.314497.
- [40] Sudipto Guha, Andrew McGregor, and David Tench. Vertex and hyperedge connectivity in dynamic graph streams. In Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, pages 241–247, 2015. doi:10.1145/2745754.2745763.
- [41] Venkatesan Guruswami and Krzysztof Onak. Superlinear lower bounds for multipass graph processing. Algorithmica, 76:654–683, 2016. doi:10.1007/S00453-016-0138-7.
- [42] Carsten Gutwenger and Petra Mutzel. A linear time implementation of spqr-trees. In International Symposium on Graph Drawing, pages 77–90. Springer, 2000. doi:10.1007/3-540-44541-2_8.
- [43] J. E. Hopcroft and R. E. Tarjan. Dividing a graph into triconnected components. SIAM Journal on Computing, 2(3):135–158, 1973. doi:10.1137/0202012.
- [44] Kamal Jain. A factor 2 approximation algorithm for the generalized steiner network problem. Combinatorica, 21:39–60, 2001. doi:10.1007/S004930170004.
- [45] Ce Jin, Michael Kapralov, Sepideh Mahabadi, and Ali Vakilian. Streaming algorithms for connectivity augmentation. In 51st International Colloquium on Automata, Languages, and Programming (ICALP), volume 297 of LIPIcs, pages 93:1–93:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ICALP.2024.93.
- [46] Michael Kapralov. Space lower bounds for approximating maximum matching in the edge arrival model. In Dániel Marx, editor, Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1874–1893, 2021. doi:10.1137/1.9781611976465.112.
- [47] Michael Kapralov, Sanjeev Khanna, and Madhu Sudan. Streaming lower bounds for approximating max-cut. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1263–1282. SIAM, 2014.
- [48] Michael Kapralov, Yin Tat Lee, Cameron Musco, Christopher Musco, and Aaron Sidford. Single pass spectral sparsification in dynamic streams. SIAM J. Comput., 46(1):456–477, 2017. doi:10.1137/141002281.
- [49] Michael Kapralov, Aida Mousavifar, Cameron Musco, Christopher Musco, Navid Nouri, Aaron Sidford, and Jakab Tardos. Fast and space efficient spectral sparsification in dynamic streams. In Proceedings of the Symposium on Discrete Algorithms (SODA), pages 1814–1833, 2020. doi:10.1137/1.9781611975994.111.
- [50] Michael Kapralov and David Woodruff. Spanners and sparsifiers in dynamic streams. In Proceedings of the Symposium on Principles of Distributed Computing, pages 272–281, 2014. doi:10.1145/2611462.2611497.
- [51] Jonathan A Kelner and Alex Levin. Spectral sparsification in the semi-streaming setting. Theory of Computing Systems, 53(2):243–262, 2013. doi:10.1007/S00224-012-9396-1.
- [52] Samir Khuller and Ramakrishna Thurimella. Approximation algorithms for graph augmentation. Journal of Algorithms, 14(2):214–225, 1993. doi:10.1006/JAGM.1993.1010.
- [53] Samir Khuller and Uzi Vishkin. Biconnectivity approximations and graph carvings. J. ACM, 41(2):214–235, 1994. doi:10.1145/174652.174654.
- [54] Bundit Laekhanukit. An improved approximation algorithm for the minimum cost subset k-connected subgraph problem. Algorithmica, 72(3):714–733, 2015. doi:10.1007/S00453-014-9869-5.
- [55] Christos Levcopoulos, Giri Narasimhan, and Michiel Smid. Efficient algorithms for constructing fault-tolerant geometric spanners. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 186–195, 1998. doi:10.1145/276698.276734.
- [56] Andrew McGregor. Finding graph matchings in data streams. In International Workshop on Approximation Algorithms for Combinatorial Optimization, pages 170–181. Springer, 2005. doi:10.1007/11538462_15.
- [57] Andrew McGregor. Graph stream algorithms: a survey. ACM SIGMOD Record, 43(1):9–20, 2014. doi:10.1145/2627692.2627694.
- [58] Peter Bro Miltersen, Noam Nisan, Shmuel Safra, and Avi Wigderson. On data structures and asymmetric communication complexity. J. Comput. Syst. Sci., 57(1):37–49, 1998. doi:10.1006/JCSS.1998.1577.
- [59] Hiroshi Nagamochi and Toshihide Ibaraki. Linear time algorithms for finding -edge connected and -node connected spanning subgraphs. Algorithmica, 7(1992):583–596, 1992.
- [60] Jelani Nelson and Huacheng Yu. Optimal lower bounds for distributed and streaming spanning forest computation. In Proceedings of the Symposium on Discrete Algorithms (SODA), pages 1844–1860, 2019. doi:10.1137/1.9781611975482.111.
- [61] Z. Nutov. Approximating minimum-cost connectivity problems via uncrossable bifamilies. ACM Transactions on Algorithms (TALG), 9(1):1, 2012.
- [62] Zeev Nutov. Approximating minimum-cost edge-covers of crossing biset-families. Combinatorica, 34(1):95–114, 2014. doi:10.1007/S00493-014-2773-4.
- [63] Zeev Nutov. Erratum: Approximating minimum-cost connectivity problems via uncrossable bifamilies. ACM Transactions on Algorithms (TALG), 14(3):1–8, 2018. doi:10.1145/3186991.
- [64] Zeev Nutov. Improved approximation algorithms for minimum cost node-connectivity augmentation problems. Theory of Computing Systems, 62:510–532, 2018. doi:10.1007/S00224-017-9786-5.
- [65] Zeev Nutov. A approximation for -connected subgraphs. Journal of Computer and System Sciences, 123:64–75, 2022.
- [66] Xiaoming Sun and David P Woodruff. Tight bounds for graph problems in insertion streams. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2015). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2015.
- [67] Vera Traub and Rico Zenklusen. A better-than-2 approximation for weighted tree augmentation. In Foundations of Computer Science (FOCS), pages 1–12, 2022.
- [68] Vera Traub and Rico Zenklusen. Local search for weighted tree augmentation and steiner tree. In Symposium on Discrete Algorithms (SODA), pages 3253–3272, 2022. doi:10.1137/1.9781611977073.128.
- [69] Vera Traub and Rico Zenklusen. A (1.5+ )-approximation algorithm for weighted connectivity augmentation. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, pages 1820–1833, 2023. doi:10.1145/3564246.3585122.
- [70] David P. Williamson, Michel X. Goemans, Milena Mihail, and Vijay V. Vazirani. A primal-dual approximation algorithm for generalized steiner network problems. In Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, STOC ’93, pages 708–717, New York, NY, USA, 1993. Association for Computing Machinery. doi:10.1145/167088.167268.
- [71] Mariano Zelke. -connectivity in the semi-streaming model. arXiv preprint cs/0608066, 2006.
- [72] Mariano Zelke. Intractability of min-and max-cut in streaming graphs. Information Processing Letters, 111(3):145–150, 2011. doi:10.1016/J.IPL.2010.10.017.
