Abstract
Designing efficient dynamic graph algorithms against an adaptive adversary is a major goal in the field of dynamic graph algorithms and has witnessed many exciting recent developments in, e.g., dynamic matching (Wajc STOC'20) and decremental shortest paths (Chuzhoy and Khanna STOC'19). Compared to other graph primitives (e.g. spanning trees and matchings), designing such algorithms for graph spanners and (more broadly) graph sparsifiers poses a unique challenge since there is no fast deterministic algorithm known for static computation and the lack of a way to adjust the output slowly (known as “small recourse/replacements”). This paper presents the first non-trivial efficient adaptive algorithms for maintaining many sparsifiers against an adaptive adversary. Specifically, we present algorithms that maintain 1. a polylog(n)-spanner of size Õ(n) in polylog(n) amortized update time, 2. an O(k)-approximate cut sparsifier of size Õ(n) in Õ(n1/k) amortized update time, and 3. a polylog(n)-approximate spectral sparsifier in polylog(n) amortized update time. Our bounds are the first non-trivial ones even when only the recourse is concerned. Our results hold even against a stronger adversary, who can access the random bits previously used by the algorithms and the amortized update time of all algorithms can be made worst-case by paying sub-polynomial factors. Our spanner result resolves an open question by Ahmed et al. (2019) and our results and techniques imply additional improvements over existing results, including (i) answering open questions about decremental single-source shortest paths by Chuzhoy and Khanna (STOC'19) and Gutenberg and Wulff-Nilsen (SODA'20), implying a nearly-quadratic time algorithm for approximating minimum-cost unit-capacity flow and (ii) de-amortizing a result of Abraham et al. (FOCS'16) for dynamic spectral sparsifiers. Our results are based on two novel techniques. The first technique is a generic black-box reduction that allows us to assume that the graph is initially an expander with almost uniform-degree and, more importantly, stays as an almost uniform-degree expander while undergoing only edge deletions. The second technique is called proactive resampling: here we constantly re-sample parts of the input graph so that, independent of an adversary's computational power, a desired structure of the underlying graph can be always maintained. Despite its simplicity, the analysis of this sampling scheme is far from trivial, because the adversary can potentially create dependencies between the random choices used by the algorithm. We believe these two techniques could be useful for developing other adaptive algorithms.
Originalsprog | Engelsk |
---|---|
Titel | 49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 |
Redaktører | Mikolaj Bojanczyk, Emanuela Merelli, David P. Woodruff |
Forlag | Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing |
Publikationsdato | 2022 |
Artikelnummer | 20 |
ISBN (Elektronisk) | 9783959772358 |
DOI | |
Status | Udgivet - 2022 |
Begivenhed | 49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 - Paris, Frankrig Varighed: 4 jul. 2022 → 8 jul. 2022 |
Konference
Konference | 49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 |
---|---|
Land/Område | Frankrig |
By | Paris |
Periode | 04/07/2022 → 08/07/2022 |
Sponsor | CNRS, Inria, Nomadic Lab, Université Paris Cité |
Navn | Leibniz International Proceedings in Informatics, LIPIcs |
---|---|
Vol/bind | 229 |
ISSN | 1868-8969 |
Bibliografisk note
Funding Information:Keywords and phrases dynamic graph algorithm, adaptive adversary, spanner, sparsifier Digital Object Identifier 10.4230/LIPIcs.ICALP.2022.20 Category Track A: Algorithms, Complexity and Games Related Version Full Version: https://arxiv.org/abs/2004.08432 [24] Funding Aaron Bernstein: Funded by NSF Career grant 1942010. Jan van den Brand: Funded by ONR BRC grant N00014-18-1-2562 and by the Simons Institute for the Theory of Computing through a Simons-Berkeley Postdoctoral Fellowship. Research partially done at KTH. Maximilian Probst Gutenberg: Research partially done while at University of Copenhagen. Danupon Nanongkai: This project has received funding from the European Research Council (ERC) under the European Unions Horizon 2020 research and innovation programme under grant agreement No 715672. Also partially supported by the Swedish Research Council (Reg. No. 2015-04659 and 2019-05622). Thatchaphol Saranurak: Research partially done at KTH and supported by the Swedish Research Council (Reg. No. 2015-04659). Aaron Sidford: Supported in part by a Microsoft Research Faculty Fellowship, NSF CAREER Award CCF-1844855, NSF Grant CCF-1955039, a PayPal research award, and a Sloan Research Fellowship. He Sun: Funded by an EPSRC Early Career Fellowship (EP/T00729X/1).
Funding Information:
Aaron Bernstein: Funded by NSF Career grant 1942010. Jan van den Brand: Funded by ONR BRC grant N00014-18-1-2562 and by the Simons Institute for the Theory of Computing through a Simons-Berkeley Postdoctoral Fellowship. Research partially done at KTH. Maximilian Probst Gutenberg: Research partially done while at University of Copenhagen. Danupon Nanongkai: This project has received funding from the European Research Council (ERC) under the European Unions Horizon 2020 research and innovation programme under grant agreement No 715672. Also partially supported by the Swedish Research Council (Reg. No. 2015-04659 and 2019-05622). Thatchaphol Saranurak: Research partially done at KTH and supported by the Swedish Research Council (Reg. No. 2015-04659). Aaron Sidford: Supported in part by a Microsoft Research Faculty Fellowship, NSF CAREER Award CCF-1844855, NSF Grant CCF-1955039, a PayPal research award, and a Sloan Research Fellowship. He Sun: Funded by an EPSRC Early Career Fellowship (EP/T00729X/1).
Publisher Copyright:
© Aaron Bernstein, Jan van den Brand, Maximilian Probst Gutenberg, Danupon Nanongkai, Thatchaphol Saranurak, Aaron Sidford, and He Sun;