This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
The Karmarkar–Karp (KK) bin packing algorithms are several related approximation algorithm for the bin packing problem. The bin packing problem is a problem of packing items of different sizes into bins of identical capacity, such that the total number of bins is as small as possible. Finding the optimal solution is computationally hard. Karmarkar and Karp devised an algorithm that runs in polynomial time and finds a solution with at most bins, where OPT is the number of bins in the optimal solution. They also devised several other algorithms with slightly different approximation guarantees and run-time bounds.
The KK algorithms were considered a breakthrough in the study of bin packing: the previously-known algorithms found multiplicative approximation, where the number of bins was at most for some constants , or at most . The KK algorithms were the first ones to attain an additive approximation.
Input
The input to a bin-packing problem is a set of items of different sizes, a1,...an. The following notation is used:
- n - the number of items.
- m - the number of different item sizes. For each i in 1,...,m:
- si is the i-th size;
- ni is the number of items of size si.
- B - the bin size.
Given an instance I, we denote:
- OPT(I) = the optimal solution of instance I.
- FOPT(I) = (a1+...+an)/B = the theoretically-optimal number of bins, when all bins are completely filled with items or item fractions.
Obviously, FOPT(I) ≤ OPT(I).
High-level scheme
The KK algorithms essentially solve the configuration linear program:
.
Here, A is a matrix with m rows. Each column of A represents a feasible configuration - a multiset of item-sizes, such that the sum of all these sizes is at most B. The set of configurations is C. x is a vector of size C. Each element xc of x represents the number of times configuration c is used.
- Example: suppose the item sizes are 3,3,3,3,3,4,4,4,4,4, and B=12. Then there are C=10 possible configurations: 3333; 333; 33, 334; 3, 34, 344; 4, 44, 444. The matrix A has two rows: for s=3 and for s=4. The vector n is since there are 5 items of each size. A possible optimal solution is x=, corresponding to using three bins with configurations 3333, 344, 444.
There are two main difficulties in solving this problem. First, it is an integer linear program, which is computationally hard to solve. Second, the number of variables is C - the number of configurations, which may be enormous. The KK algorithms cope with these difficulties using several techniques, some of which were already introduced by de-la-Vega and Lueker. Here is a high-level description of the algorithm (where is the original instance):
- 1-a. Let be an instance constructed from by removing small items.
- 2-a. Let be an instance constructed from by grouping items and rounding the size of items in each group to the highest item in the group.
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 4. Compute a (fractional) solution x for the relaxed linear program.
- 3-b. Round x to an integral solution for .
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 2-b. "Un-group" the items to get a solution for .
- 2-a. Let be an instance constructed from by grouping items and rounding the size of items in each group to the highest item in the group.
- 1-b. Add the small items to get a solution for .
Below, we describe each of these steps in turn.
Step 1. Removing and adding small items
The motivation for removing small items is that, when all items are large, the number of items in each bin must be small, so the number of possible configurations is (relatively) small. We pick some constant , and remove from the original instance all items smaller than . Let be the resulting instance. Note that in , each bin can contain at most items. We pack and get a packing with some bins.
Now, we add the small items into the existing bins in an arbitrary order, as long as there is room. When there is no more room in the existing bins, we open a new bin (as in next-fit bin packing). Let be the number of bins in the final packing. Then:
.
Proof. If no new bins are opened, then the number of bins remains . If a new bin is opened, then all bins except maybe the last one contain a total size of at least , so the total instance size is at least . Therefore, , so the optimal solution needs at least bins. So . In particular, by taking g=1/n, we get:
,
since . Therefore, it is common to assume that all items are larger than 1/n.
Step 2. Grouping and un-grouping items
The motivation for grouping items is to reduce the number of different item sizes, to reduce the number of constraints in the configuration LP. The general grouping process is:
- Order the items by descending size.
- Partition the items into groups.
- For each group, modify the size of all items in the group to the largest size in the group.
There are several different grouping methods.
Linear grouping
Let be an integer parameter. Put the largest items in group 1; the next-largest items in group 2; and so on (the last group might have fewer than items). Let be the original instance. Let be the first group (the group of the largest items), and the grouped instance without the first group. Then:
- In all items have the same size. In the number of different sizes is .
- - since group 1 in dominates group 2 in (all k items in group 1 are larger than the k items in group 2); similarly, group 2 in dominates group 3 in , etc.
- - since it is possible to pack each item in into a single bin.
Therefore, . Indeed, given a solution to with bins, we can get a solution to with at most bins.
Geometric grouping
Let be an integer parameter. Geometric grouping proceeds in two steps:
- Partition the instance into several instances such that, in each instance , all sizes are in the interval . Note that, if all items in have size at least , then the number of instances is at most .
- On each instance , perform linear rounding with parameter . Let be the resulting instances. Let and .
Then, the number of different sizes is bounded as follows:
- For all r, and . Since all items in are larger than , we have , so . Summing over all r gives .
The number of bins is bounded as follows:
- For all r, - since has items, and all of them are smaller than , so they can be packed into at most bins.
- Therefore, .
- Therefore, .
Alternative geometric grouping
Let be an integer parameter. Order the items by descending size. Partition them into groups such that the total size in each group is at least . Since the size of each item is less than B, The number of items in each group is at least . The number of items in each group is weakly-increasing. If all items are larger than , then the number of items in each group is at most . In each group, only the larger items are rounded up. This can be done such that:
- .
- .
Step 3. Constructing the LP and rounding the solution
We consider the configuration linear program without the integrality constraints:
.
Here, we are allowed to use a fractional number of each configuration.
- Example: suppose there are 31 items of size 3 and 7 items of size 4, and the bin-size is 10. The configurations are: 4, 44, 34, 334, 3, 33, 333. The constraints are *x=31 and *x=7. An optimal solution to the fractional LP is That is: there are 7 bins of configuration 334 and 17/3 bins of configuration 333. Note that only two different configurations are needed.
Denote the optimal solution of the linear program by LOPT. The following relations are obvious:
- FOPT(I) ≤ LOPT(I), since FOPT(I) is the (possibly fractional) number of bins when all bins are completely filled with items or fractions of items. Clearly, no solution can be more efficient.
- LOPT(I) ≤ OPT(I), since LOPT(I) is a solution to a minimization problem with fewer constraints.
- OPT(I) < 2*FOPT(I), since in any packing with at least 2*FOPT(I) bins, the sum of the two least-full bins is at most B, so they can be combined into a single bin.
A solution to the fractional LP can be rounded to an integral solution as follows.
Suppose we have a solution x to the fractional LP. We round x into a solution for the integral ILP as follows.
- Let x be an optimal basic feasible solution of the fractional LP. Suppose it as bins (note that may be a fractional number). Since the fractional LP has m constraints (one for each distinct size), x has at most m nonzero variables, that is, at most m different configurations are used. We construct from x an integral packing consisting of a principal part and a residual part.
- The principal part contains floor(xc) bins of each configuration c for which xc > 0.
- For the residual part (denoted by R), we construct two candidate packings:
- A single bin of each configuration c for which xc > 0; all in all m bins are needed.
- A greedy packing, with fewer than 2*FOPT(R) bins (since if there are at least 2*FOPT(R) bins, the two smallest ones can be combined).
- The smallest of these packings requires min(m, 2*FOPT(R)) ≤ average(m, 2*FOPT(R)) = FOPT(R) + m/2.
- Adding to this the rounded-down bins of the principal part yields at most bins.
- The execution time of this conversion algorithm is O(n log n).
This also implies that .
Step 4. Solving the fractional LP
The main challenge in solving the fractional LP is that it may have a huge number of variables - a variable for each possible configuration.
The dual LP
The dual linear program of the fractional LP is:
.
It has m variables , and C constraints - a constraint for each configuration. It has the following economic interpretation. For each size s, we should determine a nonnegative price . Our profit is the total price of all items. We want to maximize the profit n y subject to the constraints that the total price of items in each configuration is at most 1. This LP now has only m variables, but a huge number of constraints. Even listing all the constraints is infeasible.
Fortunately, it is possible to solve the problem up to any given precision without listing all the constraints, by using a variant of the ellipsoid method. This variant gets as input, a separation oracle: a function that, given a vector y ≥ 0, returns one of the following two options:
- Assert that y is feasible, that is, ; or -
- Assert that y is infeasible, and return a specific constraint that is violated, that is, a vector a such that .
The ellipsoid method starts with a large ellipsoid, that contains the entire feasible domain . At each step t, it takes the center of the current ellipsoid, and sends it to the separation oracle:
- If the oracle says that is feasible, then we do an "optimality cut": we cut from the ellipsoid all points y for which . These points are definitely not optimal.
- If the oracle says that is infeasible and violates the constraint a, then we do a "feasibility cut": we cut from the ellipsoid all points y for which . These points are definitely not feasible.
After making a cut, we construct a new, smaller ellipsoid. It can be shown that this process converges to an approximate solution, in time polynomial in the required accuracy.
A separation oracle for the dual LP
We are given some m non-negative numbers . We have to decide between the following two options:
- For every feasible configuration, the sum of corresponding to this configuration is at most 1; this means that y is feasible.
- There exists a feasible configuration for which the sum of is larger than 1; this means that y is infeasible. In this case, we also have to return the configuration.
This problem can be solved by solving a knapsack problem, where the item values are , the item weights are , and the weight capacity is B (the bin size).
- If the total value of the optimal knapsack solution is at most 1, then we say that y is feasible.
- If the total value of the optimal knapsack solution is larger than 1, then we say that y is infeasible, and the items in the optimal knapsack solution correspond to a configuration that violates a constraint (since for the vector a that corresponds to this configuration).
The knapsack problem can be solved by dynamic programming in pseudo-polynomial time: , where m is the number of inputs and V is the number of different possible values. To get a polynomial-time algorithm, we can solve the knapsack problem approximately, using input rounding. Suppose we want a solution with tolerance . We can round each of down to the nearest multiple of /n. Then, the number of possible values between 0 and 1 is n/, and the run-time is . The solution is at least the optimal solution minus /n.
Ellipsoid method with an approximate separation oracle
The ellipsoid method should be adapted to use an approximate separation oracle. Given the current ellipsoid center :
- If the approximate oracle returns a solution with value larger than 1, then is definitely infeasible, and the solution correspond to a configuration that violates a constraint a. We do a "feasibility cut" in , cutting the ellipsoid all points y for which .
- If the approximate oracle returns a solution with value at most 1, then may or may not be feasible, but rounded down (denote it by ) is feasible. By definition of the rounding, we know that . We still do an "optimality cut" in : we cut from the ellipsoid all points y for which . Note that might be infeasible, so its value might be larger than OPT. Therefore, we might remove some points whose objective is optimal. However, the removed points satisfy ; no point is removed if its value exceeds the value at by more than .
Using the approximate separation oracle gives a feasible solution y* to the dual LP, with , after at most iterations, where . The total run-time of the ellipsoid method with the approximate separation oracle is .
Eliminating constraints
During the ellipsoid method, we use at most Q constraints of the form . All the other constraints can be eliminated, since they have no effect on the outcome y* of the ellipsoid method. We can eliminate even more constraints. It is known that, in any LP with m variables, there is a set of m constraints that is sufficient for determining the optimal solution (that is, the optimal value is the same even if only these m constraints are used). We can repeatedly run the ellipsoid method as above, each time trying to remove a specific set of constraints. If the resulting error is at most , then we remove these constraints permanently. It can be shown that we need at most eliminations, so the accumulating error is at most . If we try sets of constraints deterministically, then in the worst case, one out of m trials succeeds, so we need to run the ellipsoid method at most times. If we choose the constraints to remove at random, then the expected number of iterations is .
Finally, we have a reduced dual LP, with only m variables and m constraints. The optimal value of the reduced LP is at least , where .
Solving the primal LP
By the LP duality theorem, the minimum value of the primal LP equals the maximum value of the dual LP, which we denoted by LOPT. Once we have a reduced dual LP, we take its dual, and take a reduced primal LP. This LP has only m variables - corresponding to only m out of C configurations. The maximum value of the reduced dual LP is at least . It can be shown that the optimal solution of the reduced primal LP is at most . The solution gives a near-optimal bin packing, using at most m configurations.
The total run-time of the deterministic algorithm, when all items are larger than , is:
,
The expected total run-time of the randomized algorithm is: .
End-to-end algorithms
Karmarkar and Karp presented three algorithms, that use the above techniques with different parameters. The run-time of all these algorithms depends on a function , which is a polynomial function describing the time it takes to solve the fractional LP with tolerance h=1, which is, for the deterministic version,.
Algorithm 1
Let be a constant representing the desired approximation accuracy.
- 1-a. Set . Let be an instance constructed from by removing all items smaller than g.
- 2-a. Set . Let be an instance constructed from by linear grouping with parameter k, and let be the remaining instance (the group of k largest items). Note that .
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 4. Compute a solution x for , with tolerance h=1. The result is a fractional bin packing with bins. The run-time is .
- 3-b. Round x to an integral solution for . Add at most bins for the fractional part. The total number of bins is .
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 2-b. Pack the items in using at most k bins; get a packing of . The number of bins is .
- 2-a. Set . Let be an instance constructed from by linear grouping with parameter k, and let be the remaining instance (the group of k largest items). Note that .
- 1-b. Add the items smaller than g to get a solution for . The number of bins is: .
All in all, the number of bins is in and the run-time is in . By choosing we get .
Algorithm 2
Let be a real parameter and an integer parameter to be determined later.
- 1-a. Let be an instance constructed from by removing all items smaller than g.
- 2. While do:
- 2-a. Do the Alternative Geometric Grouping with parameter k. Let be the resulting instance, and let be the remaining instance. We have .
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 4. Compute a solution x for , with tolerance h=1. The result is a fractional bin packing with bins. The run-time is .
- 3-b. Round x to an integral solution for . Do not add bins for the fractional part. Instead, just remove the packed items from .
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 2-b. Pack the items in in at most bins.
- 2-a. Do the Alternative Geometric Grouping with parameter k. Let be the resulting instance, and let be the remaining instance. We have .
- 2. Once , pack the remaining items greedily into at most bins.
- At each iteration of the loop in step 2, the fractional part of x has at most m(K) patterns, so . The FOPT drops by a factor of k in each iteration, so the number of iterations is at most .
- Therefore, the total number of bins used for is: .
- 1-b. Add the items smaller than g to get a solution for . The number of bins is: .
The run-time is in .
Now, if we choose k=2 and g=1/FOPT(I), we get:
,
and hence:
,
so the total number of bins is in . The run-time is .
The same algorithm can be used with different parameters to trade-off run-time with accuracy. For some parameter , choose and . Then, the packing needs at most bins, and the run-time is in .
Algorithm 3
The third algorithm is useful when the number of sizes m is small (see also high-multiplicity bin packing).
- 1-a. Set . Let be an instance constructed from by removing all items smaller than g.
- If then:
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- 4. Compute a solution x for , with tolerance h=1. The result is a fractional bin packing with bins. The run-time is .
- 3-b. Round x to an integral solution for . Do not add bins for the fractional part. Instead, just remove the packed items from .
- 3-a. Construct the configuration linear program for , without the integrality constraints.
- Run step 2 of Algorithm 2 on the remaining pieces.
- 1-b. Add the items smaller than g to get a solution for . The number of bins is: .
It uses at most bins, and the run-time is in .
Improvements
The KK techniques were improved later, to provide even better approximations.
Rothvoss uses the same scheme as Algorithm 2, but with a different rounding procedure in Step 2. He introduced a "gluing" step, in which small items are glued together to yield a single larger item. This gluing can be used to increase the smallest item size to about . When all sizes are at least , we can substitute in the guarantee of Algorithm 2, and get:
,
which yields a bins.
Hoberg and Rothvoss use a similar scheme in which the items are first packed into "containers", and then the containers are packed into bins. Their algorithm needs at most bins.
References
- Karmarkar, Narendra; Karp, Richard M. (November 1982). "An efficient approximation scheme for the one-dimensional bin-packing problem". 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982): 312–320. doi:10.1109/SFCS.1982.61. S2CID 18583908.
- ^ Fernandez de la Vega, W.; Lueker, G. S. (1981). "Bin packing can be solved within 1 + ε in linear time". Combinatorica. 1 (4): 349–355. doi:10.1007/BF02579456. ISSN 1439-6912. S2CID 10519631.
- Claire Mathieu. "Approximation Algorithms Part I, Week 3: bin packing". Coursera.
- ^ Rothvoß, T. (2013-10-01). "Approximating Bin Packing within O(log OPT · Log Log OPT) Bins". 2013 IEEE 54th Annual Symposium on Foundations of Computer Science. pp. 20–29. arXiv:1301.4010. doi:10.1109/FOCS.2013.11. ISBN 978-0-7695-5135-7. S2CID 15905063.
- Hoberg, Rebecca; Rothvoss, Thomas (2017-01-01), "A Logarithmic Additive Integrality Gap for Bin Packing", Proceedings of the 2017 Annual ACM-SIAM Symposium on Discrete Algorithms, Proceedings, Society for Industrial and Applied Mathematics, pp. 2616–2625, arXiv:1503.08796, doi:10.1137/1.9781611974782.172, ISBN 978-1-61197-478-2, S2CID 1647463