Skip to main content

Programming in Networks and Graphs

On the Combinatorial Background and Near-Equivalence of Network Flow and Matching Algorithms

  • Book
  • © 1988

Overview

Part of the book series: Lecture Notes in Economics and Mathematical Systems (LNE, volume 300)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (15 chapters)

  1. Preliminaries

  2. The Class of General Matching Problems

  3. Network Flow Algorithms Revisited

  4. Bipartite Matching Problems

  5. The 1-Matching Problem

  6. The b-Matching Problem

Keywords

About this book

Network flow and matching are often treated separately in the literature and for each class a variety of different algorithms has been developed. These algorithms are usually classified as primal, dual, primal-dual etc. The question the author addresses in this work is that of the existence of a common combinatorial principle which might be inherent in all those apparently different approaches. It is shown that all common network flow and matching algorithms implicitly follow the so-called shortest augmenting path. This can be interpreted as a greedy-like decision rule where the optimal solution is built up through a sequence of local optimal solutions. The efficiency of this approach is realized by combining this myopic decision rule with an anticipant organization. The approach of this work is organized as follows. For several standard flow and matching problems the common solution procedures are first reviewed. It is then shown that they all reduce to a common basic principle, that is, they all perform the same computational steps if certain conditions are set properly and ties are broken according to a common rule. Recognizing this near-equivalence of all commonly used algorithms the question of the best method has to be modified - all methods are (only) different implementations of the same algorithm obtained by different views of the problem.

Authors and Affiliations

  • Universität Bayreuth, Bayreuth, Germany

    Ulrich Derigs

Bibliographic Information

Publish with us