Preprint
Article

Greedoids and Violator Spaces

Altmetrics

Downloads

80

Views

48

Comments

0

A peer-reviewed article of this preprint also exists.

This version is not peer-reviewed

Submitted:

31 July 2024

Posted:

01 August 2024

You are already at the latest version

Alerts
Abstract
The primary objective of this paper is to establish connections between two well-known but previously independently developed theories: the theory of violator spaces and the theory of greedoids. Violator spaces were introduced by Matoušek et al. in 2008 as a generalization of linear programming problems. Greedoids were introduced by Korte and Lovász in 1981 in an effort to characterize combinatorial structures where greedy algorithms yield optimal solutions. In this work, we explore the relationships between violator spaces and greedoids, demonstrating that greedoids can be defined using a variant of a violator operator. These interrelations provide a new characterization of antimatroids.
Keywords: 
Subject: Computer Science and Mathematics  -   Mathematics

1. Preliminaries

The primary objective of the paper is to establish connections between two combinatorial concepts: violator spaces and greedoids. Violator spaces emerged as a generalization of Linear Programming (LP) problems. LP-type problems were introduced and studied by Matoušek, Sharir, and Welzl [11,13] as a combinatorial framework encompassing linear programming and other computational geometric problems. Further, Matoušek et al. [1] introduced violator spaces as a simpler framework, which generalizes LP-type problems. Every LP-type problem can naturally be converted into a violator space, but the reverse is not necessarily true. Greedoids were introduced as an attempt to characterize combinatorial structures where the greedy algorithm yields optimal solutions. This work explores the relationships between violator spaces and greedoids, demonstrating that greedoids can be defined using a variant of a violator operator. The interrelations between violator spaces and greedoids provide a new characterization of antimatroids.

2. Violator Spaces

Definition 1.
[1] An abstract LP-type problem is a quadruple ( E , w , W , ) , where E is a finite set, W is a set linearly ordered by ≤, and w is a mapping 2 E W such that for all subsets X , Y E the following properties are satisfied:
V1: X Y w ( X ) w ( Y ) (monotonicity);
V2: for all X Y and a E with w ( X ) = w ( Y ) and w ( Y ) < w ( Y a ) , we have w ( X ) < w ( X a ) (locality).
Definition 2.
[13] Consider an abstract LP-type problem ( E , w , W , ) . We say that B E is a basis if for all proper subsets F B we have w ( F ) w ( B ) . For X E , a basis of X is an inclusion-minimal subset B of X with w ( B ) = w ( X ) .
Solving an abstract LP-type problem ( E , w , W , ) means identifying a basis of E.
The set of all constraints violating X E , denoted as ν ( X ) , is defined as:
ν ( X ) = { a E : w ( X a ) > w ( X ) } .
This set includes all elements a in the ground set E that are not in X and, when added to X, cause the objective function w to increase.
One can see that the condition w ( X ) = w ( Y ) generally does not suffice for ν ( X ) = ν ( Y ) . For example [1], if w ( X ) = X for all X E , then any X of the same size have the same w ( X ) , however, ν ( X ) = E X , and so no distinct sets X share the value of ν ( X ) . Thus, we can see that w by itself does not capture the combinatorial structure of the problem. To describe the "structure" of an LP-type problem Matoušek et al. [1] introduced the concept of a violator space.
Definition 3.
[1] A violator space is a pair ( E , ν ) , where E is a finite set and ν is a violator operator, i.e., a mapping 2 E 2 E such that for all subsets X , Y E the following properties are satisfied:
V11: X ν ( X ) = (consistency);
V22: ( X Y and Y ν ( X ) = ) ν ( X ) = ν ( Y ) (locality).
Let ( E , ν ) be a violator space. Let φ ( X ) = E ν ( X ) . So, if ν is defined by (1) then
φ ( X ) = { a E : w ( X a ) = w ( X ) } .
Theorem 1.
[3] Let E be a finite set and ν , φ : 2 E 2 E two mappings such that φ ( X ) = E ν ( X ) for all X E . Then ( E , ν ) is a violator space if and only if φ satisfies
C1: X φ ( X ) (extensivity);
C2: ( X Y φ ( X ) ) φ ( X ) = φ ( Y ) (self-convexity).
Thus, we have two equivalent approaches to define violator spaces:
  • the classic one - ( E , ν ) , where the ground set E is equipped with the mapping ν satisfying consistency and locality;
  • the dual one - ( E , φ ) , where the ground set E is equipped with the mapping φ satisfying extensivity and self-convexity.
In what follows, a pair ( E , φ ) , where E is a finite set and φ is a mapping satisfied extensivity and self-convexity, will be considered a violator space as well.
Since a violator operator φ is extensive it may be interpreted as a some type of a "closure" operator. The concept of closure appears in many disciplines, including topology, algebra, logic, geometry, convexity analysis, graph theory etc. It is also known by other names, such as span, hull, and envelope. For instance, the convex hull operator on the Euclidean space is a classic example of a closure operator.
Definition 4.
Let E be a finite set. τ : 2 E 2 E is a closure operator on E if for all subsets X , Y E the following properties are satisfied:
CL1: X τ ( X ) (extensivity);
CL2: X Y τ ( X ) τ ( Y ) (isotonicity);
CL3: τ ( τ ( X ) ) = τ ( X ) (idempotence).
It was proved that every closure operator is a violator operator, since isotonicity and idempotence imply self-convexity, and extensivity with self-convexity imply idempotence [3]. However, not each violator operator is a closure operator, since it does not have to satisfy isotonicity.
Let us consider some additional properties of violator operators.
Lemma 1.
Let ( E , φ ) be a violator space. Then X φ ( Y ) φ ( Y ) = φ ( Y X ) for all X , Y E .
Proof. 
"If": Let φ ( Y ) = φ ( Y X ) . Since extensivity implies X Y X φ ( Y X ) , we conclude with X φ ( Y ) .
"Only if": If X φ ( Y ) , then Y Y X φ ( Y ) . Hence, by self-convexity, φ ( Y ) = φ ( Y X ) . □
Proposition 1.
Let E be a finite set. For each extensive operator φ : 2 E 2 E self-convexity is equivalent to the following property:
C22: ( X φ ( Y ) Y φ ( X ) ) φ ( X ) = φ ( Y ) for all X , Y E .
Proof. 
1. C2C22: From Lemma 1 ( X φ ( Y ) Y φ ( X ) ) φ ( Y ) = φ ( X Y ) = φ ( X ) . Hence, φ ( X ) = φ ( Y ) .
2. C22C2: ( X Y φ ( X ) ) X φ ( Y ) Y φ ( X ) (from extensivity). Then C22 implies φ ( X ) = φ ( Y ) . □
Lemma 2.([3]) Let ( E , φ ) be a violator space. Then
φ ( X ) = φ ( Y ) φ ( X Y ) = φ ( X ) = φ ( Y )
and
( X Y Z ) ( φ ( X ) = φ ( Z ) ) φ ( X ) = φ ( Y ) = φ ( Z )
for every X , Y , Z E .
Since the second property addresses all sets that lie between two given sets, we refer to this property as convexity, in accordance with Monjardet [8].

2.1. Uniquely generated violator spaces

Let ( E , α ) be an arbitrary space with the operator α : 2 E 2 E . B E is a generator of X E if α ( B ) = α ( X ) . A basis of X is a inclusion-minimal set B E (not necessarily included in X) with α ( B ) = α ( X ) . A space ( E , α ) is uniquely generated if every set X E has a unique basis.
Proposition 2.
[3] A violator space ( E , φ ) is uniquely generated if and only if for every X , Y E
φ ( X ) = φ ( Y ) φ ( X Y ) = φ ( X ) = φ ( Y ) .
It is known that a closure operator τ is uniquely generated if and only if it satisfies the anti-exchange property [7,10,12]:
p , q τ ( X ) p τ ( X q ) q τ ( X p ) .
We extended this characterization to violator spaces in the following.
Theorem 2.
[3] Let ( E , φ ) be a violator space. Then ( E , φ ) is uniquely generated if and only if the operator φ satisfies the anti-exchange property.
An element x of a subset X E is an extreme point of X if x α ( X x ) . The set of extreme points of X is denoted by e x ( X ) .
Proposition 3.
[3] For violator spaces: x e x ( X ) if and only if φ ( X ) φ ( X x ) .
Theorem 3.
[3] Let ( E , φ ) be a violator space. Then ( E , φ ) is uniquely generated if and only if for every set X E , φ ( X ) = φ ( e x ( X ) ) .
Corollary 1.
[3] Let ( E , φ ) be a uniquely generated violator space. Then for every X E the set e x ( X ) is the unique basis of X.

3. Greedoids

Let we have a greedoid ( E , F ) , i.e.,
(i) F ;
(ii) X , Y F , X > Y x X Y such that Y x F (augmentation property).
Elements of F are called feasible sets.
The rank function of a greedoid is defined as follows:
r ( X ) = m a x { | A | : A X , A F } .
Theorem 4.
[7] A function r : 2 E Z + is the rank function of a greedoid if and only if for all X , Y E and all x , y E the following conditions hold:
(1.1) r ( ) = 0
(1.2) r ( X ) | X | (subcardinality)
(1.3) X Y implies r ( X ) r ( Y ) (monotonicity)
(1.4) r ( X ) = r ( X x ) = r ( X y ) implies r ( X ) = r ( X x y ) (local submodularity).
Moreover, the greedoid is uniquely determined by its rank function:
F = { X : r ( X ) = | X | } .
So, the pair ( E , r ) may be considered as a greedoid with F defined by (6).

3.1. LP-tYpe Problems and Greedoids

The rank function r of a greedoid satisfies the all properties of the mapping w of LP-type problem. It is monotone (Theorem 4) and satisfies the locality.
Proposition 4.
Let ( E , F ) be a greedoid with rank function r. Then r ( X ) = r ( Y ) and r ( Y ) < r ( Y a ) implies r ( X ) < r ( X a ) for all X Y and a E .
Proof. 
If X Y and r ( X ) = r ( Y ) there is a maximal feasible set A X , with | A | = r ( X ) = r ( Y ) . In addition, there is a feasible set C ( Y a ) with | C | > | A | . Since A is a maximal feasible set in Y, C ¬ Y , a Y and a C . Then (from the augmentation property) there exists x C for which A x F . Since A is a maximal feasible set in Y, x Y , and so x = a , i.e., A a is a feasible set, and then r ( X ) < r ( X a ) . □
Thus a greedoid ( E , r ) may be considered as an abstract LP-type problem ( E , r , Z + , ) .
Note, that the family F is the family of all bases of the LP-type problem, since for each proper subset A of a feasible set
X F , r ( A ) A < X = r ( X ) .
However, if the bases of a LP-type problem ( E , w , Z + , ) form a greedoid, a function w does not have to be a greedoid’s rank function. For example, every monotone function w with different values on each element of 2 E turns all subsets of E to be bases. While the bases constitute a greedoid, a function w does not have to satisfied subcardinality.
Let us build a specific LP-type problem ( E , v , Z + , ) where E is a finite set, v is a mapping 2 E Z + such that for all subsets X , Y E the following properties are satisfied:
(1) v ( ) = 0 ;
(2) v ( X ) | X | (subcardinality);
(3) X Y implies v ( X ) v ( Y ) (monotonicity);
(4) For all X Y and a E with v ( X ) = v ( Y ) and v ( Y ) < v ( Y a ) ,we have v ( X ) < v ( X a ) (locality).
The property (4) may be reformulated as follows:
(5) For all X Y and a E with v ( X ) = v ( Y ) and v ( X ) = v ( X a ) , we have v ( Y ) = v ( Y a ) .
Proposition 5.
Let v be a monotone mapping on 2 E . Then locality (5) is equivalent to local submodularity (1.4).
Proof. 
1. Let v satisfy locality and v ( X ) = v ( X x ) = v ( X y ) . Denote Y = X x . Then X Y , v ( X ) = v ( Y ) and v ( X ) = v ( X y ) , then (from (5)) we have v ( X ) = v ( Y ) = v ( Y y ) = v ( X x y ) .
2. Let v satisfy local submodularity, X Y E , a E , v ( X ) = v ( Y ) and v ( X ) = v ( X a ) . By repeatedly applying local submodularity we prove that v ( Y ) = v ( Y a ) . It is easy to see that the proposition is correct for a Y . Let Y X = { y 1 , y 2 , . . . , y n } . From monotonicity it follows that v ( X ) = v ( X y 1 ) = v ( Y ) . Hence, v ( X ) = v ( X a ) = v ( X y 1 ) . Local submodularity implies v ( X ) = v ( X y 1 a ) . Denote Y k = X { y 1 , y 2 , . . . , y k } .
Prove by induction on n that v ( X ) = v ( Y k a ) for each 1 k n . From monotonicity it follows that v ( X ) = v ( Y k ) for each 1 k n . Then v ( X ) = v ( Y k a ) = v ( Y k y k + 1 ) implies v ( X ) = v ( Y k + 1 a ) . Thus v ( X ) = v ( Y ) = v ( Y n a ) = v ( Y a ) . □
In fact, the property of local submodularity may be extended as follows.
Corollary 2.
If X , Y E such that v ( X ) = v ( Y ) = v ( X Y ) , then v ( X Y ) = v ( X Y ) .
Theorem 4 implies that a LP-type problem with mapping v ( ) = 0 and v ( X ) X determines a greedoid ( E , v ) by F = { X : v ( X ) = X } .

3.2. Violator and Rank Closure Operators on Greedoids

Define (rank) closure operator of greedoids ([7]): σ ( X ) = { x : r ( X x ) = r ( X ) } . The operator is extensive ( C L 1 ) and idempotent ( C L 3 ), but it does not have to be an isotone operator. So σ is not always a closure operator. At the same time, the definition of σ coincides with the definition of a violator operator (2). The following theorem supports the interpretation of greedoids as a subclass of violator spaces since the properties (i) and (ii) define a violator operator.
Theorem 5.
[2] A mapping σ : 2 E 2 E is the closure operator of some greedoid ( E , F ) if and only if
(i) X σ ( X )
(ii) ( X Y σ ( X ) ) σ ( X ) = σ ( Y )
(iii) if z σ ( X x z ) for all z X x , and x σ ( X y ) then y σ ( X x ) .
Moreover, if σ satisfies (i), (ii), and (iii), then
F = { X E : x X : x σ ( X x ) } .
Based on the definition of extreme points we have
F = { X E : X = e x ( X ) } .
Then the following condition z σ ( X x z ) for all z X x is equivalent to X x F , and so the property (iii) may be rewritten as follows:
( X x F ) ( x σ ( X y ) ) y σ ( X x ) .
Define B = { X E : Y X : σ ( X ) σ ( Y ) } - the family of bases w.r.t. operator σ .
Proposition 6.
B = F for each violator operator σ.
Proof. 
If X B , i.e., for all Y X : σ ( X ) σ ( Y ) , then for all x X holds σ ( X ) σ ( X x ) , and so ( from Proposition 3) x σ ( X x ) . Then B F . If X B then there exists Y X such that σ ( X ) = σ ( Y ) . Hence for each x X Y self-convexity implies σ ( X ) = σ ( X x ) , i.e., x σ ( X x ) . This concludes the proof, with F B . □
It is worth mentioning that Property (iii) is not necessary for F to be a greedoid.
Example 1.
Let E = { 1 , 2 , 3 } . Define φ ( X ) = X for each X E except φ ( { 1 } ) = φ ( { 1 , 3 } ) = { 1 , 3 } . It is easy to check that the space ( E , φ ) is a uniquely generated violator space (satisfies both extensivity and convexity), where the family of bases F = P ( { 1 , 2 , 3 } ) { 1 , 3 } forms a greedoid. At the same time, operator φ does not satisfies (7) which is equivalent to (iii). Indeed, if X = , x = 3 , y = 1 , then X x = { 3 } F , x φ ( X y ) = φ ( { 1 } ) = { 1 , 3 } , but y φ ( X x ) = φ ( { 3 } ) .
If we consider the rank function of the greedoid , we can see that r ( { 1 } ) = r ( { 3 } ) = r ( { 1 , 3 } ) , and so σ ( { 1 } ) = σ ( { 3 } ) = { 1 , 3 } . Then for this function σ the property (iii) holds and we have a not uniquely generated violator space.
Thus the same family of bases may be obtained by different mappings.

3.3. Antimatroids - Uniquely Generated Greedoids

Definition 5.
An antimatroid is a greedoid closed under union.
Definition 6.
An accessible set system ( E , F ) is a set system in which every nonempty feasible set X F contains an element x such that X x is feasible.
By definition, the family of feasible sets of a greedoid is an accessible set system.
Lemma 3.
[7] For an accessible set system ( E , F ) the following statements are equivalent:
(A1) ( E , F ) is an antimatroid
(A2) F is closed under union
(A3) A , A x , A y F implies A { x , y } F .
Proposition 7.
An antimatroid is a uniquely generated greedoid.
Proof. 
Let F be an antimatroid. Since each antimatroid is a greedoid, it remains to prove that the greedoid is uniquely generated. Suppose there are two bases B 1 and B 2 such that σ ( B 1 ) = σ ( B 2 ) . Since F is a family of bases, then B 1 , B 2 F . Hence B 1 B 2 F , because F is an antimatroid. But σ ( B 1 B 2 ) = σ ( B 1 ) (see Lemma 2). Contradiction. □
Since for each greedoid σ is a violator operator, Theorem 2 implies the following.
Corollary 3.
The operator σ of each antimatroid satisfies the anti-exchange property.
Theorem 6.
The family F is an antimatroid if and only if F is a uniquely generated greedoid.
Proof. 
It remains to prove that each uniquely generated greedoid is an antimatroid. Suppose, A , A x , A y F , but A { x , y } F . Then x , y σ ( A ) , x σ ( A y ) and y σ ( A x ) . Contradiction to anti-exchange property. □

4. Conclusion

We have demonstrated that greedoids can be defined using a variant of the violator operator. The relationships between violator spaces and greedoids enabled us to provide a new characterization of antimatroids.
To gain further structural insights into antimatroids, one can explore cospanning relations. Given an operator σ , two sets X and Y are cospanning if σ ( X ) = σ ( Y ) . The equivalence relation known as cospanning has been studied for greedoids [7], and it has been shown that these relations uniquely determine greedoids. Similar equivalence relations have also been explored for violator spaces [3,4,9]. Investigating these structures could lead to new characterizations of antimatroids and other combinatorial structures.

References

  1. Gärtner, B., J. Matoušek, L. Rüst, and P. Škovroň, Violator spaces: structure and algorithms, Discrete Applied Mathmatics 156 (2008), 2124–2141.
  2. Goecke, O., Korte, B., and Lovász, L. Examples and algorithmic properties of greedoids(2006), 113–161, B. Simone (Ed.), Combinatorial Optimization, Springer-Verlag, New York/Berlin (1986).
  3. Kempner, Y., and Levit, V. E. Violator spaces vs closure spaces, European Journal of Combinatorics 80 (2019), 203–213. [CrossRef]
  4. Kempner, Y., and Levit, V.E. Cospanning characterizations of violator and co-violator spaces. In: Hoffman, F., Holliday, S., Rosen, Z., Shahrokhi, F., Wierman, J. (eds) Combinatorics, Graph Theory and Computing. SEICCGTC 2021. Springer Proceedings in Mathematics & Statistics, 448(2024), 109–117. Springer, Cham. https://doi.org/10.1007/978-3-031-52969-6_11.
  5. Kempner, Y., and Levit, V. E. Cospanning characterizations of antimatroids and convex geometries(2021), arXiv:2107.08556.
  6. Korte, B., Lovász, L. Mathematical structures underlying greedy algorithms. in:Fundamentals of Computation Theory, Lecture Notes in Computer Science 117, Springer (1981), 205–209. [CrossRef]
  7. Korte, B., Lovász, L. and R. Schrader, “Greedoids,” Springer-Verlag, New York/Berlin (1991).
  8. Monjardet, B. and Raderanirina, V. The duality between the anti-exchange closure operators and the path independent choice operators on a finite set, Mathematical Social Sciences 41 (2001), 131–150. [CrossRef]
  9. Y. Brise, B. Gärtner, Clarkson’s algorithm for violator spaces, Computational Geometry 44(2011), 70–81. [CrossRef]
  10. P. H. Edelman, R. E. Jamison, The theory of convex geometries, Geometriae Dedicata 19 (1985), 247–270. [CrossRef]
  11. J. Matoušek, M. Sharir, E. Welzl, A subexponential bound for linear programming. Algorithmica 16 (1996), 498–516. [CrossRef]
  12. J. Pfaltz, Closure Lattices, Discrete Mathematics 154 (1996), 217–236.
  13. M. Sharir, E. Welzl, A combinatorial bound for linear programming and related problems, Lecture Notes in Computer Science 577 (1992), 569–579. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated