07NetworkFlowI 2x2
07NetworkFlowI 2x2
N ETWORK F LOW I
7. N ETWORK F LOW I
Ford-Fulkerson algorithm
Ford-Fulkerson algorithm
capacity-scaling algorithm
capacity-scaling algorithm
blocking-flow algorithm
blocking-flow algorithm
SECTION 7.1
Flow network
no parallel edges
no edge enters s
no edge leaves t
cap( A, B) =
c(e)
e out of A
capacity
10
15
15
15
10
10
15
10
15
10
16
3
capacity = 10 + 5 + 15 = 30
Def. Its capacity is the sum of the capacities of the edges from A to B.
Def. Its capacity is the sum of the capacities of the edges from A to B.
cap( A, B) =
c(e)
cap( A, B) =
e out of A
c(e)
e out of A
10
10
10
16
capacity = 10 + 8 + 16 = 34
capacity = 10 + 8 + 10 = 28
For each e E :
For each v V {s, t} :
0 f (e) c(e)
f (e) = f (e)
e in to v
For each e E :
For each v V {s, t} :
[capacity]
[flow conservation]
e out of v
0 f (e) c(e)
f (e) = f (e)
e in to v
[capacity]
[flow conservation]
e out of v
f ) f=) = f (e) .
Def. The value of aflow f is:v(val(
e out of s
capacity
flow
inflow at v = 5 + 5 + 0 = 10
outflow at v = 10 + 0
5/9
10
10
0/4
15
/1
5/8
5/5
10
0/4
/6
0 / 15
0 / 15
= 10
5/9
10
10
10 / 10
10
value = 5 + 10 + 10 = 25
10 / 16
7
10
0/4
15
/1
0 / 15
5/8
5/5
10
10
0/4
/6
10
10 / 10
0 / 15
10
10
10 / 16
8
For each e E :
For each v V {s, t} :
0 f (e) c(e)
f (e) = f (e)
e in to v
7. N ETWORK F LOW I
[capacity]
[flow conservation]
e out of v
f ) f=) = f (e) .
Def. The value of aflow f is:v(val(
Ford-Fulkerson algorithm
e out of s
capacity-scaling algorithm
8/9
10
10
0/4
15
0/4
value = 8 + 10 + 10 = 28
/6
0 / 15
8/8
5/5
13
/1
blocking-flow algorithm
10
0 / 15
10
SECTION 7.1
10 / 10
10
13 / 16
9
Greedy algorithm.
Greedy algorithm.
flow
capacity
0/4
network G
10
0 / 10
0/2
/8
0/9
0/4
network G
0/6
10
0 / 10
value of flow
11
10
0 / 10
0/2
8
/8
0/9
0/6
10
0 / 10
0 +8=8
12
Greedy algorithm.
Greedy algorithm.
0/4
network G
10 / 1
8
2
0/2
/8
0/6
10
8 / 10
0/9
0 / 10
0/4
network G
10
8 + 2 = 10
10
2/2
0 / 10
/8
6
0/6
2/9
6
0
/
10
10 / 10
10 + 6 = 16
13
14
Greedy algorithm.
Greedy algorithm.
0/4
network G
10
10
6 / 10
2/2
/8
8/9
3/4
network G
6/6
10
10 / 10
10
16
15
10
9 / 10
0/2
/8
9/9
6/6
10
10 / 10
19
16
Residual graph
Original edge: e = (u, v) E.
Capacity c(e).
Flow f (e).
Augmenting path
Def. An augmenting path is a simple st path P in the residual graph Gf .
original graph G
6 / 17
u
flow
capacity
Residual edge.
c(e) f (e) if e E
c f (e) =
if e R E
f (e)
residual
capacity
residual graph Gf
11
AUGMENT (f, c, P)
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
IF (e E ) f (e) f (e) + b.
Residual edges with positive residual capacity. where flow on a reverse edge
negates flow on a forward edge
Ef = {e : f (e) < c(e)} {eR : f (e) > 0}.
Key property: f ' is a flow in Gf iff f + f ' is a flow in G.
f (eR) f (eR) b.
ELSE
RETURN f.
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
17
Ford-Fulkerson algorithm
18
flow
network G
capacity
0/4
FORD-FULKERSON (G, s, t, c)
10
0/2
0 / 10
/8
0/6
10
0 / 10
0/9
value of flow
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
residual capacity
Update Gf.
RETURN f.
10
10
}
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
s
19
10
10
t
20
network G
network G
0/4
10
0/2
0 / 10
0/4
8
/8
0/6
0 / 10
0/9
10 / 1
8
10
0 +8=8
residual graph Gf
2
0/2
/8
0/6
10
8 + 2 = 10
residual graph Gf
10
10
10
10
network G
network G
10
2/2
0 / 10
/8
22
0/4
0/4
10
10
10
21
8 / 10
0/9
0 / 10
6
0/6
2/9
6
/
10
10 / 10
10
10 + 6 = 16
residual graph Gf
10
0
2/2
6 / 10
/8
6/6
8
/
10
10 / 10
8/9
16 + 2 = 18
residual graph Gf
4
4
6
10
10
7
2
10
10
10
t
23
10
t
24
network G
network G
3
2/4
10
10
0/2
8 / 10
3/4
7
/8
6/6
8/9
9
/
10
min cut
10 / 10
18 + 1 = 19
residual graph Gf
10
10
0/2
9 / 10
6/6
/8
10
10 / 10
9/9
19
1
8
residual graph Gf
10
max flow
10
10
10
25
26
7. N ETWORK F LOW I
Flow value lemma. Let f be any flow and let (A, B) be any cut. Then, the net
flow across (A, B) equals the value of f.
f (e) f (e) = v( f )
e out of A
e in to A
Ford-Fulkerson algorithm
max-flow min-cut theorem
capacity-scaling algorithm
5/9
blocking-flow algorithm
SECTION 7.2
10
10
0/4
15
/1
0 / 15
5/8
5/5
10
0/4
/6
10
10 / 10
0 / 15
10
value of flow = 25
10
10 / 16
28
Flow value lemma. Let f be any flow and let (A, B) be any cut. Then, the net
Flow value lemma. Let f be any flow and let (A, B) be any cut. Then, the net
f (e) f (e) = v( f )
e out of A
f (e) f (e) = v( f )
e in to A
e out of A
e in to A
5/9
5/9
edges from B to A
10
10
0/4
15
0 / 15
5/8
5/5
10
/1
0/4
10
10
10 / 10
0 / 15
/6
10
value of flow = 25
10
0/4
10
0 / 15
5/8
5/5
10
/1
0/4
15
10 / 16
10
10 / 10
0 / 15
/6
10
value of flow = 25
10
10 / 16
29
30
Flow value lemma. Let f be any flow and let (A, B) be any cut. Then, the net
Weak duality. Let f be any flow and (A, B) be any cut. Then, v( f ) cap(A, B).
f (e) f (e) = v( f )
e out of A
Pf.
e in to A
v( f ) =
v( f ) =
f (e)
v(
f) =
v(
=
v(
v( fff ))) =
=
flow-value
lemma
(e)
ff (e)
(e)
of AAff (e)
e out
ee out
out of
of A
A
e out
of
c(e)
c(e)
c(e)
of Ac(e)
e out
ee out
of A
e out
out of
of A
A
=
cap(A,
B)
=
cap(A,
=
B)
= cap(A,
cap(A, B)
B)
of ssf (e)
ee out
out of
e out of s
=
=
f (e) f (e)
f
(e)
f
(e)
vv
ee in
A
A ee out
out of
of vv
in to
to vv
v A e out of v
e in to v
=
=
f (e) f (e).
of AAf (e) ee in
to AAf (e).
ee out
out of
in to
e out of A
(e)
(e)
ff (e)
ff (e)
(e)
ee in
(e)
of
to
e out
Aff (e)
Aff (e)
out of
of A
in to
to A
eee out
ee in
out of A
A
in to A
A
8/9
10
e in to A
10
0/4
15
/1
0 / 15
0/4
/6
10
9 / 10
7/8
5/5
12
0 / 15
10
10
s
10
15
12 / 16
31
value of flow = 27
capacity of cut = 30
32
Pf. The following three conditions are equivalent for any flow f :
Pf. The following three conditions are equivalent for any flow f :
ii. f is a max-flow.
ii. f is a max-flow.
[i
[ ii
ii ]
~ii.
by assumption
33
34
i]
7. N ETWORK F LOW I
v( f ) =
f (e) f (e)
v( f ) = e outof Af (e) e into Af (e)
v( f ) = e outof Af (e) e into Af (e)
= e outof Ac(e) e in to A
flow-value
= e outof Ac(e)
lemma
= e outof Ac(e)
= cap(A,
e out of A B)
= cap(A, B)
= cap(A, B)
blocking-flow algorithm
s
SECTION 7.3
Running time
svwt
swvt
svwt
swvt
svwt
swvt
37
38
JACK EDMONDS
M. K A R P
39
40
Capacity-scaling algorithm
Capacity-scaling algorithm
CAPACITY-SCALING(G, s, t, c)
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
WHILE ( 1)
Gf () -residual graph.
0
11
11
10
10
RETURN f.
17
17
12
12
__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Gf
Gf (), = 100
41
42
Integrality invariant. All flow and residual capacity values are integral.
Lemma 2. Let f be the flow at the end of a -scaling phase. Then,
Theorem. If capacity-scaling algorithm terminates, then f is a max-flow.
Pf.
Pf.
Theorem. The scaling max-flow algorithm finds a max flow in O(m log C)
augmentations. It can be implemented to run in O(m2 log C) time.
Pf. Follows from LEMMA 1 and LEMMA 3.
43
44
7. N ETWORK F LOW I
original network
val(
v( ff )) =
v( f )
v( f )
v( f )
=
=
=
=
f (e) f (e)
e out
of A f (e) e in
to A f (e)
e out
of A f (e) e in
to A f (e)
(c(e)
e out
of A f (e) e in
to A f (e)
e out
of A(c(e) ) e in
to A
e out of A
e in to A
e out
of A(c(e) ) e in
to A
c(e)
e out
of A(c(e) ) e in
to A
e out
of Ac(e) e out
of A e in
to A
e out of A
e in to A
e out
of Ac(e) e out
of A e into A
cap(A,
B)
m
of A e into A
e out
of Ac(e) e out
cap(A,
B) - em
e out of A
out of A
e in to A
cap(A, B) - m
cap(A, B) - m
blocking-flow algorithm
SECTION 17.2
45
L1. Throughout the algorithm, length of the shortest path never decreases.
SHORTEST-AUGMENTING-PATH(G, s, t, c)
Pf.
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
FOREACH e E : f (e) 0.
Gf residual graph.
WHILE (there exists an augmenting path in Gf )
P BREADTH-FIRST-SEARCH (Gf, s, t).
1 k < n
O(m n) augmentations.
Update Gf.
RETURN f.
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
47
48
Def. Given a digraph G = (V, E) with source s, its level graph is defined by:
Def. Given a digraph G = (V, E) with source s, its level graph is defined by:
LG = (V, EG) is the subgraph of G that contains only those edges (v,w) E
LG = (V, EG) is the subgraph of G that contains only those edges (v,w) E
graph G
level graph LG
level graph LG
= 0
= 1
= 2
= 3
s
49
= 0
= 1
= 2
= 3
50
L1. Throughout the algorithm, length of the shortest path never decreases.
L2. After at most m shortest path augmentations, the length of the shortest
Let f and f ' be flow before and after a shortest path augmentation.
Let L and L' be level graphs of Gf and Gf ' .
Only back edges added to Gf '
level graph L
= 0
= 1
= 2
= 0
= 3
= 1
= 2
= 3
51
52
L1. Throughout the algorithm, length of the shortest path never decreases.
L2. After at most m shortest path augmentations, the length of the shortest
JOURNAL
OF COMPUTER
Pf.
AND
SYSTEM
26, 362-391
SCIENCES
A Data Structure
DANIEL
(1983)
Bell Laboratories,
Received
Murray
May
8, 1982;
Hill,
revised
New Jersey
October
07974
18, 1982
A data structure
is proposed
to maintain
a collection
of vertex-disjoint
trees under a
sequence
of two kinds of operations:
a link operation
that combines
two trees into one by
adding an edge, and a cut operation
that divides one tree into two by deleting an edge. Each
operation
requires
O(log n) time. Using this data structure,
new fast algorithms
are obtained
for the following
problems:
(1)
flows,
Computing
(2)
Solving
and acyclic
nearest
various
flows.
(3)
Computing
(4)
Implementing
The most
maximum
algorithm
common
network
certain
kinds
the network
ancestors.
flow
problems
of constrained
simplex
including
minimum
algorithm
finding
maximum
spanning
for minimum-cost
flows,
blocking
trees.
flows.
significant
application
is (2); an O(mn log n)-time
algorithm
is obtained
to find a
flow in a network
of n vertices and m edges, beating by a factor of log n the fastest
previously
known for sparse graphs.
1. INTR~DIJCTI~N
53
54
7. N ETWORK F LOW I
Turn the tree containing vertex u inside out by making v the root of
$3.00
blocking-flow algorithm
SECTION 18.1
t
level graph LG
56
Blocking-flow algorithm
Blocking-flow algorithm
Special:
advance
augment
level graph LG
t
level graph LG
57
58
Blocking-flow algorithm
Blocking-flow algorithm
advance
retreat
level graph LG
t
level graph LG
59
60
Blocking-flow algorithm
Blocking-flow algorithm
Special:
advance
augment
level graph LG
t
level graph LG
61
62
Blocking-flow algorithm
Blocking-flow algorithm
advance
retreat
level graph LG
t
level graph LG
63
64
Blocking-flow algorithm
Blocking-flow algorithm
Special:
retreat
end of phase
level graph LG
t
level graph LG
65
Blocking-flow algorithm
66
INITIALIZE(G, s, t, f, c)
ADVANCE(v)
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
LG level-graph of Gf.
IF
(v = t)
P .
AUGMENT(P).
GOTO ADVANCE(s).
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Pf.
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
P .
GOTO ADVANCE(s).
RETREAT(v)
IF (v = s) STOP.
ELSE
GOTO ADVANCE(w).
Pf.
GOTO ADVANCE(u).
________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
67
68
method
# augmentations
running time
augmenting path
nC
O(m n C)
m log (mC)
year
method
worst case
discovered by
1951
simplex
O(m3 C)
Dantzig
1955
augmenting path
1970
O(m3)
Dinic, Edmonds-Karp
1970
Dinic, Edmonds-Karp
1977
blocking flow
O(m 5/2)
Cherkasky
1978
blocking flow
O(m 7/3)
Galil
O(m2
Ford-Fulkerson
C)
capacity scaling
m log C
O(m2
m log C
O(m n log C)
1983
dynamic trees
mn
O(m2 n)
1985
capacity scaling
O(m2 log C)
Gabow
mn
O(m n2 )
1997
length function
Goldberg-Rao
2012
compact network
O(m2 / log m)
Orlin
dynamic trees
mn
O(m n log n )
O(m)
log C)
O(m2
Sleator-Tarjan
log m)
max-flow algorithms for sparse digraphs with m edges, integer capacities between 1 and C
69
70
Increases flow one edge at a time instead of one augmenting path at a time.
Massachusetts
AND
On I m p l e m e n t i n g P u s h - R e l a b e l M e t h o d
for the M a x i m u m Flow P r o b l e m
ROBERT E. TARJAN
Princeton University,
Bell Laboratories,
Murray
Abstract. All previously known efftcient maximum-flow algorithms work by finding augmenting paths,
either one path at a time (as in the original Ford and Fulkerson algorithm) or all shortest-length
augmenting paths at once (using the layered network approach of Dinic). An alternative method based
on the preflow concept of Karzanov is introduced. A preflow is like a flow, except that the total amount
flowing into a vertex is allowed to exceed the total amount flowing out. The method maintains a preflow
in the original network and pushes local flow excess toward the sink along what are estimated to be
shortest paths. The algorithm and its analysis are simple and intuitive, yet the algorithm runs as fast as
any other known method on dense.graphs, achieving an O(n)) time bound on an n-vertex graph. By
incorporating the dynamic tree data structure of Sleator and Tarjan, we obtain a version of the algorithm
running in O(nm log(n/m)) time on an n-vertex, m-edge graph. This is as fast as any known method
for any graph density and faster on graphs of moderate density. The algorithm also admits efticient
distributed and parallel implementations. A parallel implementation running in O(nlog n) time using
n processors and O(m) space is obtained. This time bound matches that of the Shiloach-Vishkin
algorithm, which also uses n processors but requires O(n) space.
Categories and Subject Descriptors: F.2.2 [Analysis of Algorithms and Problem Complexity]: Nonnumerical Algorithms and Problems; G.2.2 [Discrete Mathematics]: Graph Theory-graph algorithms;
network problems
EUROPEAN
JOURNAL
OF OPERATIONAL
RESEARCH
cher@eemi.msk.su
2 Computer Science Department, Stanford University
Stanford, CA 94305, USA
K . A h u j a a, M u r a l i K o d i a l a m
b, A j a y K . M i s h r a c, J a m e s B . O r l i n d,.
Department t~'lndustrial and Management Engineering. Indian Institute of Technology. Kanpur, 208 016, India
b AT& T Bell Laboratories, Holmdel, NJ 07733, USA
c KA'F-ZGraduate School of Business, University of Pittsburgh, Pittsburgh, PA 15260, USA
d Sloun School of Management, Massachusetts Institute of Technology. Cambridge. MA 02139. USA
Abstract
71
Introduction
The maximum flow algorithm is distinguished by the long line of successive contributions researchers have made in
obtaining algorithms with incrementally better worst-case complexity. Some, but not all, of these theoretical improvements
have produced improvements in practice. The purpose of this paper is to test some of the major algorithmic ideas developed
in the recent years and to assess their utility on the empirical front. However, our study differs from previous studies in
several ways. Whereas previous studies focus primarily on CPU time analysis, our analysis goes further and provides
detailed insight into algorithmic behavior. It not only observes how algorithms behave but also tries to explain why
algorithms behave that way. We have limited our study to the best previous maximum flow algorithms and some of the
recent algorithms that are likely to be efficient in practice. Our study encompasses ten maximum flow algorithms and five
72
7. N ETWORK F LOW I
p.1
In IEEE Transactions on PAMI, Vol. 26, No. 9, pp. 1124-1137, Sept. 2004
Ford-Fulkerson algorithm
An Experimental Comparison of
Min-Cut/Max-Flow Algorithms for
Energy Minimization in Vision
MaxFlow Revisited:
An Empirical Comparison of Maxflow
Algorithms for Dense Vision Problems
Abstract
Tanmay Verma
After [15, 31, 19, 8, 25, 5] minimum cut/maximum flow algorithms on graphs emerged as
tanmay08054@iiitd.ac.in
an increasingly useful tool for exact or approximate energy minimization in low-level vision.
Dhruv Batra
dbatra@ttic.edu
different polynomial time complexity. Their practical efficiency, however, has to date been
capacity-scaling algorithm
shortest augmenting paths
IIIT-Delhi
Delhi, India
TTI-Chicago
Chicago, USA
blocking-flow algorithm
studied mainly outside the scope of computer vision. The goal of this paper is to provide an
Abstract
Algorithms for finding the maximum amount of flow possible in a network (or maxflow) play a central role in computer vision problems. We present an empirical comparison of different max-flow algorithms on modern problems. Our problem instances arise
from energy minimization problems in Object Category Segmentation, Image Deconvolution, Super Resolution, Texture Restoration, Character Completion and 3D Segmentation. We compare 14 different implementations and find that the most popularly used
implementation of Kolmogorov [5] is no longer the fastest algorithm available, especially
for dense graphs.
new algorithm that we have recently developed. The algorithms we study include both
Goldberg-Tarjan style push-relabel methods and algorithms based on Ford-Fulkerson
style augmenting paths. We benchmark these algorithms on a number of typical graphs
in the contexts of image restoration, stereo, and segmentation. In many cases our new
algorithm works several times faster than any of the other methods making near real-time
performance possible. An implementation of our max-flow/min-cut algorithm is available
upon request for research purposes.
Index Terms Energy minimization, graph algorithms, minimum cut, maximum
Introduction
Over the past two decades, algorithms for finding the maximum amount of flow possible in
a network (or max-flow) have become the workhorses of modern computer vision and machine learning from optimal (or provably-approximate) inference in sophisticated discrete
models [6, 11, 27, 30, 32] to enabling real-time image processing [38, 39].
Perhaps the most prominent role of max-flow is due to the work of Hammer [23] and
Kolmogorov and Zabih [27], who showed that a fairly large class of energy functions sum
of submodular functions on pairs of boolean variables can be efficiently and optimally
minimized via a reduction to max-flow. Max-flow also plays a crucial role in approximate
minimization of energy functions with multi-label variables [4, 6], triplet or higher order
terms [26, 27, 35, 37], global terms [30], and terms encoding label costs [11, 32].
Given the wide applicability, it is important to ask which max-flow algorithm should be
used. There are numerous algorithms for max-flow with different asymptotic complexities
and practical run-time behaviour. For an extensive list, we refer the reader to surveys in the
literature [2, 7]. Broadly speaking, there are three main families of max-flow algorithms:
Bipartite matching
73
1. Augmenting-Path (AP) variants: algorithms [5, 13, 14, 17, 21] that maintain a valid
flow during the algorithm, i.e. always satisfying the capacity and flow-conservation
constraints.
implemented
inJ. CoMavx.
SIAM
O(m n1/2)
time.
EVEN"
AND
R. ENDRE
TARJAN:I:
Abstract. An algorithm of Dinic for finding the maximum flow in a network is described. It is
then shown that if the vertex capacities are all equal to one, the algorithm requires at most O(IV[ 1/2 IEI)
time, and if the edge capacities are all equal to one, the algorithm requires at most O(I VI 2/3. IEI) time.
Also, these bounds are tight for Dinics algorithm.
These results are used to test the vertex connectivity of a graph in O(IVI 1/z. IEI 2) time and the
edge connectivity in O(I V[ 5/3. IEI) time.
Key words. Dinics algorithm, maximum flow, connectivity, vertex connectivity, edge connectivity
Let
75
76
Special augmentation:
L1.
L2.
L3.
advance
level graph LG
77
78
augment
advance
level graph LG
level graph LG
79
80
retreat
advance
level graph LG
level graph LG
81
82
augment
end of phase
level graph LG
level graph LG
83
84
n1/2.
n1/2.
O(1) per edge since each edge traversed and deleted at most once.
O(1) per node since each node deleted at most once.
O(m) to create level graph LG.
V0
85
residual edges
V0
V1
Vh
Vn1/2
87
V1
Vh
Vn1/2
86