Branch-and-Bound Algorithms as Polynomial-time Approximation Schemes
Hey there, little explorer! 👋
Imagine you have a big toy box, and you want to find your favorite teddy bear super fast!
Sometimes, we have a special way to look for it, like "Branch-and-Bound." It's like checking every part of the box very carefully until you find the exact bear. It takes a long time, but you always find it!
But what if you don't have all day? This smart paper says that sometimes, this careful way of looking can also be like a "speedy search." It means you might not find the perfect bear right away, but you can find a really good bear much, much faster! And the more time you give it, the closer it gets to being perfect!
So, it's like learning that your super careful search can also be a super speedy search! How cool is that? 🎉
arXiv:2504.15885v3 Announce Type: replace Abstract: Branch-and-bound algorithms (B&B) and polynomial-time approximation schemes (PTAS) are two seemingly distant areas of combinatorial optimization. We intend to (partially) bridge the gap between them while expanding the boundary of theoretical knowledge on the B\&B framework. Branch-and-bound algorithms typically guarantee that an optimal solution is eventually found. However, we show that the standard implementation of branch-and-bound for certain knapsack and scheduling problems also exhibits PTAS-like behavior, yielding increasingly better solutions within polynomial time. Our findings are supported by computational experiments and comparisons with benchmark methods. This paper is an extended version of a paper accepted at ICALP 2025
View PDF HTML (experimental)
Abstract:Branch-and-bound algorithms (B&B) and polynomial-time approximation schemes (PTAS) are two seemingly distant areas of combinatorial optimization. We intend to (partially) bridge the gap between them while expanding the boundary of theoretical knowledge on the B&B framework. Branch-and-bound algorithms typically guarantee that an optimal solution is eventually found. However, we show that the standard implementation of branch-and-bound for certain knapsack and scheduling problems also exhibits PTAS-like behavior, yielding increasingly better solutions within polynomial time. Our findings are supported by computational experiments and comparisons with benchmark methods. This paper is an extended version of a paper accepted at ICALP 2025
Subjects:
Data Structures and Algorithms (cs.DS); Optimization and Control (math.OC)
Cite as: arXiv:2504.15885 [cs.DS]
(or arXiv:2504.15885v3 [cs.DS] for this version)
https://doi.org/10.48550/arXiv.2504.15885
arXiv-issued DOI via DataCite
Journal reference: Mathematics of Operations Research, 2026 Mathematics of Operations Research Mathematics of Operations Research
Submission history
From: Eleonora Vercesi [view email] [v1] Tue, 22 Apr 2025 13:30:01 UTC (317 KB) [v2] Tue, 16 Sep 2025 08:43:07 UTC (823 KB) [v3] Thu, 2 Apr 2026 15:57:27 UTC (180 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
benchmarkannounceversion
The Silicon Protocol: The Model Hosting Decision — When Azure OpenAI Isn’t Enough (And When It’s…
The Silicon Protocol: The Model Hosting Decision — When Azure OpenAI Isn’t Enough (And When It’s Overkill) The $187K infrastructure decision every healthcare CTO makes is wrong. Here’s the actual math on self-hosted vs. API vs. hybrid LLM deployment. The three hosting patterns healthcare organizations choose — and what each actually costs at scale. Most start left (API), graduate to center (Hybrid), few need right (Self-hosted). The compliance officer approved your de-identification pipeline. Legal signed off on the BAA. Security validated your OAuth tokens are governed by proper Passports. You’re ready to deploy your first production LLM in healthcare. Then engineering asks the question that determines whether you spend $50K or $250K this year: “Where does the model actually run?” Most he

Contra Nina Panickssery on advice for children
I recently read this post by Nina Panickssery on advice for children. I felt that several of the recommendations are actively harmful the children they are aimed at. I am going to assume that this advice is targeted at children who are significantly more intelligent than average and maybe 7-12 years of age? It may be worth reading the original post beforehand, or maybe having it open in another tab while you read through this one. We'll go through the points one by one: "Don't be a sheep" . There's a difference between noticing when other people are wrong and actively assuming everyone else is dumb. This leans towards the second. There is a huge amount of evolutionary pressure that has gone into designing kids' behaviour; survival past childhood is pretty important if you want to have kids

EmDash: A Full-Stack TypeScript CMS Built on Astro + Cloudflare — Can It Replace WordPress?
Originally published at recca0120.github.io WordPress powers 43% of the web, but it was born in 2003. PHP + MySQL, plugins with full database access, content stored as HTML coupled to the DOM. After twenty years, it's fair to rethink the whole thing. EmDash is that attempt. Full-stack TypeScript, running on Astro, backed by Cloudflare infrastructure. Still in beta, but the architecture is worth examining. How It Differs from WordPress Let's start with the biggest differences. Sandboxed Plugin Isolation 96% of WordPress security vulnerabilities come from plugins. The reason is straightforward: plugins run in the same PHP process as the core, with full access to the database and filesystem. One bad plugin exposes the entire site. EmDash uses Cloudflare Workers' Dynamic Worker Loaders for iso
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Research Papers
VLMs Need Words: Vision Language Models Ignore Visual Detail In Favor of Semantic Anchors
Vision Language Models struggle with fine-grained visual perception tasks due to their language-centric training approach, performing poorly on unnamed visual entities despite having relevant information in their representations. (1 upvotes on HuggingFace)




Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!