Solving Curved Linear Programs via the Shadow Simplex Method
|
|
- Liliana Hancock
- 8 years ago
- Views:
Transcription
1 Solving Curved Linear rograms via the Shadow Simplex Method Daniel Dadush 1 Nicolai Hähnle 2 1 Centrum Wiskunde & Informatica (CWI) 2 Bonn Universität CWI Scientific Meeting 01/15
2 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 2 / 24
3 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 3 / 24
4 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24
5 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24
6 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) c Amazingly versatile modeling language. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24
7 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) c Amazingly versatile modeling language. Generally provides a relaxed view of a desired optimization problem, but can be solved in polynomial time! D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24
8 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24
9 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24
10 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 One of the most successful modeling language for many real world applications. While instances can be extremely hard to solve (MI is N-hard), many practical instances are not. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24
11 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 Many sophisticated software packages exist for these models (CLEX, Gurobi, etc.). MI solving is now considered a mature and practical technology. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24
12 Sample Applications Routing delivery / pickup trucks for customers. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 6 / 24
13 Sample Applications Optimizing supply chain logistics. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 6 / 24
14 Standard Framework for Solving MIs Relax integrality of the variables. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24
15 Standard Framework for Solving MIs Relax integrality of the variables. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24
16 Standard Framework for Solving MIs Relax integrality of the variables. max c T x + d T y subject to Ax + By b, x R n 1, y R n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24
17 Standard Framework for Solving MIs Relax integrality of the variables. max c T x + d T y subject to Ax + By b, x R n 1, y R n 2 Solve the L. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24
18 Standard Framework for Solving MIs Relax integrality of the variables. max Solve the L. c T x + d T y subject to Ax + By b, x R n 1, y R n 2 Add extra constraints to tighten the L or guess the values of some of the integer variables. Repeat. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24
19 Standard Framework for Solving MIs Relax integrality of the variables. max Solve the L. c T x + d T y subject to Ax + By b, x R n 1, y R n 2 Add extra constraints to tighten the L or guess the values of some of the integer variables. Repeat. Need to solve a lot of Ls quickly. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24
20 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
21 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 1 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
22 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 2 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
23 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 3 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
24 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 4 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
25 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 5 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
26 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 6 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
27 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 7 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
28 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 8 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24
29 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24
30 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? Easy to reoptimize when adding an extra constraint or variable. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24
31 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? Easy to reoptimize when adding an extra constraint or variable. Vertex solutions are often nice (e.g. sparse, easy to interpret). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24
32 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? Easy to reoptimize when adding an extra constraint or variable. Vertex solutions are often nice (e.g. sparse, easy to interpret). Simplex pivots implementable using simple linear algebra. Worst case O(mn) time per iteration. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24
33 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 10 / 24
34 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! Simplex lower bounds: Klee-Minty (1972): designed deformed cubes, providing worst case examples for many pivot rules. Friedmann et al. (2011): systematically designed bad examples using Markov decision processes. In these examples, the pivot rule is tricked into taking an (sub)exponentially long path, even though short paths exists. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 10 / 24
35 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! Simplex upper bounds: Kalai (1992), Matousek-Sharir-Welzl ( ): Random facet rule requires 2 O( n log m) pivots on expectation. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 11 / 24
36 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! olynomial bounds for random or smoothed linear programs: Borgwardt (82), Smale (83), Adler (83), Todd (83), Haimovich (83), Meggido (86), Adler-Shamir-Karp (86,87), Spielman-Teng (01,04), Spielman-Deshpande (05), Spielman-Kelner (06), Vershynin (06) D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 11 / 24
37 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! olynomial bounds for random or smoothed linear programs: Borgwardt (82), Smale (83), Adler (83), Todd (83), Haimovich (83), Meggido (86), Adler-Shamir-Karp (86,87), Spielman-Teng (01,04), Spielman-Deshpande (05), Spielman-Kelner (06), Vershynin (06) These works rely on the shadow simplex method. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 11 / 24
38 Linear rogramming and the Hirsch Conjecture = {x R n : Ax b}, A R m n lives in R n (ambient dimension is n) and has m constraints. Besides the computational efficiency of the simplex method, an even more basic question is not understood: Question How can we bound the length of paths on the graph of? I.e. how to bound the diameter of? D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 12 / 24
39 Linear rogramming and the Hirsch Conjecture = {x R n : Ax b}, A R m n lives in R n (ambient dimension is n) and has m constraints. Conjecture (olynomial Hirsch Conjecture) The diameter of is bounded by a polynomial in the dimension n and number of constraints m. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 13 / 24
40 Linear rogramming and the Hirsch Conjecture = {x R n : Ax b}, A R m n lives in R n (ambient dimension is n) and has m constraints. Conjecture (olynomial Hirsch Conjecture) The diameter of is bounded by a polynomial in the dimension n and number of constraints m. Diameter upper bounds: Barnette, Larman (1974): 1 3 2n 2 (m n ). Kalai, Kleitman (1992), Todd (2014): (m n) log n. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 13 / 24
41 Well-Conditioned olytopes = {x R n : Ax b}, A Z m n Definition (Bounded Subdeterminants) An integer matrix A has subdeterminants bounded by if every square submatrix B of A satisfies det(b). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 14 / 24
42 Well-Conditioned olytopes = {x R n : Ax b}, A Z m n Definition (Bounded Subdeterminants) An integer matrix A has subdeterminants bounded by if every square submatrix B of A satisfies det(b). Diameter Bound: Bonifas, Di Summa, Eisenbrand, Hähnle, Niemeier (2012): non-constructive O(n log n ) bound. Brunsch,Röglin (2013): shadow simplex method finds paths of length O(mn 3 4 ). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 14 / 24
43 Well-Conditioned olytopes = {x R n : Ax b}, A Z m n Definition (Bounded Subdeterminants) An integer matrix A has subdeterminants bounded by if every square submatrix B of A satisfies det(b). Diameter Bound: Bonifas, Di Summa, Eisenbrand, Hähnle, Niemeier (2012): non-constructive O(n log n ) bound. Brunsch,Röglin (2013): shadow simplex method finds paths of length O(mn 3 4 ). Optimization: Dyer, Frieze (1994): = 1 (totally unimodular) random walk simplex uses O(m 16 n 6 log(mn) 3 ) pivots. Eisenbrand, Vempala (2014): random walk simplex uses O(mpoly(n, )) pivots. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 14 / 24
44 Faster Shadow Simplex = {x R n : Ax b}, A Z m n Subdeterminants of A bounded by. Theorem (D., Hähnle 2014+) Diameter is bounded by O(n 3 2 ln(n )). Can solve L using O(n 5 2 ln(n )) pivots on expectation. Based on a new analysis and variant of the shadow simplex method. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 15 / 24
45 τ-wide olyhedra v 1 v 3 v 2 v 4 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24
46 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 Normal cone at v is all objectives maximized at v. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24
47 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 N 1 N 3 N 4 Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24
48 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. is τ-wide if each normal cone contains a unit ball of radius τ centered on the unit sphere. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24
49 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. is τ-wide if each normal cone contains a unit ball of radius τ centered on the unit sphere. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24
50 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 has subdeterminant bound is τ-wide for τ = 1/(n ) 2. Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. is τ-wide if each normal cone contains a unit ball of radius τ centered on the unit sphere. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24
51 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 In 2 dimensions all interior angles are at most π 2τ, i.e. sharp. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 17 / 24
52 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 In 2 dimensions all interior angles are at most π 2τ, i.e. sharp. Theorem (D.-Hähnle 2014) If is τ-wide then the diameter of is bounded by O(n/τ ln(1/τ)). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 17 / 24
53 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 18 / 24
54 ivot Rule c v 1 c d v 3 v 2 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
55 ivot Rule c v 1 c d v 3 v 2 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
56 ivot Rule c d 1 v 1 c d v 2 v 3 v 4 d d 1 Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
57 ivot Rule c d d 1 v 2 v 3 v 1 v 4 d d 1 c Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
58 ivot Rule c d d 1 d 2 v 1 v d 1 2 d 2 v 3 v 4 d c Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
59 ivot Rule c v 1 c d d 2 v 2 v 3 v 4 d d 1 d 2 Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
60 ivot Rule c v 1 c d v 2 d 2 d 2 v 3 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
61 ivot Rule c v 1 c d v 3 v 2 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. Question How can we bound the number of intersections with the normal fan? D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24
62 ivot Rule c v 1 c d v 2 v 3 v 4 d Question How can we bound the number of intersections with the normal fan? olynomial bounds for random and smoothed linear programs: Borgwardt (82), Smale (83), Adler (83), Todd (83), Haimovich (83), Meggido (86), Adler-Shamir-Karp (86,87), Spielman-Teng (01,04), Spielman-Deshpande (05), Spielman-Kelner (06), Vershynin (06) D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 20 / 24
63 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24
64 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24
65 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24
66 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. Theorem (D.-Hähnle 2014) Assume is an n-dimensional τ-wide polytope. hase (b). Expected number of crossings of [c + X, d + X ] with normal fan is O( c d /τ). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24
67 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. Theorem (D.-Hähnle 2014) Assume is an n-dimensional τ-wide polytope. hase (b). Expected number of crossings of [c + X, d + X ] with normal fan is O( c d /τ). hase (a+c). Expected number of crossings of [c + αx, c + X ] (same for d), for α (0, 1], with normal fan is O(n/τ ln(1/α)). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24
68 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. Theorem (D.-Hähnle 2014) Assume is an n-dimensional τ-wide polytope. hase (b). Expected number of crossings of [c + X, d + X ] with normal fan is O( c d /τ). hase (a+c). Expected number of crossings of [c + αx, c + X ] (same for d), for α (0, 1], with normal fan is O(n/τ ln(1/α)). Main ingredient for all our results. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24
69 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 22 / 24
70 Navigation over the Voronoi Graph y t x Z Z + t Figure: Randomized Straight Line algorithm Closest Vector roblem (CV): Find closest lattice vector y to t. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 23 / 24
71 Navigation over the Voronoi Graph y t x Z Z + t Figure: Randomized Straight Line algorithm Closest Vector roblem (CV): Find closest lattice vector y to t. Can reduce CV to efficient navigation over the Voronoi graph (Sommer,Feder,Shalvi 09; Micciancio,Voulgaris 10-13). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 23 / 24
72 Navigation over the Voronoi Graph y t x Z Z + t Figure: Randomized Straight Line algorithm Closest Vector roblem (CV): Find closest lattice vector y to t. Can move between nearby lattice points using a polynomial number of steps (Bonifas, D. 14). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 23 / 24
73 Summary New and simpler analysis and variant of the Shadow Simplex method. Improved diameter bounds and simplex algorithm for curved polyhedra. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 24 / 24
74 Summary New and simpler analysis and variant of the Shadow Simplex method. Improved diameter bounds and simplex algorithm for curved polyhedra. Thank you! D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 24 / 24
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
More informationarxiv:1203.1525v1 [math.co] 7 Mar 2012
Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined
More informationLecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
More informationLinear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
More informationActually Doing It! 6. Prove that the regular unit cube (say 1cm=unit) of sufficiently high dimension can fit inside it the whole city of New York.
1: 1. Compute a random 4-dimensional polytope P as the convex hull of 10 random points using rand sphere(4,10). Run VISUAL to see a Schlegel diagram. How many 3-dimensional polytopes do you see? How many
More informationCan linear programs solve NP-hard problems?
Can linear programs solve NP-hard problems? p. 1/9 Can linear programs solve NP-hard problems? Ronald de Wolf Linear programs Can linear programs solve NP-hard problems? p. 2/9 Can linear programs solve
More informationTransportation Polytopes: a Twenty year Update
Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationAdaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationNP-Hardness Results Related to PPAD
NP-Hardness Results Related to PPAD Chuangyin Dang Dept. of Manufacturing Engineering & Engineering Management City University of Hong Kong Kowloon, Hong Kong SAR, China E-Mail: mecdang@cityu.edu.hk Yinyu
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More information. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2
4. Basic feasible solutions and vertices of polyhedra Due to the fundamental theorem of Linear Programming, to solve any LP it suffices to consider the vertices (finitely many) of the polyhedron P of the
More informationFactoring. Factoring 1
Factoring Factoring 1 Factoring Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and RSA is broken o Rabin cipher also based on factoring Factoring like
More information4.1 Learning algorithms for neural networks
4 Perceptron Learning 4.1 Learning algorithms for neural networks In the two preceding chapters we discussed two closely related models, McCulloch Pitts units and perceptrons, but the question of how to
More information1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
More information17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
More informationDATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
More informationBinary Image Reconstruction
A network flow algorithm for reconstructing binary images from discrete X-rays Kees Joost Batenburg Leiden University and CWI, The Netherlands kbatenbu@math.leidenuniv.nl Abstract We present a new algorithm
More informationEquilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
More information1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
More informationLECTURE 5: DUALITY AND SENSITIVITY ANALYSIS. 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method
LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method Introduction to dual linear program Given a constraint matrix A, right
More informationGRADES 7, 8, AND 9 BIG IDEAS
Table 1: Strand A: BIG IDEAS: MATH: NUMBER Introduce perfect squares, square roots, and all applications Introduce rational numbers (positive and negative) Introduce the meaning of negative exponents for
More informationLinear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.
1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More information3. Evaluate the objective function at each vertex. Put the vertices into a table: Vertex P=3x+2y (0, 0) 0 min (0, 5) 10 (15, 0) 45 (12, 2) 40 Max
SOLUTION OF LINEAR PROGRAMMING PROBLEMS THEOREM 1 If a linear programming problem has a solution, then it must occur at a vertex, or corner point, of the feasible set, S, associated with the problem. Furthermore,
More informationLinear Programming Problems
Linear Programming Problems Linear programming problems come up in many applications. In a linear programming problem, we have a function, called the objective function, which depends linearly on a number
More informationLinear Programming I
Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins
More informationLinear Algebra Notes
Linear Algebra Notes Chapter 19 KERNEL AND IMAGE OF A MATRIX Take an n m matrix a 11 a 12 a 1m a 21 a 22 a 2m a n1 a n2 a nm and think of it as a function A : R m R n The kernel of A is defined as Note
More informationSeminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it
Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationChapter 19. General Matrices. An n m matrix is an array. a 11 a 12 a 1m a 21 a 22 a 2m A = a n1 a n2 a nm. The matrix A has n row vectors
Chapter 9. General Matrices An n m matrix is an array a a a m a a a m... = [a ij]. a n a n a nm The matrix A has n row vectors and m column vectors row i (A) = [a i, a i,..., a im ] R m a j a j a nj col
More informationProgramme doctoral en recherche opérationnelle
Programme doctoral en recherche opérationnelle Zinal Seminar 2012, January 15-19 Sunday 15 Monday 16 Tuesday 17 Wednesday 18 Thursday 19 08:30-09:00 09:00-09:30 09:30-10:00 10:00-10:30 10:30-11:00 11:00-11:30
More informationThe number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72.
ADVANCED SUBSIDIARY GCE UNIT 4736/01 MATHEMATICS Decision Mathematics 1 THURSDAY 14 JUNE 2007 Afternoon Additional Materials: Answer Booklet (8 pages) List of Formulae (MF1) Time: 1 hour 30 minutes INSTRUCTIONS
More informationLattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)
More information7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
More informationThis exposition of linear programming
Linear Programming and the Simplex Method David Gale This exposition of linear programming and the simplex method is intended as a companion piece to the article in this issue on the life and work of George
More informationMATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued).
MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors Jordan canonical form (continued) Jordan canonical form A Jordan block is a square matrix of the form λ 1 0 0 0 0 λ 1 0 0 0 0 λ 0 0 J = 0
More informationOptimization Modeling for Mining Engineers
Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2
More informationNumerical Methods I Eigenvalue Problems
Numerical Methods I Eigenvalue Problems Aleksandar Donev Courant Institute, NYU 1 donev@courant.nyu.edu 1 Course G63.2010.001 / G22.2420-001, Fall 2010 September 30th, 2010 A. Donev (Courant Institute)
More informationwith functions, expressions and equations which follow in units 3 and 4.
Grade 8 Overview View unit yearlong overview here The unit design was created in line with the areas of focus for grade 8 Mathematics as identified by the Common Core State Standards and the PARCC Model
More informationWhat is Linear Programming?
Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to
More informationSolutions to old Exam 1 problems
Solutions to old Exam 1 problems Hi students! I am putting this old version of my review for the first midterm review, place and time to be announced. Check for updates on the web site as to which sections
More informationLecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
More informationChapter 10: Network Flow Programming
Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationThe Quadratic Sieve Factoring Algorithm
The Quadratic Sieve Factoring Algorithm Eric Landquist MATH 488: Cryptographic Algorithms December 14, 2001 1 Introduction Mathematicians have been attempting to find better and faster ways to factor composite
More informationSolving polynomial least squares problems via semidefinite programming relaxations
Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose
More informationLecture Notes to Accompany. Scientific Computing An Introductory Survey. by Michael T. Heath. Chapter 10
Lecture Notes to Accompany Scientific Computing An Introductory Survey Second Edition by Michael T. Heath Chapter 10 Boundary Value Problems for Ordinary Differential Equations Copyright c 2001. Reproduction
More informationOptimization in ICT and Physical Systems
27. OKTOBER 2010 in ICT and Physical Systems @ Aarhus University, Course outline, formal stuff Prerequisite Lectures Homework Textbook, Homepage and CampusNet, http://kurser.iha.dk/ee-ict-master/tiopti/
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More informationModern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
More informationHow To Solve A K Path In Time (K)
What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov
More informationFast and Robust Normal Estimation for Point Clouds with Sharp Features
1/37 Fast and Robust Normal Estimation for Point Clouds with Sharp Features Alexandre Boulch & Renaud Marlet University Paris-Est, LIGM (UMR CNRS), Ecole des Ponts ParisTech Symposium on Geometry Processing
More informationChapter 17. Orthogonal Matrices and Symmetries of Space
Chapter 17. Orthogonal Matrices and Symmetries of Space Take a random matrix, say 1 3 A = 4 5 6, 7 8 9 and compare the lengths of e 1 and Ae 1. The vector e 1 has length 1, while Ae 1 = (1, 4, 7) has length
More informationSOLUTIONS. f x = 6x 2 6xy 24x, f y = 3x 2 6y. To find the critical points, we solve
SOLUTIONS Problem. Find the critical points of the function f(x, y = 2x 3 3x 2 y 2x 2 3y 2 and determine their type i.e. local min/local max/saddle point. Are there any global min/max? Partial derivatives
More informationAPPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder
APPM4720/5720: Fast algorithms for big data Gunnar Martinsson The University of Colorado at Boulder Course objectives: The purpose of this course is to teach efficient algorithms for processing very large
More informationPerron vector Optimization applied to search engines
Perron vector Optimization applied to search engines Olivier Fercoq INRIA Saclay and CMAP Ecole Polytechnique May 18, 2011 Web page ranking The core of search engines Semantic rankings (keywords) Hyperlink
More informationPennsylvania System of School Assessment
Pennsylvania System of School Assessment The Assessment Anchors, as defined by the Eligible Content, are organized into cohesive blueprints, each structured with a common labeling system that can be read
More informationAlgebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions.
Chapter 1 Vocabulary identity - A statement that equates two equivalent expressions. verbal model- A word equation that represents a real-life problem. algebraic expression - An expression with variables.
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationNimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff
Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear
More informationGeometry and Measurement
The student will be able to: Geometry and Measurement 1. Demonstrate an understanding of the principles of geometry and measurement and operations using measurements Use the US system of measurement for
More informationIEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2
IEOR 4404 Homework # Intro OR: Deterministic Models February 14, 011 Prof. Jay Sethuraman Page 1 of 5 Homework #.1 (a) What is the optimal solution of this problem? Let us consider that x 1, x and x 3
More informationH.Calculating Normal Vectors
Appendix H H.Calculating Normal Vectors This appendix describes how to calculate normal vectors for surfaces. You need to define normals to use the OpenGL lighting facility, which is described in Chapter
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More informationInteger Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract We give
More information1 Determinants and the Solvability of Linear Systems
1 Determinants and the Solvability of Linear Systems In the last section we learned how to use Gaussian elimination to solve linear systems of n equations in n unknowns The section completely side-stepped
More informationKey words. Mixed-integer programming, mixing sets, convex hull descriptions, lot-sizing.
MIXING SETS LINKED BY BI-DIRECTED PATHS MARCO DI SUMMA AND LAURENCE A. WOLSEY Abstract. Recently there has been considerable research on simple mixed-integer sets, called mixing sets, and closely related
More informationDerive 5: The Easiest... Just Got Better!
Liverpool John Moores University, 1-15 July 000 Derive 5: The Easiest... Just Got Better! Michel Beaudin École de Technologie Supérieure, Canada Email; mbeaudin@seg.etsmtl.ca 1. Introduction Engineering
More informationUsing row reduction to calculate the inverse and the determinant of a square matrix
Using row reduction to calculate the inverse and the determinant of a square matrix Notes for MATH 0290 Honors by Prof. Anna Vainchtein 1 Inverse of a square matrix An n n square matrix A is called invertible
More information1 Error in Euler s Method
1 Error in Euler s Method Experience with Euler s 1 method raises some interesting questions about numerical approximations for the solutions of differential equations. 1. What determines the amount of
More informationMinimally Infeasible Set Partitioning Problems with Balanced Constraints
Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of
More informationDecision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes
Paper Reference(s) 6689/01 Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes Materials required for examination Nil Items included with
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationFactorization Methods: Very Quick Overview
Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.
More informationFor example, estimate the population of the United States as 3 times 10⁸ and the
CCSS: Mathematics The Number System CCSS: Grade 8 8.NS.A. Know that there are numbers that are not rational, and approximate them by rational numbers. 8.NS.A.1. Understand informally that every number
More informationLECTURE: INTRO TO LINEAR PROGRAMMING AND THE SIMPLEX METHOD, KEVIN ROSS MARCH 31, 2005
LECTURE: INTRO TO LINEAR PROGRAMMING AND THE SIMPLEX METHOD, KEVIN ROSS MARCH 31, 2005 DAVID L. BERNICK dbernick@soe.ucsc.edu 1. Overview Typical Linear Programming problems Standard form and converting
More informationMathematical finance and linear programming (optimization)
Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may
More informationModélisation et résolutions numérique et symbolique
Modélisation et résolutions numérique et symbolique via les logiciels Maple et Matlab Jeremy Berthomieu Mohab Safey El Din Stef Graillat Mohab.Safey@lip6.fr Outline Previous course: partial review of what
More information26 Linear Programming
The greatest flood has the soonest ebb; the sorest tempest the most sudden calm; the hottest love the coldest end; and from the deepest desire oftentimes ensues the deadliest hate. Th extremes of glory
More information1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
More informationMATH 551 - APPLIED MATRIX THEORY
MATH 55 - APPLIED MATRIX THEORY FINAL TEST: SAMPLE with SOLUTIONS (25 points NAME: PROBLEM (3 points A web of 5 pages is described by a directed graph whose matrix is given by A Do the following ( points
More informationDATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar
More informationThe Fourth International DERIVE-TI92/89 Conference Liverpool, U.K., 12-15 July 2000. Derive 5: The Easiest... Just Got Better!
The Fourth International DERIVE-TI9/89 Conference Liverpool, U.K., -5 July 000 Derive 5: The Easiest... Just Got Better! Michel Beaudin École de technologie supérieure 00, rue Notre-Dame Ouest Montréal
More informationLinearly Independent Sets and Linearly Dependent Sets
These notes closely follow the presentation of the material given in David C. Lay s textbook Linear Algebra and its Applications (3rd edition). These notes are intended primarily for in-class presentation
More informationContent. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11
Content Credits 11 Chapter 1 Arithmetic Refresher 13 1.1 Algebra 14 Real Numbers 14 Real Polynomials 19 1.2 Equations in one variable 21 Linear Equations 21 Quadratic Equations 22 1.3 Exercises 28 Chapter
More informationONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
More informationPre-Algebra 2008. Academic Content Standards Grade Eight Ohio. Number, Number Sense and Operations Standard. Number and Number Systems
Academic Content Standards Grade Eight Ohio Pre-Algebra 2008 STANDARDS Number, Number Sense and Operations Standard Number and Number Systems 1. Use scientific notation to express large numbers and small
More information4.6 Linear Programming duality
4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal
More informationYou must have: Ruler graduated in centimetres and millimetres, protractor, compasses, pen, HB pencil, eraser, calculator. Tracing paper may be used.
Write your name here Surname Other names Pearson Edexcel Certificate Pearson Edexcel International GCSE Mathematics A Paper 4H Centre Number Monday 1 January 015 Afternoon Time: hours Candidate Number
More informationby the matrix A results in a vector which is a reflection of the given
Eigenvalues & Eigenvectors Example Suppose Then So, geometrically, multiplying a vector in by the matrix A results in a vector which is a reflection of the given vector about the y-axis We observe that
More informationThe Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
More informationAP CALCULUS AB 2008 SCORING GUIDELINES
AP CALCULUS AB 2008 SCORING GUIDELINES Question 1 Let R be the region bounded by the graphs of y = sin( π x) and y = x 4 x, as shown in the figure above. (a) Find the area of R. (b) The horizontal line
More informationSimilar matrices and Jordan form
Similar matrices and Jordan form We ve nearly covered the entire heart of linear algebra once we ve finished singular value decompositions we ll have seen all the most central topics. A T A is positive
More informationA Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,
More informationZeros of a Polynomial Function
Zeros of a Polynomial Function An important consequence of the Factor Theorem is that finding the zeros of a polynomial is really the same thing as factoring it into linear factors. In this section we
More information