Solving Curved Linear Programs via the Shadow Simplex Method

Size: px
Start display at page:

Download "Solving Curved Linear Programs via the Shadow Simplex Method"

Transcription

1 Solving Curved Linear rograms via the Shadow Simplex Method Daniel Dadush 1 Nicolai Hähnle 2 1 Centrum Wiskunde & Informatica (CWI) 2 Bonn Universität CWI Scientific Meeting 01/15

2 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 2 / 24

3 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 3 / 24

4 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24

5 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24

6 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) c Amazingly versatile modeling language. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24

7 Linear rogramming Linear rogramming (L): linear constraints & linear objective with continuous variables. max c T x subject to Ax b, x R n (A has m rows, n columns) c Amazingly versatile modeling language. Generally provides a relaxed view of a desired optimization problem, but can be solved in polynomial time! D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 4 / 24

8 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24

9 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24

10 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 One of the most successful modeling language for many real world applications. While instances can be extremely hard to solve (MI is N-hard), many practical instances are not. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24

11 Mixed Integer rogramming Mixed Integer rogramming (MI): models both continuous and discrete choices. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 Many sophisticated software packages exist for these models (CLEX, Gurobi, etc.). MI solving is now considered a mature and practical technology. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 5 / 24

12 Sample Applications Routing delivery / pickup trucks for customers. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 6 / 24

13 Sample Applications Optimizing supply chain logistics. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 6 / 24

14 Standard Framework for Solving MIs Relax integrality of the variables. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24

15 Standard Framework for Solving MIs Relax integrality of the variables. max c T x + d T y subject to Ax + By b, x R n 1, y Z n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24

16 Standard Framework for Solving MIs Relax integrality of the variables. max c T x + d T y subject to Ax + By b, x R n 1, y R n 2 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24

17 Standard Framework for Solving MIs Relax integrality of the variables. max c T x + d T y subject to Ax + By b, x R n 1, y R n 2 Solve the L. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24

18 Standard Framework for Solving MIs Relax integrality of the variables. max Solve the L. c T x + d T y subject to Ax + By b, x R n 1, y R n 2 Add extra constraints to tighten the L or guess the values of some of the integer variables. Repeat. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24

19 Standard Framework for Solving MIs Relax integrality of the variables. max Solve the L. c T x + d T y subject to Ax + By b, x R n 1, y R n 2 Add extra constraints to tighten the L or guess the values of some of the integer variables. Repeat. Need to solve a lot of Ls quickly. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 7 / 24

20 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

21 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 1 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

22 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 2 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

23 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 3 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

24 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 4 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

25 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 5 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

26 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 6 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

27 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 7 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

28 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n Simplex Method: move from vertex to vertex along the graph of until the optimal solution is found. v 8 c D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 8 / 24

29 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24

30 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? Easy to reoptimize when adding an extra constraint or variable. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24

31 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? Easy to reoptimize when adding an extra constraint or variable. Vertex solutions are often nice (e.g. sparse, easy to interpret). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24

32 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. Question Why is simplex so popular? Easy to reoptimize when adding an extra constraint or variable. Vertex solutions are often nice (e.g. sparse, easy to interpret). Simplex pivots implementable using simple linear algebra. Worst case O(mn) time per iteration. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 9 / 24

33 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 10 / 24

34 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! Simplex lower bounds: Klee-Minty (1972): designed deformed cubes, providing worst case examples for many pivot rules. Friedmann et al. (2011): systematically designed bad examples using Markov decision processes. In these examples, the pivot rule is tricked into taking an (sub)exponentially long path, even though short paths exists. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 10 / 24

35 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! Simplex upper bounds: Kalai (1992), Matousek-Sharir-Welzl ( ): Random facet rule requires 2 O( n log m) pivots on expectation. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 11 / 24

36 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! olynomial bounds for random or smoothed linear programs: Borgwardt (82), Smale (83), Adler (83), Todd (83), Haimovich (83), Meggido (86), Adler-Shamir-Karp (86,87), Spielman-Teng (01,04), Spielman-Deshpande (05), Spielman-Kelner (06), Vershynin (06) D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 11 / 24

37 Linear rogramming via the Simplex Method max c T x subject to Ax b, x R n A has n columns, m rows. roblem No known pivot rule is proven to converge in polynomial time!!! olynomial bounds for random or smoothed linear programs: Borgwardt (82), Smale (83), Adler (83), Todd (83), Haimovich (83), Meggido (86), Adler-Shamir-Karp (86,87), Spielman-Teng (01,04), Spielman-Deshpande (05), Spielman-Kelner (06), Vershynin (06) These works rely on the shadow simplex method. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 11 / 24

38 Linear rogramming and the Hirsch Conjecture = {x R n : Ax b}, A R m n lives in R n (ambient dimension is n) and has m constraints. Besides the computational efficiency of the simplex method, an even more basic question is not understood: Question How can we bound the length of paths on the graph of? I.e. how to bound the diameter of? D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 12 / 24

39 Linear rogramming and the Hirsch Conjecture = {x R n : Ax b}, A R m n lives in R n (ambient dimension is n) and has m constraints. Conjecture (olynomial Hirsch Conjecture) The diameter of is bounded by a polynomial in the dimension n and number of constraints m. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 13 / 24

40 Linear rogramming and the Hirsch Conjecture = {x R n : Ax b}, A R m n lives in R n (ambient dimension is n) and has m constraints. Conjecture (olynomial Hirsch Conjecture) The diameter of is bounded by a polynomial in the dimension n and number of constraints m. Diameter upper bounds: Barnette, Larman (1974): 1 3 2n 2 (m n ). Kalai, Kleitman (1992), Todd (2014): (m n) log n. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 13 / 24

41 Well-Conditioned olytopes = {x R n : Ax b}, A Z m n Definition (Bounded Subdeterminants) An integer matrix A has subdeterminants bounded by if every square submatrix B of A satisfies det(b). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 14 / 24

42 Well-Conditioned olytopes = {x R n : Ax b}, A Z m n Definition (Bounded Subdeterminants) An integer matrix A has subdeterminants bounded by if every square submatrix B of A satisfies det(b). Diameter Bound: Bonifas, Di Summa, Eisenbrand, Hähnle, Niemeier (2012): non-constructive O(n log n ) bound. Brunsch,Röglin (2013): shadow simplex method finds paths of length O(mn 3 4 ). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 14 / 24

43 Well-Conditioned olytopes = {x R n : Ax b}, A Z m n Definition (Bounded Subdeterminants) An integer matrix A has subdeterminants bounded by if every square submatrix B of A satisfies det(b). Diameter Bound: Bonifas, Di Summa, Eisenbrand, Hähnle, Niemeier (2012): non-constructive O(n log n ) bound. Brunsch,Röglin (2013): shadow simplex method finds paths of length O(mn 3 4 ). Optimization: Dyer, Frieze (1994): = 1 (totally unimodular) random walk simplex uses O(m 16 n 6 log(mn) 3 ) pivots. Eisenbrand, Vempala (2014): random walk simplex uses O(mpoly(n, )) pivots. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 14 / 24

44 Faster Shadow Simplex = {x R n : Ax b}, A Z m n Subdeterminants of A bounded by. Theorem (D., Hähnle 2014+) Diameter is bounded by O(n 3 2 ln(n )). Can solve L using O(n 5 2 ln(n )) pivots on expectation. Based on a new analysis and variant of the shadow simplex method. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 15 / 24

45 τ-wide olyhedra v 1 v 3 v 2 v 4 D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24

46 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 Normal cone at v is all objectives maximized at v. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24

47 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 N 1 N 3 N 4 Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24

48 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. is τ-wide if each normal cone contains a unit ball of radius τ centered on the unit sphere. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24

49 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. is τ-wide if each normal cone contains a unit ball of radius τ centered on the unit sphere. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24

50 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 has subdeterminant bound is τ-wide for τ = 1/(n ) 2. Normal cone at v is all objectives maximized at v. Normal fan is the set of normal cones. is τ-wide if each normal cone contains a unit ball of radius τ centered on the unit sphere. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 16 / 24

51 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 In 2 dimensions all interior angles are at most π 2τ, i.e. sharp. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 17 / 24

52 τ-wide olyhedra N 2 N 1 v 2 v 3 N 3 v 1 v 4 N 4 N 2 τ N 1 N 3 N 4 In 2 dimensions all interior angles are at most π 2τ, i.e. sharp. Theorem (D.-Hähnle 2014) If is τ-wide then the diameter of is bounded by O(n/τ ln(1/τ)). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 17 / 24

53 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 18 / 24

54 ivot Rule c v 1 c d v 3 v 2 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

55 ivot Rule c v 1 c d v 3 v 2 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

56 ivot Rule c d 1 v 1 c d v 2 v 3 v 4 d d 1 Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

57 ivot Rule c d d 1 v 2 v 3 v 1 v 4 d d 1 c Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

58 ivot Rule c d d 1 d 2 v 1 v d 1 2 d 2 v 3 v 4 d c Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

59 ivot Rule c v 1 c d d 2 v 2 v 3 v 4 d d 1 d 2 Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

60 ivot Rule c v 1 c d v 2 d 2 d 2 v 3 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

61 ivot Rule c v 1 c d v 3 v 2 v 4 d Move from v 1 to v 3 by following [c, d] through the normal fan. ivot steps correspond to crossing facets of the normal fan. Question How can we bound the number of intersections with the normal fan? D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 19 / 24

62 ivot Rule c v 1 c d v 2 v 3 v 4 d Question How can we bound the number of intersections with the normal fan? olynomial bounds for random and smoothed linear programs: Borgwardt (82), Smale (83), Adler (83), Todd (83), Haimovich (83), Meggido (86), Adler-Shamir-Karp (86,87), Spielman-Teng (01,04), Spielman-Deshpande (05), Spielman-Kelner (06), Vershynin (06) D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 20 / 24

63 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24

64 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24

65 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24

66 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. Theorem (D.-Hähnle 2014) Assume is an n-dimensional τ-wide polytope. hase (b). Expected number of crossings of [c + X, d + X ] with normal fan is O( c d /τ). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24

67 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. Theorem (D.-Hähnle 2014) Assume is an n-dimensional τ-wide polytope. hase (b). Expected number of crossings of [c + X, d + X ] with normal fan is O( c d /τ). hase (a+c). Expected number of crossings of [c + αx, c + X ] (same for d), for α (0, 1], with normal fan is O(n/τ ln(1/α)). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24

68 3-Step Shadow Simplex ath We use a 3-step shadow simplex path: c (a) c + X (b) d + X (c) d where X is distributed proportional to e x. c is an objective maximized at the starting vertex. d is the L objective function. Theorem (D.-Hähnle 2014) Assume is an n-dimensional τ-wide polytope. hase (b). Expected number of crossings of [c + X, d + X ] with normal fan is O( c d /τ). hase (a+c). Expected number of crossings of [c + αx, c + X ] (same for d), for α (0, 1], with normal fan is O(n/τ ln(1/α)). Main ingredient for all our results. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 21 / 24

69 Outline 1 Introduction Linear rogramming and its Applications The Simplex Method Results 2 The Shadow Simplex Method ivot Rule 3-Step Shadow Simplex ath 3 Conclusions D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 22 / 24

70 Navigation over the Voronoi Graph y t x Z Z + t Figure: Randomized Straight Line algorithm Closest Vector roblem (CV): Find closest lattice vector y to t. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 23 / 24

71 Navigation over the Voronoi Graph y t x Z Z + t Figure: Randomized Straight Line algorithm Closest Vector roblem (CV): Find closest lattice vector y to t. Can reduce CV to efficient navigation over the Voronoi graph (Sommer,Feder,Shalvi 09; Micciancio,Voulgaris 10-13). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 23 / 24

72 Navigation over the Voronoi Graph y t x Z Z + t Figure: Randomized Straight Line algorithm Closest Vector roblem (CV): Find closest lattice vector y to t. Can move between nearby lattice points using a polynomial number of steps (Bonifas, D. 14). D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 23 / 24

73 Summary New and simpler analysis and variant of the Shadow Simplex method. Improved diameter bounds and simplex algorithm for curved polyhedra. D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 24 / 24

74 Summary New and simpler analysis and variant of the Shadow Simplex method. Improved diameter bounds and simplex algorithm for curved polyhedra. Thank you! D. Dadush, N. Hähnle Shadow Simplex Scientific Meeting 24 / 24

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the

More information

arxiv:1203.1525v1 [math.co] 7 Mar 2012

arxiv:1203.1525v1 [math.co] 7 Mar 2012 Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined

More information

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming

More information

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued. Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.

More information

Actually Doing It! 6. Prove that the regular unit cube (say 1cm=unit) of sufficiently high dimension can fit inside it the whole city of New York.

Actually Doing It! 6. Prove that the regular unit cube (say 1cm=unit) of sufficiently high dimension can fit inside it the whole city of New York. 1: 1. Compute a random 4-dimensional polytope P as the convex hull of 10 random points using rand sphere(4,10). Run VISUAL to see a Schlegel diagram. How many 3-dimensional polytopes do you see? How many

More information

Can linear programs solve NP-hard problems?

Can linear programs solve NP-hard problems? Can linear programs solve NP-hard problems? p. 1/9 Can linear programs solve NP-hard problems? Ronald de Wolf Linear programs Can linear programs solve NP-hard problems? p. 2/9 Can linear programs solve

More information

Transportation Polytopes: a Twenty year Update

Transportation Polytopes: a Twenty year Update Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

NP-Hardness Results Related to PPAD

NP-Hardness Results Related to PPAD NP-Hardness Results Related to PPAD Chuangyin Dang Dept. of Manufacturing Engineering & Engineering Management City University of Hong Kong Kowloon, Hong Kong SAR, China E-Mail: mecdang@cityu.edu.hk Yinyu

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2 4. Basic feasible solutions and vertices of polyhedra Due to the fundamental theorem of Linear Programming, to solve any LP it suffices to consider the vertices (finitely many) of the polyhedron P of the

More information

Factoring. Factoring 1

Factoring. Factoring 1 Factoring Factoring 1 Factoring Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and RSA is broken o Rabin cipher also based on factoring Factoring like

More information

4.1 Learning algorithms for neural networks

4.1 Learning algorithms for neural networks 4 Perceptron Learning 4.1 Learning algorithms for neural networks In the two preceding chapters we discussed two closely related models, McCulloch Pitts units and perceptrons, but the question of how to

More information

1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.

1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where. Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S

More information

17.3.1 Follow the Perturbed Leader

17.3.1 Follow the Perturbed Leader CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.

More information

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

Binary Image Reconstruction

Binary Image Reconstruction A network flow algorithm for reconstructing binary images from discrete X-rays Kees Joost Batenburg Leiden University and CWI, The Netherlands kbatenbu@math.leidenuniv.nl Abstract We present a new algorithm

More information

Equilibrium computation: Part 1

Equilibrium computation: Part 1 Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS. 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method

LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS. 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method Introduction to dual linear program Given a constraint matrix A, right

More information

GRADES 7, 8, AND 9 BIG IDEAS

GRADES 7, 8, AND 9 BIG IDEAS Table 1: Strand A: BIG IDEAS: MATH: NUMBER Introduce perfect squares, square roots, and all applications Introduce rational numbers (positive and negative) Introduce the meaning of negative exponents for

More information

Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.

Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

3. Evaluate the objective function at each vertex. Put the vertices into a table: Vertex P=3x+2y (0, 0) 0 min (0, 5) 10 (15, 0) 45 (12, 2) 40 Max

3. Evaluate the objective function at each vertex. Put the vertices into a table: Vertex P=3x+2y (0, 0) 0 min (0, 5) 10 (15, 0) 45 (12, 2) 40 Max SOLUTION OF LINEAR PROGRAMMING PROBLEMS THEOREM 1 If a linear programming problem has a solution, then it must occur at a vertex, or corner point, of the feasible set, S, associated with the problem. Furthermore,

More information

Linear Programming Problems

Linear Programming Problems Linear Programming Problems Linear programming problems come up in many applications. In a linear programming problem, we have a function, called the objective function, which depends linearly on a number

More information

Linear Programming I

Linear Programming I Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins

More information

Linear Algebra Notes

Linear Algebra Notes Linear Algebra Notes Chapter 19 KERNEL AND IMAGE OF A MATRIX Take an n m matrix a 11 a 12 a 1m a 21 a 22 a 2m a n1 a n2 a nm and think of it as a function A : R m R n The kernel of A is defined as Note

More information

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

Chapter 19. General Matrices. An n m matrix is an array. a 11 a 12 a 1m a 21 a 22 a 2m A = a n1 a n2 a nm. The matrix A has n row vectors

Chapter 19. General Matrices. An n m matrix is an array. a 11 a 12 a 1m a 21 a 22 a 2m A = a n1 a n2 a nm. The matrix A has n row vectors Chapter 9. General Matrices An n m matrix is an array a a a m a a a m... = [a ij]. a n a n a nm The matrix A has n row vectors and m column vectors row i (A) = [a i, a i,..., a im ] R m a j a j a nj col

More information

Programme doctoral en recherche opérationnelle

Programme doctoral en recherche opérationnelle Programme doctoral en recherche opérationnelle Zinal Seminar 2012, January 15-19 Sunday 15 Monday 16 Tuesday 17 Wednesday 18 Thursday 19 08:30-09:00 09:00-09:30 09:30-10:00 10:00-10:30 10:30-11:00 11:00-11:30

More information

The number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72.

The number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72. ADVANCED SUBSIDIARY GCE UNIT 4736/01 MATHEMATICS Decision Mathematics 1 THURSDAY 14 JUNE 2007 Afternoon Additional Materials: Answer Booklet (8 pages) List of Formulae (MF1) Time: 1 hour 30 minutes INSTRUCTIONS

More information

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)

More information

7 Gaussian Elimination and LU Factorization

7 Gaussian Elimination and LU Factorization 7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method

More information

This exposition of linear programming

This exposition of linear programming Linear Programming and the Simplex Method David Gale This exposition of linear programming and the simplex method is intended as a companion piece to the article in this issue on the life and work of George

More information

MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued).

MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued). MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors Jordan canonical form (continued) Jordan canonical form A Jordan block is a square matrix of the form λ 1 0 0 0 0 λ 1 0 0 0 0 λ 0 0 J = 0

More information

Optimization Modeling for Mining Engineers

Optimization Modeling for Mining Engineers Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2

More information

Numerical Methods I Eigenvalue Problems

Numerical Methods I Eigenvalue Problems Numerical Methods I Eigenvalue Problems Aleksandar Donev Courant Institute, NYU 1 donev@courant.nyu.edu 1 Course G63.2010.001 / G22.2420-001, Fall 2010 September 30th, 2010 A. Donev (Courant Institute)

More information

with functions, expressions and equations which follow in units 3 and 4.

with functions, expressions and equations which follow in units 3 and 4. Grade 8 Overview View unit yearlong overview here The unit design was created in line with the areas of focus for grade 8 Mathematics as identified by the Common Core State Standards and the PARCC Model

More information

What is Linear Programming?

What is Linear Programming? Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to

More information

Solutions to old Exam 1 problems

Solutions to old Exam 1 problems Solutions to old Exam 1 problems Hi students! I am putting this old version of my review for the first midterm review, place and time to be announced. Check for updates on the web site as to which sections

More information

Lecture 3: Linear methods for classification

Lecture 3: Linear methods for classification Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,

More information

Chapter 10: Network Flow Programming

Chapter 10: Network Flow Programming Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

The Quadratic Sieve Factoring Algorithm

The Quadratic Sieve Factoring Algorithm The Quadratic Sieve Factoring Algorithm Eric Landquist MATH 488: Cryptographic Algorithms December 14, 2001 1 Introduction Mathematicians have been attempting to find better and faster ways to factor composite

More information

Solving polynomial least squares problems via semidefinite programming relaxations

Solving polynomial least squares problems via semidefinite programming relaxations Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose

More information

Lecture Notes to Accompany. Scientific Computing An Introductory Survey. by Michael T. Heath. Chapter 10

Lecture Notes to Accompany. Scientific Computing An Introductory Survey. by Michael T. Heath. Chapter 10 Lecture Notes to Accompany Scientific Computing An Introductory Survey Second Edition by Michael T. Heath Chapter 10 Boundary Value Problems for Ordinary Differential Equations Copyright c 2001. Reproduction

More information

Optimization in ICT and Physical Systems

Optimization in ICT and Physical Systems 27. OKTOBER 2010 in ICT and Physical Systems @ Aarhus University, Course outline, formal stuff Prerequisite Lectures Homework Textbook, Homepage and CampusNet, http://kurser.iha.dk/ee-ict-master/tiopti/

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

How To Solve A K Path In Time (K)

How To Solve A K Path In Time (K) What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov

More information

Fast and Robust Normal Estimation for Point Clouds with Sharp Features

Fast and Robust Normal Estimation for Point Clouds with Sharp Features 1/37 Fast and Robust Normal Estimation for Point Clouds with Sharp Features Alexandre Boulch & Renaud Marlet University Paris-Est, LIGM (UMR CNRS), Ecole des Ponts ParisTech Symposium on Geometry Processing

More information

Chapter 17. Orthogonal Matrices and Symmetries of Space

Chapter 17. Orthogonal Matrices and Symmetries of Space Chapter 17. Orthogonal Matrices and Symmetries of Space Take a random matrix, say 1 3 A = 4 5 6, 7 8 9 and compare the lengths of e 1 and Ae 1. The vector e 1 has length 1, while Ae 1 = (1, 4, 7) has length

More information

SOLUTIONS. f x = 6x 2 6xy 24x, f y = 3x 2 6y. To find the critical points, we solve

SOLUTIONS. f x = 6x 2 6xy 24x, f y = 3x 2 6y. To find the critical points, we solve SOLUTIONS Problem. Find the critical points of the function f(x, y = 2x 3 3x 2 y 2x 2 3y 2 and determine their type i.e. local min/local max/saddle point. Are there any global min/max? Partial derivatives

More information

APPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder

APPM4720/5720: Fast algorithms for big data. Gunnar Martinsson The University of Colorado at Boulder APPM4720/5720: Fast algorithms for big data Gunnar Martinsson The University of Colorado at Boulder Course objectives: The purpose of this course is to teach efficient algorithms for processing very large

More information

Perron vector Optimization applied to search engines

Perron vector Optimization applied to search engines Perron vector Optimization applied to search engines Olivier Fercoq INRIA Saclay and CMAP Ecole Polytechnique May 18, 2011 Web page ranking The core of search engines Semantic rankings (keywords) Hyperlink

More information

Pennsylvania System of School Assessment

Pennsylvania System of School Assessment Pennsylvania System of School Assessment The Assessment Anchors, as defined by the Eligible Content, are organized into cohesive blueprints, each structured with a common labeling system that can be read

More information

Algebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions.

Algebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions. Chapter 1 Vocabulary identity - A statement that equates two equivalent expressions. verbal model- A word equation that represents a real-life problem. algebraic expression - An expression with variables.

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear

More information

Geometry and Measurement

Geometry and Measurement The student will be able to: Geometry and Measurement 1. Demonstrate an understanding of the principles of geometry and measurement and operations using measurements Use the US system of measurement for

More information

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2

IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2 IEOR 4404 Homework # Intro OR: Deterministic Models February 14, 011 Prof. Jay Sethuraman Page 1 of 5 Homework #.1 (a) What is the optimal solution of this problem? Let us consider that x 1, x and x 3

More information

H.Calculating Normal Vectors

H.Calculating Normal Vectors Appendix H H.Calculating Normal Vectors This appendix describes how to calculate normal vectors for surfaces. You need to define normals to use the OpenGL lighting facility, which is described in Chapter

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Integer Factorization using the Quadratic Sieve

Integer Factorization using the Quadratic Sieve Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract We give

More information

1 Determinants and the Solvability of Linear Systems

1 Determinants and the Solvability of Linear Systems 1 Determinants and the Solvability of Linear Systems In the last section we learned how to use Gaussian elimination to solve linear systems of n equations in n unknowns The section completely side-stepped

More information

Key words. Mixed-integer programming, mixing sets, convex hull descriptions, lot-sizing.

Key words. Mixed-integer programming, mixing sets, convex hull descriptions, lot-sizing. MIXING SETS LINKED BY BI-DIRECTED PATHS MARCO DI SUMMA AND LAURENCE A. WOLSEY Abstract. Recently there has been considerable research on simple mixed-integer sets, called mixing sets, and closely related

More information

Derive 5: The Easiest... Just Got Better!

Derive 5: The Easiest... Just Got Better! Liverpool John Moores University, 1-15 July 000 Derive 5: The Easiest... Just Got Better! Michel Beaudin École de Technologie Supérieure, Canada Email; mbeaudin@seg.etsmtl.ca 1. Introduction Engineering

More information

Using row reduction to calculate the inverse and the determinant of a square matrix

Using row reduction to calculate the inverse and the determinant of a square matrix Using row reduction to calculate the inverse and the determinant of a square matrix Notes for MATH 0290 Honors by Prof. Anna Vainchtein 1 Inverse of a square matrix An n n square matrix A is called invertible

More information

1 Error in Euler s Method

1 Error in Euler s Method 1 Error in Euler s Method Experience with Euler s 1 method raises some interesting questions about numerical approximations for the solutions of differential equations. 1. What determines the amount of

More information

Minimally Infeasible Set Partitioning Problems with Balanced Constraints

Minimally Infeasible Set Partitioning Problems with Balanced Constraints Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of

More information

Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes

Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes Paper Reference(s) 6689/01 Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes Materials required for examination Nil Items included with

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

Factorization Methods: Very Quick Overview

Factorization Methods: Very Quick Overview Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.

More information

For example, estimate the population of the United States as 3 times 10⁸ and the

For example, estimate the population of the United States as 3 times 10⁸ and the CCSS: Mathematics The Number System CCSS: Grade 8 8.NS.A. Know that there are numbers that are not rational, and approximate them by rational numbers. 8.NS.A.1. Understand informally that every number

More information

LECTURE: INTRO TO LINEAR PROGRAMMING AND THE SIMPLEX METHOD, KEVIN ROSS MARCH 31, 2005

LECTURE: INTRO TO LINEAR PROGRAMMING AND THE SIMPLEX METHOD, KEVIN ROSS MARCH 31, 2005 LECTURE: INTRO TO LINEAR PROGRAMMING AND THE SIMPLEX METHOD, KEVIN ROSS MARCH 31, 2005 DAVID L. BERNICK dbernick@soe.ucsc.edu 1. Overview Typical Linear Programming problems Standard form and converting

More information

Mathematical finance and linear programming (optimization)

Mathematical finance and linear programming (optimization) Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may

More information

Modélisation et résolutions numérique et symbolique

Modélisation et résolutions numérique et symbolique Modélisation et résolutions numérique et symbolique via les logiciels Maple et Matlab Jeremy Berthomieu Mohab Safey El Din Stef Graillat Mohab.Safey@lip6.fr Outline Previous course: partial review of what

More information

26 Linear Programming

26 Linear Programming The greatest flood has the soonest ebb; the sorest tempest the most sudden calm; the hottest love the coldest end; and from the deepest desire oftentimes ensues the deadliest hate. Th extremes of glory

More information

1 Review of Least Squares Solutions to Overdetermined Systems

1 Review of Least Squares Solutions to Overdetermined Systems cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares

More information

MATH 551 - APPLIED MATRIX THEORY

MATH 551 - APPLIED MATRIX THEORY MATH 55 - APPLIED MATRIX THEORY FINAL TEST: SAMPLE with SOLUTIONS (25 points NAME: PROBLEM (3 points A web of 5 pages is described by a directed graph whose matrix is given by A Do the following ( points

More information

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar

More information

The Fourth International DERIVE-TI92/89 Conference Liverpool, U.K., 12-15 July 2000. Derive 5: The Easiest... Just Got Better!

The Fourth International DERIVE-TI92/89 Conference Liverpool, U.K., 12-15 July 2000. Derive 5: The Easiest... Just Got Better! The Fourth International DERIVE-TI9/89 Conference Liverpool, U.K., -5 July 000 Derive 5: The Easiest... Just Got Better! Michel Beaudin École de technologie supérieure 00, rue Notre-Dame Ouest Montréal

More information

Linearly Independent Sets and Linearly Dependent Sets

Linearly Independent Sets and Linearly Dependent Sets These notes closely follow the presentation of the material given in David C. Lay s textbook Linear Algebra and its Applications (3rd edition). These notes are intended primarily for in-class presentation

More information

Content. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11

Content. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11 Content Credits 11 Chapter 1 Arithmetic Refresher 13 1.1 Algebra 14 Real Numbers 14 Real Polynomials 19 1.2 Equations in one variable 21 Linear Equations 21 Quadratic Equations 22 1.3 Exercises 28 Chapter

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

Pre-Algebra 2008. Academic Content Standards Grade Eight Ohio. Number, Number Sense and Operations Standard. Number and Number Systems

Pre-Algebra 2008. Academic Content Standards Grade Eight Ohio. Number, Number Sense and Operations Standard. Number and Number Systems Academic Content Standards Grade Eight Ohio Pre-Algebra 2008 STANDARDS Number, Number Sense and Operations Standard Number and Number Systems 1. Use scientific notation to express large numbers and small

More information

4.6 Linear Programming duality

4.6 Linear Programming duality 4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

More information

You must have: Ruler graduated in centimetres and millimetres, protractor, compasses, pen, HB pencil, eraser, calculator. Tracing paper may be used.

You must have: Ruler graduated in centimetres and millimetres, protractor, compasses, pen, HB pencil, eraser, calculator. Tracing paper may be used. Write your name here Surname Other names Pearson Edexcel Certificate Pearson Edexcel International GCSE Mathematics A Paper 4H Centre Number Monday 1 January 015 Afternoon Time: hours Candidate Number

More information

by the matrix A results in a vector which is a reflection of the given

by the matrix A results in a vector which is a reflection of the given Eigenvalues & Eigenvectors Example Suppose Then So, geometrically, multiplying a vector in by the matrix A results in a vector which is a reflection of the given vector about the y-axis We observe that

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:

More information

AP CALCULUS AB 2008 SCORING GUIDELINES

AP CALCULUS AB 2008 SCORING GUIDELINES AP CALCULUS AB 2008 SCORING GUIDELINES Question 1 Let R be the region bounded by the graphs of y = sin( π x) and y = x 4 x, as shown in the figure above. (a) Find the area of R. (b) The horizontal line

More information

Similar matrices and Jordan form

Similar matrices and Jordan form Similar matrices and Jordan form We ve nearly covered the entire heart of linear algebra once we ve finished singular value decompositions we ll have seen all the most central topics. A T A is positive

More information

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,

More information

Zeros of a Polynomial Function

Zeros of a Polynomial Function Zeros of a Polynomial Function An important consequence of the Factor Theorem is that finding the zeros of a polynomial is really the same thing as factoring it into linear factors. In this section we

More information