# Integrating Benders decomposition within Constraint Programming

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien École des Mines de Nantes, LINA CNRS FRE rue Alfred Kastler BP F Nantes Cedex 3, France 1 Introduction Benders decomposition [1] is a solving strategy based on the separation of the variables of the problem. It is often introduced as a basis for models and techniques using the complementary strengths of constraint programming and optimization techniques. Hybridization schemes have appeared recently and provided interesting computational results [4, 5, 7, 8]. They have been extended [2, 3, 6] to take into account other kinds of sub-problems and not only the classical linear programming ones. However, decomposition has never been proposed to our knowledge in a generic constraint programming approach. This paper discusses the way a decomposition framework could be embedded in a constraint solver, taking advantage of structures for a non expert user. We explore the possibility of deriving logic Benders cuts using an explanation-based framework for CP and describe Benders decomposition as a nogood recording strategy. We propose a tool implemented at the top of an explained constraint solver that could offer such a systematic decomposition framework. 2 Context Explanations for constraint programming. An explanation records information to justify a decision of the solver as a domain reduction or a contradiction. It is made of a set of constraints C (a subset of the original constraints) and a set of decisions dc 1, dc 2,... dc n taken during search. An explanation of the removal of value a from variable v, expl(v a) will be written C dc 1 dc 2 dc n v a. An explanation is computed for any contradiction during the search and intelligent backtracking algorithms that question a relevant decision appearing in the conflict are then conceivable. Principles of Benders decomposition. Benders decomposition can be seen as a form of learning from mistakes. It is based on a partition of the variables into two sets: x, y. The strategy can be applied to a problem of the form P : P : Min f(y) + cx SP : Min cx DSP : Max u(a g(y)) s.t : g(y) + Ax a s.t : Ax a g(y) s.t : ua c with : y D, x 0 with : x 0 with : u 0

2 A master problem considers only the y variables. A sub-problem (SP) tries to complete the assignment on x. If it is possible, the problem is solved, but if not, a cut (a constraint rejecting at least the current assignment on y) is produced and added to the master problem: it is called a Benders cut. This cut is the key point of the method, it has the form z h(y) (z represents the objective function z = f(y) + cx) and is inferred by the dual of the subproblem (DSP). So, even if the cut is derived from a particular y, it is valid for all y and excludes a large class of assignments. From all of this, it can be noticed that duals variables or multipliers 1 need to be defined to apply the decomposition. However, a generalized scheme has been proposed in 1972 by Goeffrion [2]. Hooker [3] proposed also to enlarge the classical notion of dual by introducing an inference dual available for all kinds of sub-problems. They suggest a different way of thinking about duality: a Benders decomposition based on logic. For a discrete satisfaction problem, the resolution of the dual consists in computing the infeasibility proof and determining under what conditions the proof remains valid: this is exactly what explanations are designed for. 3 A decomposition approach in CP In this paper, we consider problems which can be represented by P : P : Min obj MP : Min z SP k : Min sz k s.t : Ct(x, y) s.t : Ct i (x, y) s.t : Ct(x k, y) with : x D x, y D y z < z x k D x y D y Ct(x, y) denotes a set of constraints on variables x, y and obj can be equal to {f(x, y), f(y), 0}. The problem P will be denoted {P xy, P y, P 0 } according to the corresponding objective functions. The decomposition scheme is done among x and y. We suppose that the remaining problem over x can be formulated using n sub-problems exhibiting strong intra-relationships and weak inter-relationships. Ideally, they should be as small and independent as possible to ensure the remaining sub-problem to be easy. So we make the assumption for the sub-problem to offer such an ideal (denoted by P ) or approximate structure (denoted P, so we get in the same way {P xy, P y, P 0}). Master problem and sub-problems have then the generic form MP and SP (where Ct i (x, y) is the union of Ct(x, y) and the benders cut gathered at iteration i). 3.1 Benders cuts as explanations The Benders cut is a logic expression over the y variables, generated from the sub-problem solution. The cut must ensure that the algorithm terminates and finds the optimal solution. At iteration k, the added Benders cut must have the following properties: 1 Referring to linear programming duality.

3 1. It is valid; it does not exclude any feasible solution over the x, y variables of the original problem (according to the current upper bound of z). 2. It must exclude at least the current instantiation y of the master that has been proved as sub-optimal or inconsistent (2) ensures the termination of the algorithm and (1) ensures optimality as the master problem is proved to remain a valid relaxation and to provide a lower bound of P. As the explanation is a subset of the decisions taken by the master, it excludes at least the current assignment. An empty set indicates an infeasible P whereas the complete set excludes only y. The explanation is proved to be valid as long as constraints compute valid explanations as they perform a valid pruning. Note that the structure of the dual is used through the explanation algorithms embedded within constraints. In fact, the computation of explanations is lazy 2. Therefore, such an inference dual provides an arbitrary 3 dual solution but not necessarily the optimal one. 3.2 Decomposition scheme One of the key point of Benders decomposition is to be able to derive a master problem that provides a valid lower bound for the original P. We used the following master problems for initial problems P y, P 0 and P xy : MP y : Min f(y) MP 0 : Min 0 MP xy : Min r(y) = relax(f(x, y)) s.t : Ct i (x, y) s.t : Ct i (x, y) s.t : Ct i (x, y) y D y y D y y D y One can notice here that MP y provides a valid lower bound as it is a relaxation of P y. It is also the case for P 0 as it is a satisfaction problem. However, it is not true in the general case of P xy where a specific master problem must be designed. In fact, a new objective function called r(y) defined on y variables and providing a lower bound has to be defined by the user. There are some cases where the original function is itself a relaxation (e.g. a coloring problem) but in a generic case, the master problem take the form of a feasibility problem where the cuts added can be seen as expl(z z ) z z. 4 A Benders decomposition algorithm for CP Figure 1 presents our algorithm 4. It has been implemented as a library of the Java version of the PaLM solver embedded within the choco (see constraints solver. The standard CP model is only enriched by indicating for each variable the problem to which it belongs (the master or the index of the sub-problem). 2 Not all possible explanations are computed when removing a value for scalability reasons. Only the one corresponding to the solver actual reasoning is kept. 3 It is also the case for linear duality as any dual solution is a bound for the primal. 4 Line 8 is used in the case of P 0 and P y whereas lines 5, 11, 13, and 14 concerns P xy. The case of P xy is not yet included.

4 input : an initial solution to the master problem y, (1) begin (2) repeat (3) Cut = (4) for each sub-problem spb k do (5) P xy : update upper bound of spb k with computeub(k) using {z, sz i, i < k}) (6) solve spb k on (y, x k ) to optimality (7) add its inconsistency (if spb k is infeasible)/optimality explanation to Cut (8) P 0, P y : spb k+1 = S i k,i>k spb i, with k, the last infeasible sub-problem. (9) endfor (10) if (Cut ) then (11) P xy : Cut = computecut(cut) (12) add all explanations Cut to the master problem (13) P xy : update the upper bound of z with computeub(0) using {z, sz 1,..., sz n}) (14) P xy : store (x, y) if it is an improving solution (15) solve the master problem to optimality (16) endif (17) until the master problem is infeasible W Cut = (18) P y, P 0, P 0, P y : the solution (y, x) is optimal if Cut = otherwise, P is infeasible. (19) P xy : the solution (y, x) is the optimal solution of P otherwise P is infeasible. (20) end Fig. 1. A Generic Benders algorithm for P 0, P y (P 0, P y) and P xy 4.1 Specific handling for problems P 0 and P y P 0 and P y are closely related because they both use satisfaction problems as subproblems. Backjumping algorithms are used to compute explanations (to provide dual informations) on the sub-problems. Moreover, the use of backjumping for the master is possible for P 0 (which is a traditional CSP) and allows the partial avoidance of thrashing on the master problem when adding the cuts. This is a response to Thorsteinsson [5] concerns about possible significant overhead due to redundant computations. Concerning approximated structures: at any iteration k, the next sub-problem k+1 considered is chosen according to the rule described line 8. So if one sub-problem is consistent, the next one starts from its solution and consider for branching the variables of both problems. Such a strategy hopes to benefit from the relative independency of sub-problems (it does not imply any overhead compared to solving one single sub-problem) to derive disjoint cuts. There is obviously a compromise between the time spent for solving subproblems and the accuracy of the retrieved information. 4.2 Specific handling for problem P xy To keep isolated sub-problems, we do not add the objective function as a constraint which could propagate from one sub-problem to another. Instead, we provide a way to compute the bound of one problem according to other known bounds (master and slaves) with an empty explanation. So the propagation is done at hand to only incriminate the master problem solution using:

5 computecut(explanation[] expls) (line 11): computes the explanation(s) to be added to the master according to the objective function. A sum would lead to a union among explanations for example; computeub(int k) (line 5,13): computes an upper bound on z k according to y and known z i with i < k. In the case k = 0 (the master problem) it computes the upper bound of the overall objective function z if every SP k was feasible. At each iteration, a lower bound is obtained once the master problem has been solved. The algorithm stops once the lower bound meets the upper bound computed after the slaves. One can notice that the upper bound does not necessarily follow a decreasing trend whereas the lower bound is only growing ensuring the termination of the algorithm as long as variables have finite domains. 5 Conclusion We have investigated in this paper how to derive logic Benders cuts using an explanation based framework for Constraint Programming. Accuracy of cuts using explanations is nevertheless questionnable. Indeed, remaining sub-problems are not polynomial (compared to a traditional MILP approach for Benders and assuming that LP is polynomial) and explanations constitute a weaker cut as a lazy computation is used. First experimental results using structured random binary problems show that Benders becomes advantageous in case of hard subproblems compared to a branching using the same structure information within a backjumping algorithm. Moreover, we believe that the presence of subset of variables exhibiting a strong impact over the whole problem could be efficiently used by such an approach. Our next step is to apply the technique on hard academical problems and we are currently investigating how hard latin square instances could be decomposed. References 1. J. F. Benders. Partitionning procedures for solving mixed-variables programming problems. Numerische Mathematik, 4: , A. M. Geoffrion. Generalized Benders Decomposition. Journal of Optimization Theory And Practice, Vol. 10, No. 4, J.N. Hooker and G. Ottosson. Logic-based benders decomposition. Mathematical Programming, 96:33 60, Vipul Jain and I. E. Grossmann. Algorithms for hybrid milp/cp models for a class of optimization problems. INFORMS Journal on Computing, 13: , Erlendur S. Thorsteinsson. Branch-and-check: A hybrid framework integrating mixed integer programming and constraint logic programming. In CP 01, John N. Hooker A Hybrid Method for Planning and Scheduling. In CP 04, pages , T. Benoist, E. Gaudin, and B. Rottembourg. Constraint programming contribution to benders decomposition: A case study. In CP 02, pages , H. Cambazard, P. E. Hladik, A. M. Déplanche, N. Jussien, and Y. Trinquet. Decomposition and learning for a real time task allocation problem. In CP 04, pages , 2004.

### Resource Allocation and Scheduling

Lesson 3: Resource Allocation and Scheduling DEIS, University of Bologna Outline Main Objective: joint resource allocation and scheduling problems In particular, an overview of: Part 1: Introduction and

### A Constraint Programming based Column Generation Approach to Nurse Rostering Problems

Abstract A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Fang He and Rong Qu The Automated Scheduling, Optimisation and Planning (ASAP) Group School of Computer Science,

### Discrete Optimization

Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using

### Tutorial: Operations Research in Constraint Programming

Tutorial: Operations Research in Constraint Programming John Hooker Carnegie Mellon University May 2009 Revised June 2009 May 2009 Slide 1 Motivation Benders decomposition allows us to apply CP and OR

### Minimize subject to. x S R

Chapter 12 Lagrangian Relaxation This chapter is mostly inspired by Chapter 16 of [1]. In the previous chapters, we have succeeded to find efficient algorithms to solve several important problems such

### Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

### Scheduling Home Hospice Care with Logic-based Benders Decomposition

Scheduling Home Hospice Care with Logic-based Benders Decomposition Aliza Heching Compassionate Care Hospice John Hooker Carnegie Mellon University CPAIOR 2016 Banff, Canada Home hospice care The Problem

### 24. The Branch and Bound Method

24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

### Recent improvements using constraint integer programming for resource allocation and scheduling

Recent improvements using constraint integer programming for resource allocation and scheduling Stefan Heinz 1,, Wen-Yang Ku 2, and J. Christopher Beck 2 1 Zuse Institute Berlin, Takustr. 7, 14195 Berlin,

### Toward Unification of Exact and Heuristic Optimization Methods

Toward Unification of Exact and Heuristic Optimization Methods J N Hooker Carnegie Mellon University jh38@andrewcmuedu Revised December 2012 Abstract This paper argues that many exact and heuristic methods

### 6. Mixed Integer Linear Programming

6. Mixed Integer Linear Programming Javier Larrosa Albert Oliveras Enric Rodríguez-Carbonell Problem Solving and Constraint Programming (RPAR) Session 6 p.1/40 Mixed Integer Linear Programming A mixed

### 4.6 Linear Programming duality

4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

### Global Multiprocessor Real-Time Scheduling as a Constraint Satisfaction Problem

Global Multiprocessor Real-Time Scheduling as a Constraint Satisfaction Problem Liliana Cucu-Grosean & Olivier Buffet INRIA Nancy Grand-Est 615 rue du Jardin Botanique 54600 Villers-lès-Nancy, France firstname.lastname@loria.fr

### Stanford University CS261: Optimization Handout 6 Luca Trevisan January 20, In which we introduce the theory of duality in linear programming.

Stanford University CS261: Optimization Handout 6 Luca Trevisan January 20, 2011 Lecture 6 In which we introduce the theory of duality in linear programming 1 The Dual of Linear Program Suppose that we

### Modelling for Constraint Programming

Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules CP Summer School 28 Implied Constraints Implied constraints are logical consequences of the set

### Y. Xiang, Constraint Satisfaction Problems

Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are

### Lecture 6: Approximation via LP Rounding

Lecture 6: Approximation via LP Rounding Let G = (V, E) be an (undirected) graph. A subset C V is called a vertex cover for G if for every edge (v i, v j ) E we have v i C or v j C (or both). In other

### Branch and Bound Methods

Branch and Bound Methods basic ideas and attributes unconstrained nonconvex optimization mixed convex-boolean optimization Prof. S. Boyd, EE364b, Stanford University Methods for nonconvex optimization

### Solving Mixed Integer Linear Programs Using Branch and Cut Algorithm

1 Solving Mixed Integer Linear Programs Using Branch and Cut Algorithm by Shon Albert A Project Submitted to the Graduate Faculty of North Carolina State University in Partial Fulfillment of the Requirements

### Section Notes 4. Duality, Sensitivity, Dual Simplex, Complementary Slackness. Applied Math 121. Week of February 28, 2011

Section Notes 4 Duality, Sensitivity, Dual Simplex, Complementary Slackness Applied Math 121 Week of February 28, 2011 Goals for the week understand the relationship between primal and dual programs. know

### A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,

Logic Cuts Generation in a Branch and Cut Framework for Location Problems Mara A. Osorio Lama School of Computer Science Autonomous University of Puebla, Puebla 72560 Mexico Rosalba Mujica Garca Abstract

### 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

### Using the Simplex Method in Mixed Integer Linear Programming

Integer Using the Simplex Method in Mixed Integer UTFSM Nancy, 17 december 2015 Using the Simplex Method in Mixed Integer Outline Mathematical Programming Integer 1 Mathematical Programming Optimisation

### max cx s.t. Ax c where the matrix A, cost vector c and right hand side b are given and x is a vector of variables. For this example we have x

Linear Programming Linear programming refers to problems stated as maximization or minimization of a linear function subject to constraints that are linear equalities and inequalities. Although the study

### THEORY OF SIMPLEX METHOD

Chapter THEORY OF SIMPLEX METHOD Mathematical Programming Problems A mathematical programming problem is an optimization problem of finding the values of the unknown variables x, x,, x n that maximize

### Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

### 1 Polyhedra and Linear Programming

CS 598CSC: Combinatorial Optimization Lecture date: January 21, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im 1 Polyhedra and Linear Programming In this lecture, we will cover some basic material

### 3. Linear Programming and Polyhedral Combinatorics

Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the

### Lecture 7 - Linear Programming

COMPSCI 530: Design and Analysis of Algorithms DATE: 09/17/2013 Lecturer: Debmalya Panigrahi Lecture 7 - Linear Programming Scribe: Hieu Bui 1 Overview In this lecture, we cover basics of linear programming,

### Extended Abstract of the Doctoral Thesis: The Complexity and Expressive Power of Valued Constraints

Extended Abstract of the Doctoral Thesis: The Complexity and Expressive Power of Valued Constraints Stanislav Živný 1 Introduction Constraint programming is a powerful paradigm for solving combinatorial

### Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach

MASTER S THESIS Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach PAULINE ALDENVIK MIRJAM SCHIERSCHER Department of Mathematical

### 2.3 Convex Constrained Optimization Problems

42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

### Definition of a Linear Program

Definition of a Linear Program Definition: A function f(x 1, x,..., x n ) of x 1, x,..., x n is a linear function if and only if for some set of constants c 1, c,..., c n, f(x 1, x,..., x n ) = c 1 x 1

### INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models

Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is

### Convex Programming Tools for Disjunctive Programs

Convex Programming Tools for Disjunctive Programs João Soares, Departamento de Matemática, Universidade de Coimbra, Portugal Abstract A Disjunctive Program (DP) is a mathematical program whose feasible

### Clustering and scheduling maintenance tasks over time

Clustering and scheduling maintenance tasks over time Per Kreuger 2008-04-29 SICS Technical Report T2008:09 Abstract We report results on a maintenance scheduling problem. The problem consists of allocating

### Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

### Chapter 13: Binary and Mixed-Integer Programming

Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:

### Week 5 Integral Polyhedra

Week 5 Integral Polyhedra We have seen some examples 1 of linear programming formulation that are integral, meaning that every basic feasible solution is an integral vector. This week we develop a theory

### EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has

### Discrete (and Continuous) Optimization Solutions of Exercises 1 WI4 131

Discrete (and Continuous) Optimization Solutions of Exercises 1 WI4 131 Kees Roos Technische Universiteit Delft Faculteit Informatietechnologie en Systemen Afdeling Informatie, Systemen en Algoritmiek

### The Bi-Objective Pareto Constraint

The Bi-Objective Pareto Constraint Renaud Hartert and Pierre Schaus UCLouvain, ICTEAM, Place Sainte Barbe 2, 1348 Louvain-la-Neuve, Belgium {renaud.hartert,pierre.schaus}@uclouvain.be Abstract. Multi-Objective

### The Conference Call Search Problem in Wireless Networks

The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

### An Exact Algorithm for Steiner Tree Problem on Graphs

International Journal of Computers, Communications & Control Vol. I (2006), No. 1, pp. 41-46 An Exact Algorithm for Steiner Tree Problem on Graphs Milan Stanojević, Mirko Vujošević Abstract: The paper

### Nonlinear Optimization: Algorithms 3: Interior-point methods

Nonlinear Optimization: Algorithms 3: Interior-point methods INSEAD, Spring 2006 Jean-Philippe Vert Ecole des Mines de Paris Jean-Philippe.Vert@mines.org Nonlinear optimization c 2006 Jean-Philippe Vert,

### ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

### Sudoku as a SAT Problem

Sudoku as a SAT Problem Inês Lynce IST/INESC-ID, Technical University of Lisbon, Portugal ines@sat.inesc-id.pt Joël Ouaknine Oxford University Computing Laboratory, UK joel@comlab.ox.ac.uk Abstract Sudoku

### f(x) is a singleton set for all x A. If f is a function and f(x) = {y}, we normally write

Math 525 Chapter 1 Stuff If A and B are sets, then A B = {(x,y) x A, y B} denotes the product set. If S A B, then S is called a relation from A to B or a relation between A and B. If B = A, S A A is called

### Stochastic Inventory Control

Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

### 1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.

Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S

### AM 221: Advanced Optimization Spring Prof. Yaron Singer Lecture 7 February 19th, 2014

AM 22: Advanced Optimization Spring 204 Prof Yaron Singer Lecture 7 February 9th, 204 Overview In our previous lecture we saw the application of the strong duality theorem to game theory, and then saw

### Min-cost flow problems and network simplex algorithm

Min-cost flow problems and network simplex algorithm The particular structure of some LP problems can be sometimes used for the design of solution techniques more efficient than the simplex algorithm.

### Duality of linear conic problems

Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

### Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

### LINEAR PROGRAMMING P V Ram B. Sc., ACA, ACMA Hyderabad

LINEAR PROGRAMMING P V Ram B. Sc., ACA, ACMA 98481 85073 Hyderabad Page 1 of 19 Question: Explain LPP. Answer: Linear programming is a mathematical technique for determining the optimal allocation of resources

### A Tool for Generating Partition Schedules of Multiprocessor Systems

A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.

### Absolute Value Programming

Computational Optimization and Aplications,, 1 11 (2006) c 2006 Springer Verlag, Boston. Manufactured in The Netherlands. Absolute Value Programming O. L. MANGASARIAN olvi@cs.wisc.edu Computer Sciences

### Backdoors to Combinatorial Optimization: Feasibility and Optimality

Backdoors to Combinatorial Optimization: Feasibility and Optimality Bistra Dilkina, Carla P. Gomes, Yuri Malitsky 2, Ashish Sabharwal, and Meinolf Sellmann 2 Department of Computer Science, Cornell University,

### Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725

Duality in General Programs Ryan Tibshirani Convex Optimization 10-725/36-725 1 Last time: duality in linear programs Given c R n, A R m n, b R m, G R r n, h R r : min x R n c T x max u R m, v R r b T

### By W.E. Diewert. July, Linear programming problems are important for a number of reasons:

APPLIED ECONOMICS By W.E. Diewert. July, 3. Chapter : Linear Programming. Introduction The theory of linear programming provides a good introduction to the study of constrained maximization (and minimization)

### Measuring Rationality with the Minimum Cost of Revealed Preference Violations. Mark Dean and Daniel Martin. Online Appendices - Not for Publication

Measuring Rationality with the Minimum Cost of Revealed Preference Violations Mark Dean and Daniel Martin Online Appendices - Not for Publication 1 1 Algorithm for Solving the MASP In this online appendix

### 1 if 1 x 0 1 if 0 x 1

Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

### If the above problem is hard to solve, we might try to break it into smaller problems which are easier to solve.

8 Branch and Bound 8.1 Divide and Conquer uppose that we would like to solve the problem { } z = max c T x : x. If the above problem is hard to solve, we might try to break it into smaller problems which

### The multi-integer set cover and the facility terminal cover problem

The multi-integer set cover and the facility teral cover problem Dorit S. Hochbaum Asaf Levin December 5, 2007 Abstract The facility teral cover problem is a generalization of the vertex cover problem.

### 1 Unrelated Parallel Machine Scheduling

IIIS 014 Spring: ATCS - Selected Topics in Optimization Lecture date: Mar 13, 014 Instructor: Jian Li TA: Lingxiao Huang Scribe: Yifei Jin (Polishing not finished yet.) 1 Unrelated Parallel Machine Scheduling

### JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

### Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1

Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 J. Zhang Institute of Applied Mathematics, Chongqing University of Posts and Telecommunications, Chongqing

### Dimensioning an inbound call center using constraint programming

Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France ccanon@fr.snt.com

### Proximal mapping via network optimization

L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:

### Classification - Examples

Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking

### MAT2400 Analysis I. A brief introduction to proofs, sets, and functions

MAT2400 Analysis I A brief introduction to proofs, sets, and functions In Analysis I there is a lot of manipulations with sets and functions. It is probably also the first course where you have to take

Section 5.1 Climbing an Infinite Ladder Suppose we have an infinite ladder and the following capabilities: 1. We can reach the first rung of the ladder. 2. If we can reach a particular rung of the ladder,

### Optimization Theory for Large Systems

Optimization Theory for Large Systems LEON S. LASDON CASE WESTERN RESERVE UNIVERSITY THE MACMILLAN COMPANY COLLIER-MACMILLAN LIMITED, LONDON Contents 1. Linear and Nonlinear Programming 1 1.1 Unconstrained

### POWER SETS AND RELATIONS

POWER SETS AND RELATIONS L. MARIZZA A. BAILEY 1. The Power Set Now that we have defined sets as best we can, we can consider a sets of sets. If we were to assume nothing, except the existence of the empty

### Good luck, veel succes!

Final exam Advanced Linear Programming, May 7, 13.00-16.00 Switch off your mobile phone, PDA and any other mobile device and put it far away. No books or other reading materials are allowed. This exam

### A numerically adaptive implementation of the simplex method

A numerically adaptive implementation of the simplex method József Smidla, Péter Tar, István Maros Department of Computer Science and Systems Technology University of Pannonia 17th of December 2014. 1

### Integer programming solution methods - introduction

Integer programming solution methods - introduction J E Beasley Capital budgeting There are four possible projects, which each run for 3 years and have the following characteristics. Capital requirements

### Lecture 1: Linear Programming Models. Readings: Chapter 1; Chapter 2, Sections 1&2

Lecture 1: Linear Programming Models Readings: Chapter 1; Chapter 2, Sections 1&2 1 Optimization Problems Managers, planners, scientists, etc., are repeatedly faced with complex and dynamic systems which

Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

### Regression Using Support Vector Machines: Basic Foundations

Regression Using Support Vector Machines: Basic Foundations Technical Report December 2004 Aly Farag and Refaat M Mohamed Computer Vision and Image Processing Laboratory Electrical and Computer Engineering

### Exercise implies that V(I) = V(F ) for any generating set F of the ideal I. In the opposite direction we have a map

44 4. ALGEBRA-GEOMETRY CORRESPONDENCE 4.1. Ideal-variety correspondence The correspondence between algebra and geometry about to be discussed is the core of the area called algebraic geometry, which uses

### (Refer Slide Time: 1:41)

Discrete Mathematical Structures Dr. Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture # 10 Sets Today we shall learn about sets. You must

### Integration of ACO in a Constraint Programming Language

Integration of ACO in a Constraint Programming Language Madjid Khichane 12, Patrick Albert 1, and Christine Solnon 2 1 ILOG 2 LIRIS, UMR 5205 CNRS / University of Lyon ANTS 08 Motivations Ant Colony Optimization

### University of Potsdam Faculty of Computer Science. Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06

University of Potsdam Faculty of Computer Science Clause Learning in SAT Seminar Automatic Problem Solving WS 2005/06 Authors: Richard Tichy, Thomas Glase Date: 25th April 2006 Contents 1 Introduction

### Sets, Relations and Functions

Sets, Relations and Functions Eric Pacuit Department of Philosophy University of Maryland, College Park pacuit.org epacuit@umd.edu ugust 26, 2014 These notes provide a very brief background in discrete

### arxiv:math/ v1 [math.nt] 31 Mar 2002

arxiv:math/0204006v1 [math.nt] 31 Mar 2002 Additive number theory and the ring of quantum integers Melvyn B. Nathanson Department of Mathematics Lehman College (CUNY) Bronx, New York 10468 Email: nathansn@alpha.lehman.cuny.edu

### Determining Feasible Solution in Imprecise Linear Inequality Systems

Applied Mathematical Sciences, Vol. 2, 2008, no. 36, 1789-1797 Determining Feasible Solution in Imprecise Linear Inequality Systems A. A. Noura and F. H. Saljooghi Department of Mathematics Sistan and

### Linear Programming: Introduction

Linear Programming: Introduction Frédéric Giroire F. Giroire LP - Introduction 1/28 Course Schedule Session 1: Introduction to optimization. Modelling and Solving simple problems. Modelling combinatorial

### High-performance local search for planning maintenance of EDF nuclear park

High-performance local search for planning maintenance of EDF nuclear park Frédéric Gardi Karim Nouioua Bouygues e-lab, Paris fgardi@bouygues.com Laboratoire d'informatique Fondamentale - CNRS UMR 6166,

### Chap2: The Real Number System (See Royden pp40)

Chap2: The Real Number System (See Royden pp40) 1 Open and Closed Sets of Real Numbers The simplest sets of real numbers are the intervals. We define the open interval (a, b) to be the set (a, b) = {x

### TOPOLOGICAL PROOFS OF THE EXTREME AND INTERMEDIATE VALUE THEOREMS. Contents

TOPOLOGICAL PROOFS OF THE EXTREME AND INTERMEDIATE VALUE THEOREMS JAMES MURPHY Abstract. In this paper, I will present some elementary definitions in Topology. In particular, I will explain topological

### Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

### Mathematical finance and linear programming (optimization)

Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may

### Algorithms for Constraint Satisfaction Problems

MASARYK UNIVERSITY BRNO FACULTY OF INFORMATICS ' (*) J KL +-,/. 0213547698;:=A@ BDCFE!#" \$ %& G H I Algorithms for Constraint Satisfaction Problems Master Thesis Brno, April 2003 Kamil Veřmiřovský Acknowledgments

### Ri and. i=1. S i N. and. R R i

The subset R of R n is a closed rectangle if there are n non-empty closed intervals {[a 1, b 1 ], [a 2, b 2 ],..., [a n, b n ]} so that R = [a 1, b 1 ] [a 2, b 2 ] [a n, b n ]. The subset R of R n is an

### No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

### Geometry of Linear Programming

Chapter 2 Geometry of Linear Programming The intent of this chapter is to provide a geometric interpretation of linear programming problems. To conceive fundamental concepts and validity of different algorithms