Branch-and-Price for Service Network Design with Asset Management Constraints

Size: px
Start display at page:

Download "Branch-and-Price for Service Network Design with Asset Management Constraints"

Transcription

1 Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT

2 Branch-and-Price for Service Network Design with Asset Management Constraints Jardar Andersen 1,*, Roar Grønhaug 1, Marielle Christiansen 1, Teodor Gabriel Crainic 2 1 Deartment of Industrial Economics and Technology Management, Norwegian University of Science and Technology, 7491 Trondheim, Norway 2 Interuniversity Research Centre on Enterrise Networks, Logistics and Transortation (CIRRELT), and NSERC Industrial Research Chair on Logistics Management, Université du Québec à Montréal, C.P. 8888, succursale Centre-ville, Montréal, Canada H3C 3P8 Abstract. We resent a branch-and-rice algorithm for solving the service network design roblem with asset management constraints, SNDAM. The asset management constraints may result from vehicle management in alications from transortation. The roblem is a multicommodity network design roblem with additional constraints restricting and connecting the integer design variables. As a result of these constraints, design variables are cycles in a cyclic time-sace network, while the flow variables are aths in the same network. Searate subroblems generate design cycles and aths for commodity flows to the restricted master roblem. The comutational study shows that we are able to find near-otimal solutions for large network instances. Keywords. Service network design, branch-and-rice, column generation, vehicle management, asset management. Acknowledgements. This work has received financial suort from The Norwegian Research Council through the Polcorridor Logchain roject. Partial funding has also been sulied by the Natural Sciences and Engineering Research Council of Canada (NSERC) through its Discovery and Industrial Research Chair rograms. Results and views exressed in this ublication are the sole resonsibility of the authors and do not necessarily reflect those of CIRRELT. Les résultats et oinions contenus dans cette ublication ne reflètent as nécessairement la osition du CIRRELT et n'engagent as sa resonsabilité. * Corresonding author: jardar.andersen@iot.ntnu.no Déôt légal Bibliothèque nationale du Québec, Bibliothèque nationale du Canada, 2007 Coyright Andersen, Grønhaug, Christiansen, Crainic and CIRRELT, 2007

3 Introduction Imrovements in solution techniques and comutational caacity continuously increase the range of tractable otimization roblems. Simultaneously, real-world lanning roblems challenge the OR community to study increasingly larger and more comlex otimization roblems. New requirements from ractical alications result in new constraints that have to be modeled, and this also encourages develoment of solution methods that can solve the new models. In articular, there has recently been an increase in new service network design models for lanning roblems in transortation. What these models have in common is an increased focus on utilization and management of vehicles in addition to the traditional decisions on service selection and flow routing. One issue that has been studied in the literature is ensuring that there is an equal number of vehicles entering and leaving each node in the network. Constraints ensuring this are referred to as design balance constraints (Pedersen and Crainic, 2007). Design balance constraints have been modeled for various modes of transortation, see e.g. (Smilowitz et al., 2003), (Lai and Lo, 2004), (Barnhart and Schneur, 1996) and (Kim et al., 1999). Andersen et al. (2007a) introduce more asects of vehicle management in network design, including fleet sizing and -management. Andersen et al. (2007b) resent a framework for Service Network Design with Asset Management constraints (SNDAM), which is a richer roblem than the roblem studied in (Pedersen and Crainic, 2007). Asset is a generic term for something a erson or an organization owns. In carrier terms, it refers to what we usually call resources. It may be a ower unit (a tractor or a locomotive), a carrying unit (a railcar, a trailer, a truck, a shi, etc.), a loading/unloading unit (cranes in terminals), a crew, etc. The term asset management reflects that assets have to be managed intelligently in order to obtain efficient oerations. The SNDAM model of (Andersen et al., 2007b) addresses the case when only one asset is controlled, and to increase readability we refer to the assets as vehicles. The SNDAM model allows for cycles as design variables corresonding to vehicle rotations in time-sace networks, and the comutational study of (Andersen et al., 2007b) indicates that cycle variables contribute to efficient model solving. Cycle variables have also been imlemented for other roblems. For instance, Sigurd et al. (2005) work on a cycle reresentation of shi schedules in a icku and delivery roblem, and use column generation to generate schedules. Agarwal and Ergun (2006) introduce cycle variables for a cargo routing roblem in liner shiing, where cycles reresent shi schedules. They reort romising comutational results based on column generation and benders decomosition. The focus in (Andersen et al., 2007b) was on model develoment, as the main objective was to comare alternative SNDAM formulations. The comutational study was based on a riori enumeration of cycles and aths, which imoses huge memory requirements for larger instances, and the enumeration of cycles is imractical for large roblems. There is thus a need for more advanced solution strategies that can solve realistically-sized roblems of this character. The urose of this aer is to address the need for advanced solution methods for the SNDAM roblem that was resented in (Andersen et al., 2007b), and we therefore develo a tailormade branch-and-rice algorithm for the SNDAM roblem. A variable-fixing technique is introduced to enhance the erformance of the algorithm. We are able to find good integer solutions for roblems that are considerably larger than what was solved in (Andersen et al., 2007b). CIRRELT

4 The contribution of the aer is a tailormade solution aroach for the SNDAM roblem that can solve realistically-sized roblems. The comutational study indicates that the algorithms are able to roduce good integer solutions within reasonable comutational time. The algorithms thus lay the ground for imroved lanning of roblems where these additional constraints occur, for instance in service network design studies where fleet management is considered. The outline of this aer is as follows. In Section 1, we recall the SNDAM formulation. In Section 2, we roose a branch-and-rice algorithm for solving SNDAM. The comutational study is resented in Section 3, while concluding remarks follow in Section 4. 1 Service Network Design with Asset Management In this section we recall the service network design roblem with asset management constraints, SNDAM, that was resented in (Andersen et al., 2007b). A roblem descrition follows in Section 1.1, while we in Section 1.2 recall two SNDAM formulations from (Andersen et al., 2007b). 1.1 Problem descrition In the classical service network design formulation (see e.g. (Crainic, 2000)) we consider a set of services that may be oened to accommodate a demand for flow through the system. Major decisions are selection of services and routing of the flow on services. Crainic (2000) differentiated between frequency and dynamic service network design models. Frequency models address strategic/tactical issues like what services to oerate and how often to oerate them. Dynamic models target lanning of schedules and are tyically concerned with when services deart. The SNDAM model is develoed within a dynamic service network design setting. A given lanning horizon is assumed, and the services have to be oerated in a reetitive manner reresenting fixed schedules of realworld transortation services. Demand in the system is defined in terms of commodities (roducts) requiring transort through the network. Each commodity has an associated volume that has to be transorted from the commodity s origin node to its destination node. The commodities have secific times where they become available, but they may arrive at their destinations at any time, as long as they are transorted to their destinations within the length of the lanning horizon. Oeration of services requires vehicles, which are available in a limited quantity. There is thus a need to consider a set of vehicle management issues when the services are designed, which extend the formulations in (Crainic, 2000). Firstly, we have to make sure that for all terminals, there is an equal number of vehicles entering and leaving, referred to as vehicle balance or design balance. Moreover, there may not be more simultaneous activities taking lace than the given fleet of vehicles allow for. A third issue from (Andersen et al., 2007b) is the existence of lower and uer bounds on the number of occurrences of each service, for instance that a service should be oerated at least 3 times and at most 7 times each week. A fourth asect from (Andersen et al., 2007b) is limited durations of vehicle routes, which may be catured by a route length requirement. The idea is that vehicles should not have longer routes than the lanning horizon considered, as illustrated in Figure 1. In Figure 1, we have three vehicles oerating in a cyclic time-sace network, which is reresenting five terminals and a lanning horizon divided into seven time eriods. In Figure 1, design balance is satisfied for all nodes. However, we observe that the vehicles reresented with dotted arcs interchange the arcs they cover in every second realization of the lanning horizon. It thus takes two reetitions of the lanning CIRRELT

5 horizon for a vehicle to return to its initial attern. The oerations in Figure 1 reresented with dotted arcs will not be feasible if we imose route length requirements. However, the combination of solid arcs in Figure 1 reresents an oeration of a vehicle that satisfies the route length requirements. Time T MAX Nodes in hysical network Figure 1. Time-sace network with two two-horizon cycles and one 1-horizon cycle. In traditional service network design studies, one considers service selection cost associated with oeration of services, and flow costs associated for commodities utilizing services (Crainic, 2000). In the SNDAM roblem of (Andersen et al., 2007b), it is assumed that there are high fixed costs associated with vehicles, and that these costs dominate the service selection costs. This is based on a lanning roblem in the rail freight industry, where the acquisition costs for locomotives aeared to be the dominant cost factor. Inclusion of service selection costs would however not introduce any structural changes to the SNDAM models that we recall in the next subsection. 1.2 SNDAM models We assume that we have a static network G' = ( N ', A') with nodes reresenting terminals and intersections, and arcs reresenting connections. The lanning horizon is divided into a set of time eriods T= = { 1,.., TMAX}, and we introduce the grah G= ( NxA, ) for the time-sace network. A node i ' N ' in the static network hast MAX realizations in the time-sace network. Each of these nodes i N in the time-sace network has an associated time eriod, Ti T, and reresents a hysical node NOD i N '. The arcs (', i j') A ' in the static network are also available in TMAX realizations, one for each time eriod. We consider one reetition of the lanning horizon with time eriod TMAX receding time eriod 1, giving a cyclic time-sace network. In time-sace networks, holding arcs are required when modeling real-world lanning roblems. Holding arcs reresent vehicles or flow units ket at a static node from one time eriod to the next. In the following we assume that the models always have holding arcs for the flow, so that flow units may be ket at a hysical node from one time eriod to the next. Thus, the holding arcs link consecutive reresentations in time of the same hysical node. Holding arcs are assumed to have infinite caacity both for vehicles and for flow. We do not comlicate the model formulation with notation and variables for the holding arcs. CIRRELT

6 Without loss of generality we assume that all service arcs ( i, j) A are design arcs. To simlify the resentation, we assume that the arcs ( i', j') A ' reresent services, hence we do not consider services consisting of multile arcs. The different time realizations( i, j) A reresent alternative dearture times of the service connections (', i j') A '. Lower and uer bounds on the number of occurrences of each service are labeled Li' j' and U i' j', resectively. For the demand, we define for each commodity P the volume destination node d. w to be transorted from the commodity s origin node o to its In order to model the asset management constraints, we introduce vehicles v V, available in a quantity of V MAX = V. Any service arc that is oened has to utilize one of these vehicles. For each vehicle v V we introduce a binary decision variable δ v, which is 1 if vehicle v is utilized, and 0 otherwise. The cost for utilizing a vehicle is f. In classical service network design formulations, there are binary variables indicating whether a service arc is oened or not. In order to satisfy the route length requirements, these variables have to be indexed by vehicle in the SNDAM formulation, and are labeled y v. Flow variables x are nonnegative real numbers. Each design arc y v has an associated caacity u. For each unit of commodity there is a flow cost c for traversing arc (, i j) A. For each node we define sets + N () i = { j N :(, i j) A } and () i = { j :( j,) i } also define b min { w, u} N N A of outward and inward neighbors. We =. The SNDAM model is recalled in (1) (11): Min z = c x + f δ v (, i j) A P v V (1) (, i j) A : T t< T : i y j y v v + j N () i j N () i v V y v 1, δ = 0, v y = 0, L y U i' j' v i' j' (, i j) A: NOD = i' UNOD = j' v V i jiv j t T, v V, (2) i Nv, v V, (3) (, i j) A, v (4), (', i j') A ' v, (5) CIRRELT

7 w, i = o x x = w, i = d 0, otherwise, ji + j N () i j N () i P x x u y v v V b y v v V 0 P, i Nv, (6), (, i j) A, v (7) 0, (, i j) Av, P, (8) x 0, (, i j) Av, P, (9) v { 0,1} y, (, i j) A, v V, (10) v { 0,1} δ, v V. (11) The objective function (1) minimizes the sum of flow costs and costs associated with use of vehicles. Constraints (2) state that for each time eriod, if a vehicle is utilized, it should be engaged in one and only one activity, corresonding to the route length requirements. Constraints (3) are the vehicle balance constraints, stating that for each node, there is an equal number of vehicles entering and leaving. In constraints (4) we ensure that only one vehicle can oerate an arc ( i, j) A, which reflects the roerty that design arcs in traditional network design formulations are binary variables. In (5) we resent the lower and uer bounds on the number of occurrences of services while flow balance, as found in traditional network design formulations, is ensured in (6). Constraints (7) and (8) are weak and strong forcing constraints, resectively, where we need to aggregate over all vehicles used. Finally, variable-tye constraints are given in (9) (11). In (Andersen et al., 2007b), four different formulations of the SNDAM model were resented In this section we recall the formulation with design cycles and flow aths as decision variables, which in (Andersen et al., 2007b) roduced the most romising comutational results, and which was significantly faster solved than (1) (11). A design cycle consists of a set of design arcs satisfying design balance constraints (3) and covering each time eriod exactly once. The latter is a necessary condition for avoiding multi-lanning-horizon cycles, which would violate the route length requirements. The design variable g k for cycle k Kv is 1 if cycle k is in the solution and 0 k otherwise. Moreover, arameter m vis 1 if arc (, i j) A is in cycle k. The cycles have to cover all time eriods in the time-sace reresentation, as exemlified with the cycle indicated with solid arcs in Figure 1. As is frequently done in network design (see e.g. (Ahuja et al., 1993)), we further define the set of aths L that commodity may use from its origin node to its destination node. For these aths, we define arameters l a =1 if arc (, i j) A belongs to ath 0 otherwise. The flow of commodity on ath l is l h l L for commodity,, while the flow cost for transorting CIRRELT

8 commodity on ath l is l k, variables is recalled in (12) (20): Min z = k h + f g P l L l l k k K k = c a l l (, i j) A. The SNDAM model with cycle and ath (12) k K k K k g VMAX mg k k, 1, (, i j) A, (14) L mg U k k i' j' i' j' k K (, i j) A: NOD = i' UNOD = j' l L h l P l L l L a h = w a h, l l k k k K i u m g b m g l l k k k K j 0 (13), (', i j') A ' v, (15) P, (16), (, i j) A, v (17) 0, (, i j) Av, P, (18) l h 0, Pv, l L, (19) { 0,1} k g, k Kv. (20) The objective function (12) minimizes the sum of flow costs on aths and fixed costs for vehicles that are utilized. The structurally new constraint comared to model (1) (11) is (13). This constraint restricts the cycle selection, stating that the number of selected cycles is limited by the V = 1,.., VMAX =in model (1) (11). fleet of vehicles. This roerty was ensured by the size of set { } Constraints (14) state that each arc( i, j) A can be chosen by at most one cycle, analogous to (4). Lower and uer bounds on the number of realizations of static arcs are formulated in (15), and demand satisfaction is ensured in (16). Weak and strong forcing constraints are found in (17) and (18), while variable-tye constraints aear in (19) (20). Note that the introduction of cycles and aths has removed the need for design balance constraints (3) and flow balance constraints (6). Moreover, because each cycle corresonds to a vehicle and fleet size is accounted for in (13), we no longer need the binaryδ v variables. Magnanti and Wong (1984) show that the uncaacitated fixed charge network design roblem is NP-hard. As the caacitated version is even harder (Balakrishnan et al., 1997), this roblem also belongs to the class of NP-hard roblems. There is no reason to believe that the roblem becomes easier to solve when additional asset management constraints are introduced. CIRRELT

9 2 Solving SNDAM with branch-and-rice Among four formulations of the SNDAM model in (Andersen et al., 2007b), formulation (12) (20) aeared to be more easily solved than the other formulations. However, the comutational study was limited to instances that could be handled with a riori enumeration of cycles and aths. For real-world lanning roblems, comlete enumeration is imracticable. In this section we develo a branch-and-rice algorithm for the SNDAM roblem, consisting of a column generation algorithm embedded in a branch-and-bound framework. The algorithm is based on formulation (12) (20), and the columns that are generated are design cycles and flow aths. This branch-and-rice framework addresses the need for an exact solution algorithm that may solve real-world instances of the SNDAM roblem. Several toics in column generation are covered in (Desaulniers et al., 2005), and general introductions to branch-and-rice and column generation can be found in (Barnhart et al., 1998) and (Lübbecke and Desrosiers, 2005). We recall basic rinciles of column generation and branch-and-rice in Section 2.1. Sections are devoted to the solution of the linear relaxation of the roblem; we define the restricted master roblem in Section 2.2 and subroblems in Section 2.3 and 2.4, resectively. Asects of the branch-and-rice algorithm for the integer roblem are resented in Sections Branching strategies are discussed in Section 2.5, while strategies for obtaining lower and uer bounds are resented in Sections 2.6 and 2.7, resectively. 2.1 Branch-and-rice Column generation usually refers to the solution of a linear roblem, and for (mixed) integer roblems this may corresond to solving the linear relaxation of the underlying roblem. To obtain integer solutions, the column generation is embedded in a branch-and-bound framework. Because of the ricing of columns within the column generation at each branch-and-bound node, we refer to the overall aroach as branch-and-rice. In this subsection we recall the fundamentals of column generation and branch-and-rice Column generation Column generation is a owerful tool for solving otimization roblems with a huge number of variables. The basic rincile is to work on a restricted version of the roblem including all the rows, but only a subset of the variables. This restricted roblem is referred to as the Restricted Master Problem (RMP). The variables that are not exlicitly reresented in the RMP are considered imlicitly by evaluation of one or more subroblems (ricing roblems) that evaluate what imact it would have to include new variables in the RMP given the current solution of the RMP, and add variables to the RMP if that contributes to an imroved solution of the RMP. If no new variables will contribute to an imroved solution of the RMP, we can conclude that the existing solution of the RMP is the otimal (linear) solution of the original formulation. Because the variables occur as columns in the master roblem, this rocess is referred to as column generation. We sketch the column generation rocess in Figure 2. We first have to initialize the RMP with a feasible basis, and then dual rices are transferred to the subroblems. If the subroblems identify columns that would imrove the solution of the RMP, these columns are added to the RMP and the rocess is reeated. Otherwise, the rocess is ended and the current solution to the RMP is the otimal one. CIRRELT

10 Initialize with a feasible basis Solve restricted master roblem Transfer dual rices to subroblems Solve subroblems Imroving columns found? no Add columns to restricted master roblem yes Sto Figure 2. Flow chart for linear column generation Branch-and-rice algorithm We resent a branch-and-rice flowchart in Figure 3. We start by adding the linear relaxation of the initial roblem to a ool of unexlored nodes, this is the root node roblem. In a major iteration of the algorithm, one node is extracted from this ool and solved. If the solution is worse than the current uer bound, we fathom the node and extract a new node from the ool. Otherwise, we check whether the solution is integral. If so, we have a new uer bound, otherwise we have to branch to create new roblems that are added to the ool of unexlored nodes. The box in Figure 3 with thick bold frame contains the column generation algorithm illustrated in Figure 2. In other words, the column generation is run for each branch-and-bound node. If the ool of unexlored nodes is emty or if the lower bound is equal to the uer bound, the search is terminated. If the uer bound has been udated during the search, this is the otimal integer solution. Otherwise, no feasible integer solution exists. The lower bound is based on solution of the linear roblem, and the lower bound is initially set to the solution value of the first roblem solved (corresonding to the root node). Udates deend on the search strategy; with a best-first search the lower bound can be udated at each node. In contrast, with a deth-first strategy, the lower bound can only be udated each time the current to of the tree is reached after backtracking. We infer from the branch-and-rice literature (see e.g. (Lübbecke and Desrosiers, 2005)), that branching directly on the integer variables is not likely to succeed in branch-and-rice. If we for instance branch on the binary cycle variables in (12) (20), we fix the cycle to 1 in one branch and 0 in the other branch. In the branch with the cycle fixed to 0, that same column will immediately be regenerated, and we will not have reached further towards an integer solution. In addition, the search tree will be unbalanced. The standard branching technique in branch-and-rice is to branch on the underlying network structure, which for the SNDAM roblem means branching on network arcs. We elaborate on branching strategies in Section 2.5. CIRRELT

11 Add initial roblem to node ool Pool of nodes emty? yes no lower bound=uer bound? yes uer bound <? yes no No integer solution no Select a node from the ool Otimal integer solution = uer bound Solve linear relaxation by column generation and udate lower bound Sto Fathom node no Solution < uer bound? yes Udate uer bound yes Integer solution? no Branch to create child nodes and add them to node ool Figure 3. Flow-chart for branch-and-rice algorithm. 2.2 Restricted master roblem The restricted master roblem (RMP) is a linear relaxation of the SNDAM roblem with cycle and ath variables, formulated in (12) (20). However, in order to reduce the size of the matrix, we initially exclude the strong forcing constraints (18) from the formulation. For cycles and aths, we work on subsets from the total amount of cycles and aths; % K K and %L L, resectively. To obtain the linear relaxation we relace integrality constraints (20) with (20b). We also reformulate (15) to (15b) by introducing slack variables si' j' (', i j') A ', 0 si' j' ( Ui' j' Li' j' ). The RMP can be solved with commercial LP-solvers, but the solution times may be substantial for large instances. k K (, i j) A: NOD = i' UNOD = j' i j mg + s = U k k i ' j ' i ' j ', (', i j') A ' v, (15b) k 0 g 1, k k K. % (20b) CIRRELT

12 We associate dual variables α, β, θ i' j', σ, η and ρ with constraints (13) (14), (15b) and (16) (18). From the solution of the RMP, we transfer the dual information to subroblems for generation of design cycles and flow aths. There is one subroblem for each commodity generating flow aths, and one subroblem for design cycles. If the subroblems identify variables with negative reduced costs, these are added to the RMP which is resolved. Otherwise, the current solution of the RMP is an otimal solution for the linear roblem. Because we have two different subroblem categories, there are basically two different aroaches of the column generation. The first aroach is to solve both cycle and ath generation subroblems for a given set of dual multiliers before resolving the RMP. The second aroach is to generate either aths or cycles first, and then resolve the RMP before solving the other subroblem(s). Presumably, the second aroach would erform relatively better if the RMP is solved efficiently. In the next two subsections we define the two categories of subroblems. 2.3 Subroblem for design cycle generation A design cycle consists of a set of arcs satisfying the design balance constraints, and not covering a time eriod more than once. In the subroblem for generation of design cycles, we need to make sure that these roerties are maintained. The reduced cost of a cycle is calculated in (21), and a negative reduced cost imlies that inclusion of the cycle in the RMP would imrove the objective function value of the current RMP. The subroblem identifies the design cycle with smallest reduced cost, and this cycle is added to the RMP if its associated reduced cost is negative. The subroblem for cycle generation is formulated in (21) (24): Min z = f α β u η b ρ + θ y U C i' j' i' = NOD ' OD (, ) i j = N i j A P j (, i j) A : T t< T : i y j y 1, y = 0, + j N () i j N () i { 0,1} ji (21) t T, (22) i N, (23) y, (, i j) A. (24) We use binary variables y reresenting whether an arc( i, j) A in the underlying network is selected to be in the cycle or not. The objective function (21) minimizes the sum of fixed vehicle costs f and all dual cost of the arcs constituting a cycle. Constraints (22) ensure that cycles do not cover multile lanning horizons by stating that at most one arc can be oened in each time eriod. Constraints (23) are the design balance constraints, while (24) restrict the y s to take binary values. We solve the cycle generation roblem with shortest ath calculations using a label-correcting algorithm. We extend the time-sace network beyond the lanning horizon by the duration of the longest arc in the network. With the new network, we are able to roduce any feasible cycle by one CIRRELT

13 traversal of the network. The construction of cycles can be handled by two different hases that together cature all otential cycles. Firstly, if we start from all nodes in time eriod 1 and create aths through the network, we obtain cycles when we find arcs that have their destination node in the origin node of that ath, i.e. crossing the lanning horizon. If all arcs have duration of one time eriod, this aroach would be sufficient to generate all ossible cycles. However, for arcs with longer duration, we may have the case that arcs ass by time eriod 1, for instance if an arc has its origin in the last time eriod, asses the end of the lanning horizon and has its destination node in time eriod 2. This arc will not be evaluated with the aroach described above. In order to cature such arcs, we identify with the second aroach all arcs having the roerty that they ass by time eriod 1. We illustrate these ideas in Figure 4. Time Nodes in hysical network Planning horizon Figure 4. Illustration of cycle generation based on arcs originating in the first time eriod (solid arcs) and on cross-horizon arcs (dotted arcs) In Figure 4, solid arcs form cycles that are established from nodes in the first time eriod, while dotted arcs form cycles that are established based on the cross-horizon arcs that ass by time eriod 1. Because of constraints (22) we do not continue on the extension of a ath if the time eriod reresenting the origin node of the ath has been reached or assed. In the cycle generation, we have to be careful with alying dominance rules. The calculation of reduced costs in (21) includes all arcs constituting a cycle, including the last arc that closes a cycle, and we are therefore not able to aly dominance rules between aths with different origins. We therefore kee one label for each node belonging to time eriod 1, and one additional label for each node that has at least one arc emanating from it that asses by time eriod 1. In the end, this aroach is very well suited for roducing several cycles simultaneously. 2.4 Subroblems for flow ath generation The flow ath subroblems generate aths that contribute to imroved solutions of the current RMP. Requirements to aths are that they have their origins in the commodity s unique origin node in the time-sace network, node balance has to be ensured, and the aths have to end in one of the time realizations of the commodity s given hysical destination node. The subroblem for flow ath generation finds the origin-destination ath with smallest reduced cost, as defined in (25). This ath CIRRELT

14 is added to the RMP if the associated reduced cost is negative. The subroblem for generation of commodity aths for commodity is defined in (25) (27): ( ) Min z = σ + c η ρ x P (, i j) A (25) 1, i = o x x = 1, i = d 0, otherwise, ji + j N () i j N () i i Nv, (26) { 0,1} x, (, i j) Av. (27) The x variables are now binary variables reresenting flow on service arcs in the underlying network, and x = 1 indicates that arc (, i j) A is in the ath. The objective function (25) minimizes the sum of dual cost of the demand satisfaction constraints (16) and reduced costs for all arcs constituting the ath. Constraints (26) are flow balance constraints, while we in (27) restrict the variables to take binary values. Paths are established by shortest-ath comutations using label-correcting algorithms. Shortest aths are created from the commodity s unique origin node to the nodes in the time-sace network corresonding to the commodity s hysical destination node. In rincile, all these time realizations need to be examined in order to find the ath with the most negative reduced cost. However, as the costs on the arcs are ositive, we can terminate if the cost at any stage is higher than the comuted cost of reaching the current best destination node. Moreover, if ath costs exceed σ, we can sto evaluating that ath because it cannot result in a ath with negative reduced costs. 2.5 Branching strategies for the integer roblem In order to obtain integer solutions for the SNDAM roblem, we embed the column generation in a branch-and-bound framework, where the solution obtained from the linear relaxation of the roblem reresents the root node of a search tree. In this subsection we resent branching strategies for the roblem. As described in Section 2.1, it is not desirable to branch directly on the cycle variables. Instead we consider four alternative branching strategies. The first aroach (BB-1) is to branch on service arcs in the underlying network structure, i.e. arcs in the time-sace network. In evaluating the solutions of the RMP, we choose the arc with fractional value closest to 0.5, and fix this arc to 1 in one branch and to 0 in the other branch. The interretation of this branching is that fixing an arc to 1 means that the sum of the cycle variables using this arc is 1. In the 0-branch, all cycles using this arc have to be 0. The second aroach (BB-2) is an adatation of constraint branching (Ryan and Foster, 1981), where the basic rincile is to branch on two arcs, letting at most one of them be 1 in one branch, and both or none of them be 1 in the other branch. x CIRRELT

15 The third branching strategy (BB-3) is to use the slack variables solutions to (12)-(20), integrality of Ui' j' and of all r k also ensures integrality of the s i' j' from (15b). For integer si' j' variables. When we obtain fractional si' j' variables in the linear solution, we branch by identifying the s i ' j ' variable with fractional value closest to 0.5 and round it down to the nearest integer in one branch and round it u to the nearest integer in the other branch. However, even if all s i' j' are integer, we do not necessarily have integer values on the cycles. We therefore need to switch branching entity if all k s are integer, but the solution is not integer in the g variables. In such cases, we branch on the i' j' arcs in the underlying network structure, which was the first aroach. The last branching strategy (BB-4) is a cycle-based greedy heuristic. We select a fractional cycle and fix all the arcs in the cycle to 1, this allows for more flexibility than fixing the cycle itself to 1. This aroach is not a roer branching, because we would never consider cycles with a subset of the arcs that have been fixed further u in the tree, and would thus not cover the comlete solution sace. We refer to this aroach as heuristic branching. 2.6 Lower bounds Caacitated multicommodity network design roblems have in general oor linear relaxations. For SNDAM, it was shown in (Andersen et al., 2007b) that the introduction of cycle variables imroved the tightness of the linear relaxations. We therefore use the linear relaxation as the lower bound in the branch-and-rice aroach. However, in contrast to many other roblems that have been solved with column generation, even solving the linear roblem constitutes a significant challenge when the dimensions increase. The lower bounds for the SNDAM roblem are significantly tighter when they are based on the strong linear relaxation including strong forcing constraints (18), comared to the weak linear relaxation that is obtained when only weak forcing constraints (17) are included. For large networks with many arcs and commodities, the number of strong forcing constraints would grow extremely large if all of them were included exlicitly in the roblem. In order to overcome this difficulty, we generate dynamically those strong forcing constraints that are violated in the otimal solution of the RMP. To do this, we first solve the weak linear relaxation to otimality with column generation. Then, we verify whether strong forcing constraints are violated in the otimal linear solution, and if so, these are added to the formulation. Then the new roblem is solved to otimality with column generation, and the rocess is reeated if additional strong forcing constraints are needed. When no new strong forcing constraints are needed, we have obtained the strong linear relaxation. The drawback of this aroach is that we send time on testing if these constraints are violated and on reotimization after new constraints have been added. For large instances, these reotimizations may become comutationally exensive, and an imortant issue is thus to which degree strong forcing constraints should be generated. These constraints may be generated at all branch-and-bound nodes, at the root node only, each time the lower bound is udated, or none of these. To strengthen the bound, we introduce the following idea from a vehicle routing setting in (Dumas et al., 1991): The number of vehicles used has to be integer in an integer solution. If the linear solution has a fractional sum of design cycles, we round this fractional value u to the nearest integer, catured in (28) with m being the sum of cycle variables in the current LP solution. In addition, we introduce the comlement of (28) in (29), and round the fractional sum of cycle CIRRELT

16 variables down to the nearest integer. The effect of the strengthening with (28) and (29) is most significant if introduction of (29) imlies an infeasible roblem. k K k K g g k k m, m. (28) (29) 2.7 Uer bounds The uer bound is udated each time a new best integer solution is found. In order to encourage fathoming, it is of high imortance to obtain good integer solutions early in the traversal of the tree. We introduce an accelerating technique with the aim of finding integer solutions quickly and thus imrove the erformance of the branch-and-rice algorithm. k From the solution of the linear RMP, we fix to 1 cycle variables g with fractional values above a threshold. Then, new columns are generated until the solution of the RMP cannot be further k imroved. Again, the fractional g variables with values above the threshold are fixed to 1, and this rocedure is reeated until an integer solution has been found, the solution is worse than the current best integer solution, or the roblem becomes infeasible. 3 Comutational study In this section we resent a comutational study based on the branch-and-rice algorithm that was introduced in Section 2 for the SNDAM roblem. We have rogrammed the algorithms in C++, and the models have been solved on comuters with 3 GHz rocessor and 8 GB RAM running on Rock Cluster v oerating system. The restricted master roblems are solved with the LP-solver of XPRESS Otimizer v We first discuss imlementation and calibration issues in Section 3.1, before giving an introduction to the data sets used in Section 3.2. Comutational results aear in Section Imlementation and calibration In the comutational study, we exlore three different aroaches A, B and C, which are targeted at different instance sizes. One imortant difference between the aroaches is the role of strong forcing constraints. These constraints imrove the bound and may also contribute to better branching decisions, so it is desirable to include them. However, for large roblems, it is timeconsuming to solve even the linear version of the roblem if many constraints are added to the roblem. The rationale underlying imlementations A-C is that strong forcing constraints are generated more often for small instances. There are a significant number of arameter settings and issues that could be exlored in a comutational study, but we have ket a focus on the role of the strong forcing constraints in the imlementations. The three solution aroaches A-C are develoed through extensive testing in a calibration hase, and the arameter selections are based on what has been observed to give reasonable erformance over a set of instances. It was however not ossible to erform full-scale CIRRELT

17 testing of all combinations of the different arameters and issues. We summarize significant imlementation issues and arameter selections in Table 1. Table 1.Imlementation issues and arameter selections. Issues and arameters Solution aroach A Solution aroach B Solution aroach C Search strategy Deth first Maximum search time seconds How often is the master roblem solved All subroblems are solved for given dual information before the master roblem is resolved Strategy for solving RMP at each BB-node Save basis before adding columns, and reotimize with dual simlex from this basis when columns have been added to the roblem Max number of aths generated in each iteration One er commodity Branching strategies BB-3 (slack variables) / BB-3 (slack variables) BB-4 (heuristic) BB-4 (heuristic) Max and min values for fixing cycles to 1 in acc. technique 0.7 and and 0.55 Max number of cycles generated in each iteration 5* 10*/20*/30* How often are strong forcing constraints generated How long do we kee on generating strong forcing constraints at a node? All nodes Nodes where lower bounds are udated As long as they are violated Nodes where lower bounds are udated No new iterations after seconds or if imrovement < 0.1% Kee strong forcing constraints in roblem after generation? Yes No *In the accelerating technique at most one cycle may be added in each iteration For the three aroaches, we imlemented a deth-first strategy in branch-and-rice, and we have set a maximum running time of 10 hours (36000 seconds). In the comutations it aeared to be more efficient to solve all subroblems before reotimizing the RMP, so we do not reort results for the second aroach described in Section 2.2. In solving the RMP, we save the basis before adding columns, and when columns have been added, we reotimize with dual simlex from the saved basis. As ointed out in Sections 2.3 and 2.4, it is comutationally chea to add more than one cycle or ath when the subroblems are solved. There is a trade-off between the gains of saving iterations as a consequence of adding multile columns, versus the increased comutational time from having more columns in the master roblem. There are a significant amount of commodities in our data sets, and we therefore allow inclusion of at most one ath for each commodity in an iteration of the column generation. However, because of the many commodities, it makes sense to include multile cycles in each iteration if there are several cycles with negative reduced costs. We allow most cycles in solution aroach C, which is targeted at the instances with the largest number of commodities. For branching, the calibration hase indicated that branching on service arcs in the underlying network (BB-1) and constraint branching (BB-2) was outerformed by branching on slack variables (BB-3). The comutational study is therefore limited to branching strategies BB-3 and BB-4, where BB-4 is alied to the largest instances. For solution aroach A, we use branching strategy BB-3. For the variable fixing technique described in Section 2.7, the limit for fixing cycles is initially set to 0.7, and sequentially reduced to In each iteration of the column generation, at most 5 cycles may be added. Strong forcing CIRRELT

18 constraints are generated on all nodes, and we kee generating them as long as they are violated. The strong forcing constraints are also ket in the roblem at subsequent nodes. Solution aroach B may be used either with BB-3 or BB-4. The additional difference from solution aroach A is that strong forcing constraints are only generated at nodes where the lower bounds are udated during branch-and-bound. This allows exloration of more nodes within the time limit. Solution aroach C is targeted at very large roblem instances, and it utilizes branching strategy BB-4. The variable fixing technique starts with a limit for fixing cycles at 0.6, and to facilitate instances with several hundred commodities, we test inclusion of at most 10, 20 and 30 cycles in one iteration of the column generation algorithm. Strong forcing constraints are only generated when the lower bound is udated, and because the reotimizations are time-consuming, we include the oortunity to sto this rocess if the time exceeds seconds or if the imrovement in objective function value in the last iteration was below 0.1%. Moreover, the strong forcing constraints are removed from the matrix as soon as the bound is udated, to facilitate faster exloration of the search tree. 3.2 Data sets In (Andersen et al., 2007b) the SNDAM roblem with cycle and ath variables was solved directly with the MIP-solver in CPLEX for roblem instances where all design cycles and commodity aths were generated a riori. We test the branch-and-rice algorithm on a few of the instances from (Andersen et al., 2007b), but the comutational study is focused on instances that are significantly larger than what could be solved with full a riori generation. In Table 2 we resent the dimensions of the roblems that are tested in the comutational study. The first three columns of Table 2 resent number of nodes and arcs in the static network, as well as number of time eriods. In the fourth column we resent the corresonding number of service and holding arcs, and number of commodities aears in the sixth column. In the seventh column a size indicator for roblem dimension is resented, comuted as the roduct of number of service arcs and number of commodities and divided by This measure gives a fair descrition of the relative dimensions of the instances. In the last column we indicate which of the solution aroaches of Section 3.1 we aly to each instance. The instances are insired by a real-world case in rail transortation lanning. Instances 1-5 are extracted from (Andersen et al., 2007b), while instances 6-15 are significantly larger than what could be handled with total enumeration of cycles and aths. We observe that there are significant differences in roblem size between the instances. As ointed out in Section 3.1, initial testing has suggested that different aroaches should be alied deending on the sizes of the instances. Instances 1-5 have size indicators in the range 4-45, and for these roblems we aly solution aroaches A and B. However, for solution aroach B we only aly the branching on slack variables (BB-3). For instances 6 to 12, the size indicator is in the range , which is significantly larger than for instances 1-5. For these cases, solution aroach A is left out, as it for these instances aeared to be disadvantageous to generate strong forcing constraints on all nodes of the search tree. Finally, for instances 13-15, the size indicator exceeds 1000, and these instances are so large that we only aly solution aroach C. CIRRELT

19 Problem id # Static service arcs Table 2.Dimensions of roblem instances. Service + holding arcs Commodities Size indicator Solution aroaches Static nodes Time eriods A and B A and B A and B A and B A and B B B B B B B B C C C 3.3 Results In this section we resent results from model runs for the roblem instances that were defined in Table 2. We allow a maximum CPU time of 10 hours in all cases. In Section we resent results for roblems that have been solved with a riori generation of columns, while we in Section resent results for the roblems that have not been solved earlier Instances solved with a riori generation of columns Results from model runs for instances 1-5 can be found in Table 3. For each scenario, there is one row with results obtained with solution aroach A, and one row with results obtained with solution aroach B. In each case, we reort lower bound at termination and best MIP solution at termination. Termination either refers to that 10 hours of CPU time has been reached, or that the algorithm has found a roven otimal integer solution. Thereafter the solution time in seconds for finding roven otimal solution is returned, or alternatively the remaining otimality ga after 10 hours of CPU time. In the last two columns of Table 3, we resent the best integer solution that was obtained with a riori enumeration of cycles and aths in (Andersen et al., 2007b) and the corresonding solution time. The a riori enumeration was imlemented on different comuters but with comarable secifications and a maximum running time of 10 hours. The results reorted in Table 3 are very similar for aroaches A and B. For instances 1-3, the branch-and-rice algorithm returns roven otimal integer solutions with both solution aroaches. For instances 1 and 3, the solutions are obtained reasonably quickly, while instance 2 requires around and seconds with the two aroaches. The a riori enumeration was more efficient for instances 1 and 2, while instance 3 was solved faster with branch-and-rice. The a riori enumeration utilized the advantages of a standard MIP-solver with advanced heuristics and more advanced search algorithms than we have imlemented. It is nevertheless good news that the branchand-rice algorithm returns roven otimal integer solutions for roblems where these otimal CIRRELT

20 solutions are known. For instances 4 and 5, neither a riori enumeration nor branch-and-rice returned roven otimal solutions within 10 hours. For instance 4, the integer solutions obtained were slightly better with a riori enumeration, and the ga also smaller in this case due to more advanced bounding. For instance 5, the branch-and-rice algorithm returns better integer solutions than what was obtained with a riori enumeration. However, the remaining otimality ga after 10 hours is smaller with a riori enumeration; this reflects the stronger focus on bounding in a commercial MIP-solver comared to the branch-and-rice algorithm resented in this aer. The encouraging news from Table 3 is however that the branch-and-rice algorithm solves small instances to roven otimality, and that both aroaches A and B return better integer solutions than what was obtained with a riori enumeration for the largest instance. Table 3. Results from model runs for instances that have been comuted with a riori generation of columns. Solution Lower bound at MIP solution at Time use a riori Solution time (sec) / Best MIP with a riori enumeration (sec) / Instance aroach termination termination Otimality ga enumeration Otimality ga 1 A B A B A B A % B % * 0.7% 5 A % B % * 0.5% *For these instances, the a riori aroach did not return a roven otimal solution within 10 hours Larger instances We resent results from model runs for roblem instances 6-12 in Table 4. In these model runs, all integer solutions have been obtained by use of the accelerating technique resented in Section 2.7. No roblems are solved to roven otimum within 10 hours of CPU time. Again, there are two rows for each instance, reresenting branching on slack variables (BB-3) and heuristic branching (BB-4). In Table 4, the first column of results resents the lower bounds at termination, which in all cases corresonds to the lower bound obtained at the root node, because the deth-first search does not return to the root node within 10 hours for any of the instances. Then best integer solutions obtained and otimality gas are reorted. The next two columns elaborate on the best integer solutions that were obtained, and reort node number where the best integer solution was found and the elased time, resectively. In the last two columns we reort number of branch-and-rice nodes visited during the tree search, and time needed to solve the root node. For each branching strategy, we resent average results from instances 6-12 in the last two rows. CIRRELT

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

A Brief Overview of Intermodal Transportation

A Brief Overview of Intermodal Transportation A Brief Overview of Intermodal Transortation Tolga Bektas Teodor Gabriel Crainic January 2007 CIRRELT-2007-03 Tolga Bektas 1, Teodor Gabriel Crainic 1,* 1 Interuniversity Research Centre on Enterrise Networks,

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

An Associative Memory Readout in ESN for Neural Action Potential Detection

An Associative Memory Readout in ESN for Neural Action Potential Detection g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models

INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Minimizing the Communication Cost for Continuous Skyline Maintenance

Minimizing the Communication Cost for Continuous Skyline Maintenance Minimizing the Communication Cost for Continuous Skyline Maintenance Zhenjie Zhang, Reynold Cheng, Dimitris Paadias, Anthony K.H. Tung School of Comuting National University of Singaore {zhenjie,atung}@com.nus.edu.sg

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter

More information

An optimal batch size for a JIT manufacturing system

An optimal batch size for a JIT manufacturing system Comuters & Industrial Engineering 4 (00) 17±136 www.elsevier.com/locate/dsw n otimal batch size for a JIT manufacturing system Lutfar R. Khan a, *, Ruhul. Sarker b a School of Communications and Informatics,

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Measuring relative phase between two waveforms using an oscilloscope

Measuring relative phase between two waveforms using an oscilloscope Measuring relative hase between two waveforms using an oscilloscoe Overview There are a number of ways to measure the hase difference between two voltage waveforms using an oscilloscoe. This document covers

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

MODELLING AND SIMULATION OF A DISH STIRLING SOLAR ENGINE. Sergio Bittanti Antonio De Marco Marcello Farina Silvano Spelta

MODELLING AND SIMULATION OF A DISH STIRLING SOLAR ENGINE. Sergio Bittanti Antonio De Marco Marcello Farina Silvano Spelta MODELLING AND SIMULATION OF A DISH STIRLING SOLAR ENGINE Sergio Bittanti Antonio De Marco Marcello Farina Silvano Selta Diartimento di Elettronica e Informazione, Politecnico di Milano, Via Ponzio 34,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

IEEM 101: Inventory control

IEEM 101: Inventory control IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Pinhole Optics. OBJECTIVES To study the formation of an image without use of a lens.

Pinhole Optics. OBJECTIVES To study the formation of an image without use of a lens. Pinhole Otics Science, at bottom, is really anti-intellectual. It always distrusts ure reason and demands the roduction of the objective fact. H. L. Mencken (1880-1956) OBJECTIVES To study the formation

More information

Precalculus Prerequisites a.k.a. Chapter 0. August 16, 2013

Precalculus Prerequisites a.k.a. Chapter 0. August 16, 2013 Precalculus Prerequisites a.k.a. Chater 0 by Carl Stitz, Ph.D. Lakeland Community College Jeff Zeager, Ph.D. Lorain County Community College August 6, 0 Table of Contents 0 Prerequisites 0. Basic Set

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation Pressure Dro in Air Piing Systems Series of Technical White Paers from Ohio Medical Cororation Ohio Medical Cororation Lakeside Drive Gurnee, IL 600 Phone: (800) 448-0770 Fax: (847) 855-604 info@ohiomedical.com

More information

An Approach to Optimizations Links Utilization in MPLS Networks

An Approach to Optimizations Links Utilization in MPLS Networks An Aroach to Otimizations Utilization in MPLS Networks M.K Huerta X. Hesselbach R.Fabregat Deartment of Telematics Engineering. Technical University of Catalonia. Jori Girona -. Camus Nor, Eif C, UPC.

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

A Certification Authority for Elliptic Curve X.509v3 Certificates

A Certification Authority for Elliptic Curve X.509v3 Certificates A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena

More information

An effective multi-objective approach to prioritisation of sewer pipe inspection

An effective multi-objective approach to prioritisation of sewer pipe inspection An effective multi-objective aroach to rioritisation of sewer ie insection L. Berardi 1 *, O.Giustolisi 1, D.A. Savic 2 and Z. Kaelan 2 1 Technical University of Bari, Civil and Environmental Engineering

More information

Piracy and Network Externality An Analysis for the Monopolized Software Industry

Piracy and Network Externality An Analysis for the Monopolized Software Industry Piracy and Network Externality An Analysis for the Monoolized Software Industry Ming Chung Chang Deartment of Economics and Graduate Institute of Industrial Economics mcchang@mgt.ncu.edu.tw Chiu Fen Lin

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY CALIFORNIA THESIS SYMMETRICAL RESIDUE-TO-BINARY CONVERSION ALGORITHM PIPELINED FPGA IMPLEMENTATION AND TESTING LOGIC FOR USE IN HIGH-SPEED FOLDING DIGITIZERS by Ross

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Abstract A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Fang He and Rong Qu The Automated Scheduling, Optimisation and Planning (ASAP) Group School of Computer Science,

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China The current issue and full text archive of this journal is available at www.emeraldinsight.com/2044-1398.htm CFRI 3,4 322 constraints and cororate caital structure: a model Wuxiang Zhu School of Economics

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Factoring Variations in Natural Images with Deep Gaussian Mixture Models

Factoring Variations in Natural Images with Deep Gaussian Mixture Models Factoring Variations in Natural Images with Dee Gaussian Mixture Models Aäron van den Oord, Benjamin Schrauwen Electronics and Information Systems deartment (ELIS), Ghent University {aaron.vandenoord,

More information

Chapter 13: Binary and Mixed-Integer Programming

Chapter 13: Binary and Mixed-Integer Programming Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:

More information

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm The Oen Alied Mathematics Journal, 2008, 2, 95-03 95 Oen Access Multistage Human Resource Allocation for Software Develoment by Multiobjective Genetic Algorithm Feng Wen a,b and Chi-Ming Lin*,a,c a Graduate

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information