INTERACTIVE SEARCH FOR COMPROMISE SOLUTIONS IN MULTICRITERIA GRAPH PROBLEMS. Lucie Galand. LIP6, University of Paris 6, France

Size: px
Start display at page:

Download "INTERACTIVE SEARCH FOR COMPROMISE SOLUTIONS IN MULTICRITERIA GRAPH PROBLEMS. Lucie Galand. LIP6, University of Paris 6, France"

Transcription

1 INTERACTIVE SEARCH FOR COMPROMISE SOLUTIONS IN MULTICRITERIA GRAPH PROBLEMS Lucie Galand LIP6, University of Paris 6, France Abstract: In this paper, the purpose is to adapt classical interactive methods to multicriteria combinatorial problems in order to explore the non-dominated solutions set. We propose an interactive procedure alternating a calculation stage determining the current best compromise solution and a dialogue stage allowing decision maker to specify his/her preferences. For the calculation stage, we propose an efficient procedure which relies on algorithms providing k-best solutions of a scalarized version of the problem. Moreover, we show how to exploit previous iterations to speed-up the interactive process. We provide numerical experiments of our method on multicriteria shortest path and spanning tree problems. Keywords: Multiobjective optimisations, interactive approaches, decision making, graphs, path planning, trees. 1. INTRODUCTION Traditionally, graph problems are considered in the framework of the single objective optimization. However, in many practical situations, the value of a solution must be assessed with respect to several criteria. For example, in a path problem, the choice of the most satisfactory route can be determined including multiple aspects like cost, distance, time and accessibility. Generally, there is no unique optimal solution in a multicriteria problem but rather a set of non-dominated solutions (i.e., solutions such that there does not exist another better feasible solution with respect to all criteria) among which the decision maker (DM) selects its favorite (i.e., the one representing the best compromise for him/her). However, due to the potentially large size of this set in practice, its complete generation can be very hard. Moreover it is often difficult for a DM to select a preferred solution among a high number of alternatives. To overcome these drawbacks we use an interactive method to explore the set of non-dominated solutions according to the DM s preferences. There are two types of approaches for interactive procedures in multicriteria combinatorial optimization. The first one consists of two phases: a prior generation of the whole non-dominated solutions set (or an approximation of this set) and an interactive exploration of this set in order to find the best compromise solution for the DM. This type of procedure is proposed in (Gabrel and Vanderpooten, 2002) for example, to select efficient paths in a multiple criteria graph problem to be solved for scheduling an earth observing satellite. This approach allows to get all non-dominated solutions and thus all potentially best compromise solutions. It is appropriate when the size of the graph is reasonable and when we have no information about a priori DM s preferences since we can efficiently explore the whole non-dominated solutions set. Nevertheless the duration of the first phase can be very long. Indeed there are instances for which the number of non-dominated solutions is exponential in the size of the instance, see (Hansen, 1980) for the multicriteria shortest path problem (MSPP) and (Hamacher and Ruhe, 1994) for the multicriteria

2 spanning tree problem (MSTP). The second interactive approach directly determines a first best compromise solution without any prior generation of the non-dominated solutions set. Then during the exploration stage, the DM can specify his/her preferences in relation to the proposed solution and the notion of best compromise is updated. A new calculation stage is then performed to search a better solution for the DM. This type of procedure is proposed for MSPP in (Granat and Guerriero, 2003) for example. Since the first approach requires a pre-process which is sometimes very long, we focus here on the second interactive approach. The main difficulty of this approach is to determine efficiently the best compromise solution among a combinatorial set. The method we propose efficiently provides the DM s favorite solution by an interactive process without necessarily compute the entire set of nondominated solutions. Several efficient interactive methods are proposed for the bicriteria shortest path problem (see for example (Rodrigues et al., 1999; Murthy and Olson, 1994)) but our method neither depends on the problem nor on the number of criteria. In Section 2 we first recall notion of best compromise and discuss about the complexity of this problem, then we propose an efficient algorithm to determine the best compromise solution of a multicriteria graph problem (MSPP and MSTP in particular). We present some numerical experiments obtained on MSPP and MSTP. In Section 3, we explain how this algorithm is integrated into our interactive method and how the previous iterations can be used to speed-up the search of the best solution during interactions. 2. GENERATING A BEST COMPROMISE SOLUTION 2.1 Notations Let G = (V, E) be a graph (directed or not, according to the considered problem) where V = {1,...,n} is a finite set of nodes and E V V is a finite set of edges (or arcs). With any edge (or arc) u E, is associated a q-dimensional vector of criteria c(u) = (c 1 (u),...,c q (u)) with c(u) N q. In this article we consider both MSPP and MSTP. A feasible path of MSPP is a sequence of nodes beginning by an origin node and ending by a destination node, such that two nodes v and v can follow in the sequence if there exists an arc (v, v ) E. A feasible tree of MSTP is a set of V 1 edges of E without cycle. We call S the set of arcs forming a path in MSPP or the set of edges forming a spanning tree in MSTP. S is evaluated by the q-dimensional vector of criteria c(s) = ( u S c 1(u),..., u S c q(u)). A solution of a problem P G is a q-dimensional vector x = (x 1,..., x q ) with x N q such that there exists in G a path or a spanning tree S such that c(s) = (x 1,..., x q ). Let X be the set of feasible solutions (i.e., the set of q-dimensional vectors corresponding to the evaluation of a possible path or possible spanning tree in G), and let ND be the set of non-dominated solutions (i.e., ND = {x X, y X, i Q y i x i and i Q, y i < x i } with Q = {1,...,q}). Since the problem of minimizing a q-dimensional vector is ill-defined, we use a scalarizing function f to value a q-dimensional vector in a unique cost. The best solution according to f is the best compromise solution. Based on these definitions and notations, the multicriteria optimization graph problem is: (P G ): min x X f(x) In the next subsection, we define the function f representing the notion of compromise. 2.2 Best compromise solution If f is defined as a weighted sum of criteria like x X, f 1 ω(x) = q i=1 ω ix i where ω i is the weight assigned to criterion i, the problem (P G ) is easy to solve. Indeed, in this case fω 1(x) = q i=1 ω ic i (S) = q i=1 ω i u S c i(u) i.e., f 1 ω(x) = u S q i=1 ω ic i (u) = c 1 ω(s) with u E, c 1 ω(u) = q i=1 ω ic i (u). Thus, to find the minimal solution according to fω 1 when G is valued by the q-dimensional vector of criteria c, we just have to search for the minimum solution (shortest path or minimum spanning tree) when G is scalarized by c 1 ω. Hence we get a classical monocriterion problem which can be solved in polynomial time. However linear functions are not really satisfactory to determine compromised solutions because they allow full compensations between good and bad values of criteria. Moreover, it is well known in multicriteria optimization that as soon as X is not convex, optimizing a linear function does not enable to obtain unsupported solutions (i.e., solutions that do not belong to the boundary of the convex hull of X). This eliminates an a priori good compromise as we can see with Example 1. Example 1. Let a path problem where cost and time are considered. Suppose there exists three routes corresponding to the non-dominated solutions x = (100, 120), y = (45, 180) and z = (0, 240) (where the first and the second valuation represent respectively the cost and the time of the route). Solution y represents the best compromise. We then determine for which vector

3 ω = (ω 1, ω 2 ), y minimizes fω. 1 We have: fω(x) 1 = 100ω ω 2, fω(y) 1 = 40ω ω 2 and fω 1(z) = 240ω 2. fω(y) 1 < fω(z) 1 if ω 1 < 8 9 ω 2 but when ω 1 < 7 6 ω 2, fω 1(x) < f1 ω (y) and then x minimizes f1 ω. Then whatever ω R 2, y never minimizes fω 1 while it represents the best compromise. Through this example, we see that the weighted sum is not a satisfactory way to define the notion of compromise. Thus we use another type of function measuring the distance to a reference point in the sense of the Tchebycheff weighted norm (i.e. the infinity norm (Wierzbicki, 1986)). Indeed, this function is often used in interactive procedures (Steuer and Choo, 1983; Vanderpooten and Vincke, 1989), because it allows to explore the whole set of non-dominated solutions (supported or unsupported) by varying the weighting vector. We use the classical scalarizing function fω as the distance to a reference point r: f ω (x) = max i Q ω i x i r i The problem we address now is the best compromise search according to the Tchebycheff weighted norm: (P ω ): min x X f ω (x) In this section the notion of compromise is based on the classical ideal (I) and nadir (N) points, as reference points, which allow to border the nondominated solutions set: i Q, r i = I i and ω i = 1 N i I i with: I i = min x ND x i and N i = max x ND x i (1) We will see in Section 3 that I and N (and thus r and ω) can be modified in an interactive process to adapt the notion of compromise to the DM s preferences. 2.3 Complexity of the best compromise search It is shown that (MinMax): min max x X i Q (u,v) S c i (u, v) is a NP-Hard problem for MSPP (Yu and Yang, 1998) and for MSTP (Hamacher and Ruhe, 1994). Since (MinMax) reduces to (P ω ) with ω = (1,..., 1) and I = (0,...,0), (P ω ) is also a NP-hard problem. 2.4 Optimality principle Searching for a best compromise solution (i.e., for the optimal solution of (P ω )) rather than a set of non-dominated solutions is more discriminating and then should improve the search. But in addition to the NP-hardness of (P ω ), it presents another difficulty: the optimality principle does not hold, as we can see for MSPP in Example 2. Example 2. Figure 2 represents bicriteria graph proposed by (Hansen, 1980). One best compro- (0, 1) (0, 2) (1, 0) (0, 0) (2, 0) 2 4 (0, 4) (0, 0) (4, 0) (0, 0) Fig. 1. Instance proposed by (Hansen, 1980) mise path in this graph is the path P 1 = 1, 3, 5, 6, 7 corresponding to the solution x 1 = (4, 3). But the sub-path 1, 3, 5 valued by (0, 3), is the worst compromise among all paths from vertex 1 to vertex 5. The path 1, 2, 3, 5 for example, valued by (1, 2) represents a better compromise than (0, 3). We see through this example, that with f ω, a sub-path from an optimal path is not necessarily optimal. It even can be the worst sub-path. Then using a constructive approach based on optimal sub-paths, like dynamic programming, seems to be unappropriate to determine the best compromise path. Figure 2 illustrates a bicriteria instance for which we can come to the same conclusions for MSTP. Indeed, on this instance, the best compromise spanning tree, formed by the edges (a, b) and (b, c) is valued by (2, 2) which does not include the best compromise edge (a, c) valued by (1, 1). b (2,0) a (0,2) Fig. 2. An instance of MSTP (1,1) We now present our approach determining the optimal solution of (P ω ) without using the optimality principle. 2.5 Calculation algorithm We saw above that minimizing fω 1 enables to handle in polynomial time scalarized problems. But it doesn t allow to find the best compromise solution. However, the minimizing fω solution often achieves a good performance according to fω 1, even it is not the best. Therefore, we propose to enumerate solutions in increasing order of fω. 1 We can then reach all feasible solutions by using a scalarized version of the graph. In this respect, 6 c 7

4 we establish a property stopping the enumeration as soon as we can ensure to have generated the optimal solution of (P ω ). For all x X N q let vector x ω of N q defined as i Q, x ωi = I i + 1 ω i fω (x) then we have: Property 1. x X, y X, f 1 ω (y) > f1 ω ( x ω) = f ω (x) < f ω (y) Proof 1. Let y, x X, such that fω 1(y) > f1 ω ( x ω) thus q i=1 ω iy i > q i=1 ω ii i + q i=1 f ω (x) i.e., q i=1 ω i(y i I i ) > qfω (x) and then, q i=1 ω i( y i I i ) > qfω (x) (2) Moreover since fω (y) = max i Q (ω i y i I i ), q i=1 f ω (y) q i=1 ω i y i I i hence, from (2) we have qfω (y) = q i=1 f ω (y) > qf ω (x) i.e., fω (y) > fω (x) Thus, for any solution z X such that fω(z) 1 > fω 1(y) (with f1 ω (y) > f1 ω ( x ω)), we have fω (z) > fω (x). There is no solution following y in the increasing order of fω 1 enumeration which can be better than x in sense of fω. During the enumeration, once solution y is generated, the current optimal solution x (minimizing fω ) is the optimal solution of (P ω ). Using this property, the algorithm presented in Figure 3 generates solutions in increasing order of fω 1 thanks to k-best algorithms ((Jiménez and Marzal, 2003) for the path problem and (Katoh et al., 1981) for the spanning tree problem). This enumeration is stopped when a solution y such that fω(y) 1 > fω( x 1 ω ) is generated. The same type of approach is proposed in (Paixao et al., 2003) to optimize another nonlinear function (Minimum-cost norm). But this norm does not allow to reach all non-dominated solutions (Wierzbicki, 1986). Figure 4 illustrates Determine ideal point I and nadir point N x 1 argmin x X f 1 ω (x), s f ω (x1 ) B f 1 ω ( x ω), x x 1, k 2 While f 1 ω (xk 1 ) B Generate the kth best solution x k according to f 1 ω If there is no more solutions Then exit from the while If f ω (xk ) < f ω (x ) Then B f 1 ω( x k ω), x x k k k + 1 Return: x, optimal solution for f ω Fig. 3. Generation of the best compromise solution the algorithm idea on a bicriteria problem. In this figure, arrows indicate the direction of the search according to fω. 1 The surrounded solution is the optimal solution x. The bolded straight line represents the hyperplan beyond which solutions are worst than x according to fω. This straight line corresponds to the value B in the algorithm on Figure 3. Solutions in the hatched zone will then never be generated. criterion 2 Id x* Fig. 4. Algorithm sequencing 2.6 Results Nad B criterion 1 Some numerical experiments have been done on this algorithm for MSPP and MSTP. Table 1 summarizes results obtained for several instances. Tests were executed on a Pentium IV with 2.5GHz processor. The algorithm was implemented in C++. For MSPP, the number of arcs and their costs vector are randomly generated. For MSTP, tests are executed with complete graphs where the costs vector of any edge is randomly determined. Table 1. Experimental results Multicriteria shortest path problem (ms) # nodes # arcs , , ,615 5 criteria criteria criteria # nodes # arcs 422, ,248 1,172,301 1,689,311 5 criteria s 10 criteria s 1.6s 20 criteria 1.33s 3.12s 4.3s 6s Multicriteria spanning tree problem (ms) # nodes criteria s 10 criteria s - 20 criteria s - - These tables show that our algorithm is very efficient for MSPP. Indeed, solutions are quickly found even when graphs have many nodes and arcs. However for MSTP, our algorithm is only efficient for graphs having at most 15 nodes. In this table, - means that execution time is greater than 20 minutes. Nowadays, to our knowledge, there is no algorithm which determines the best compromise spanning tree significantly faster. The results obtained for this problem seem to be quite satisfactory. These results show we can efficiently generate a best compromise solution, and then it seems

5 interesting to integrate this algorithm into an interactive procedure by using the second approach introduced in Section INTERACTIVE PROCEDURE 3.1 Interactive process In the previous section we presented an algorithm finding efficiently the best compromise solution of (P ω ) defined by the ideal and nadir points. But on the one hand, notion of compromise depends on DM s preferences (a favorite solution for one DM has no reason to be the favorite for another DM). On the other hand, DM s preferences (a priori or not) can evolve during the search when he/she realizes what kind of performance and compromise can be obtained. That is why, it seems relevant resorting to an interactive procedure to adapt the notion of compromise. As we said earlier, the interactive procedure determines first the best compromise by using the algorithm presented in Section 2. The solution is then proposed to the DM. He/she can specify on which criterion he/she is not satisfactory, or stop the process if the current solution suits him/her. His/her preferences specifications modify ω and r by changing I and N in order to direct the search for his/her preferred solutions (at the first step, ideal and nadir points are defined by (1)). In the interactive procedure we propose, the DM can specify his/her preferences in three manners: improving criterion performance setting an aspiration level for a criterion (i.e. an ideal performance) setting a reservation level for a criterion (i.e. a maximal admissible performance) These specifications either modify the ideal or the nadir point and therefore vectors ω and r to adapt the notion of compromise to the DM s preferences. To improve the performance of a criterion i, we set N i to the value of the ith criterion of the current solution. To set an aspiration level, we modify the ideal point value for the considered criterion. We modify the criterion performance of nadir point to set the reservation level. 3.2 Use of previous iterations The time required to find the current best compromise solution depends on the complexity of k-best algorithms (algorithm in (Jiménez and Marzal, 2003) determines k shortest paths in O(m + nlogn + klogk) and the one in (Katoh et al., 1981) determines k best spanning trees in O(km + min(n 2, m log log n)) where m = E et n = V ). Thus it can be interesting to avoid the systematical execution of the algorithm after a dialogue with the DM in order to reduce the running time of the whole interactive process. In this perspective we establish the following property using information from the previous iteration. To simplify notations f h (x) denotes f ω (x) at iteration h and z h = I hi + 1 ω hi f h (z). Property 2. Let Z h be the set of solutions generated at iteration h and t Z h be the last solution generated at iteration h (fh 1(t) = max x Z h fh 1(x)). Let z = argmin x Zh fh+1 (x). Then: f 1 h ( z h+1) < f 1 h (t) = z = argmin x X f h+1 (x) Proof 2. Let y X such that y / Z h and fh+1 (y) f h+1 (z). y / Z h = fh 1(y) f1 h (t) but fh 1(t) > f1 h ( z h+1) thus fh 1(y) > f1 h ( z h+1) i.e., fh 1(y) > q i=1 ω h i I h+1i + q ω hi i=1 ω h+1i fh+1 (z) by hypothesis, fh+1 (y) f h+1 (z) and fh+1 (y) = max i ω h+1i ( y i I h+1i ) thus i Q, fh+1 (y) ω h+1 i ( y i I h+1i ) ω h+1i (y i I h+1i ) then fh 1(y) > q i=1 ω h i I h+1i + q i=1 ω h i (y i I h+1i ) i.e., fh 1(y) > f1 h (y) which is impossible. Solution y X such that y / Z h and fh+1 (y) fh+1 (z) when f1 h ( z h+1) < fh 1 (t) can t exist. Hence, if fh 1( z h+1) < fh 1 (t), then the algorithm does not need to be executed at iteration h + 1 to compute the best solution, because we know it is z. Besides, during a calculation stage at iteration h, several solutions are generated. When the calculation is restarted at iteration h + 1 (after a dialogue with the DM) many solutions generated at iteration h are re-generated. In order to avoid generation of the same solution several times, we propose to search for the best compromise according to fh by using ω 1 as the direction researching for all iterations h. Thus, when the algorithm is executed, it runs from the last solution generated at the last iteration. Hence, we generate a solution only one time during the whole process. Note that property 2 still holds since by changing fh 1 in f1 1 in the proof we come to the same conclusions. Example 3 illustrates how our algorithm runs on three iterations. Example 3. We consider an instance of MSPP represented in Figure 5. On this graph, each arc u is valued by the vector c(u) and the number c 1 (u) which corresponds to the scalarized version of the problem. We search for the best path from node a to node g. Ideal and nadir points are determined: I = (8, 11) and N = (18, 19). Thus we have ω = ( 1 10,1 8 ). Then we settle scalarized graph (scalar valuation of each arc in Figure 5). At the first iteration, 7 solutions are generated. They are given in the Table 2 in their generation order. As f 1 1 (x7 ) > B,

6 (2,6) a (6,3) b (2,3) d (2,5) (6,10) c (4,4) (2,4) (10,4) (5,3) (7,6) 1.45 e (1,4) 0.6 f (4,2) (2,4) Fig. 5. bicriteria graph and corresponding scalarized version Table 2. Ordered generation of solutions x Path value f 1 1 (x) f 1 (x) f1 1 ( x 1) B x 1 abcfg (8,19) x 2 adfg (18,11) x 3 abcg (11,17) x 4 adcfg (14,15) x 5 abceg (13,16) x 6 adcg (17,13) x 7 adceg (19,12) the algorithm can then stop. The best compromise is solution x 4 = (14, 15), corresponding to the path adcf g. This solution is thus proposed to the DM. Suppose he/she wants to improve the first criterion performance. He/she then specifies an aspiration level for this criterion and ideal point is updated to (7, 11). f 1 1 (x7 ) = 3.4 and f 1 1 ( x5 2 ) = (where f 2 (x 5 ) = min i=1,...,7 f 2 (x i )). Thus property 2 holds here. The solution x 5 = (13, 16) corresponding to the path abceg is thus presented to the DM as a new compromise solution. f 2 (x5 ) < f 2 (x4 ) which corresponds to the desired performance. Suppose now he/she specifies a reservation level for the second criterion to 14. The nadir point value is then updated to (18, 14). Property 2 doesn t hold at this iteration, thus the algorithm continues its enumeration of solutions. Solution x 8 = (12, 18) corresponding to the path abeg is generated. f 1 1(x 8 ) = 3.45 which is greater than f 1 1 ( x6 3 ) = (where f 3 (x6 ) = min i=1,...,7 f 3 (xi )). The algorithm can stop. x 6 is the best solution at iteration CONCLUSION We propose in this article an algorithm which determines efficiently, in the majority of cases, the desired compromise solution, avoiding generation of all non-dominated solutions. We integrate this algorithm in an interactive procedure to take into account the possible evolution of the DM s preferences during the exploration. We use the previous iterations of the interactive procedure in order to speed-up the search of the DM s favorite solution. The main advantage of our approach is its portability. Indeed it can be applied to all types of combinatorial multicriteria problems for which there g exists an efficient k-best solutions algorithm. The algorithm can then be integrated into an efficient interactive procedure. REFERENCES Gabrel, V. and D. Vanderpooten (2002). Enumeration and interactive selection of efficient paths in a multiple criteria graph for scheduling an earth observing satellite. European Journal of Operational Research 139, Granat, J. and F. Guerriero (2003). The interactive analysis of the multicriteria shortest path problem by the reference point method. European Journal of Operational Research 151, Hamacher, H.W. and G. Ruhe (1994). On spanning tree problems with multiple objectives. Annals of Operations Research 52, Hansen, P. (1980). Bicriterion path problems. In: Multiple Criteria Decision Making: Theory and Applications, LNEMS 177 (G. Fandel and T. Gal, Eds.). pp Springer- Verlag, Berlin. Jiménez, V. M. and A. Marzal (2003). A lazy version of eppstein s k shortest paths algorithm. In: WEA. pp Katoh, N., T. Ibaraki and H. Mine (1981). An algorithm for finding k minimum spanning trees. SIAM J. Computing 10(2), Murthy, I. and D.L. Olson (1994). An interactive procedure using domination cones for bicriterion shortest path problems. European Journal of Operational Research 72, Paixao, J.M.P., A.Q.V Martins, M.S. Rosa and J.L.E. Santos (2003). The determination of the path with minimum-cost norm value. Networks 41(4), Rodrigues, J.C., J.C.N. Clímaco and J.R. Current (1999). An interactive bi-objective shortest path approach: Searching for unsupported nondominated solutions. Computers & Operations Research 26, Steuer, R.E. and E.-U. Choo (1983). An interactive weighted Tchebycheff procedure for multiple objective programming. Mathematical Programming 26, Vanderpooten, D. and Ph. Vincke (1989). Description and analysis of some representative interactive multicriteria procedures. Mathematical and Computer Modelling 12(10/11), Wierzbicki, A.P. (1986). On the completeness and constructiveness of parametric characterizations to vector optimization problems. OR Spektrum 8, Yu, G. and J. Yang (1998). On the robust shortest path problem. Comput. Oper. Res. 25(6),

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

A Reference Point Method to Triple-Objective Assignment of Supporting Services in a Healthcare Institution. Bartosz Sawik

A Reference Point Method to Triple-Objective Assignment of Supporting Services in a Healthcare Institution. Bartosz Sawik Decision Making in Manufacturing and Services Vol. 4 2010 No. 1 2 pp. 37 46 A Reference Point Method to Triple-Objective Assignment of Supporting Services in a Healthcare Institution Bartosz Sawik Abstract.

More information

Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC Coimbra

Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC Coimbra Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC Coimbra João Clímaco and Marta Pascoal A new method to detere unsupported non-doated solutions

More information

Multiobjective Multicast Routing Algorithm

Multiobjective Multicast Routing Algorithm Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py

More information

Multi-objective Traffic Engineering for Data Center Networks

Multi-objective Traffic Engineering for Data Center Networks Noname manuscript No. (will be inserted by the editor) Multi-objective Traffic Engineering for Data Center Networks Trong-Viet Ho Yves Deville Olivier Bonaventure Received: date / Accepted: date Abstract

More information

International Doctoral School Algorithmic Decision Theory: MCDA and MOO

International Doctoral School Algorithmic Decision Theory: MCDA and MOO International Doctoral School Algorithmic Decision Theory: MCDA and MOO Lecture 2: Multiobjective Linear Programming Department of Engineering Science, The University of Auckland, New Zealand Laboratoire

More information

A Study of Local Optima in the Biobjective Travelling Salesman Problem

A Study of Local Optima in the Biobjective Travelling Salesman Problem A Study of Local Optima in the Biobjective Travelling Salesman Problem Luis Paquete, Marco Chiarandini and Thomas Stützle FG Intellektik, Technische Universität Darmstadt, Alexanderstr. 10, Darmstadt,

More information

6.231 Dynamic Programming and Stochastic Control Fall 2008

6.231 Dynamic Programming and Stochastic Control Fall 2008 MIT OpenCourseWare http://ocw.mit.edu 6.231 Dynamic Programming and Stochastic Control Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.231

More information

Discuss the size of the instance for the minimum spanning tree problem.

Discuss the size of the instance for the minimum spanning tree problem. 3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can

More information

Minkowski Sum of Polytopes Defined by Their Vertices

Minkowski Sum of Polytopes Defined by Their Vertices Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal

More information

The Bi-Objective Pareto Constraint

The Bi-Objective Pareto Constraint The Bi-Objective Pareto Constraint Renaud Hartert and Pierre Schaus UCLouvain, ICTEAM, Place Sainte Barbe 2, 1348 Louvain-la-Neuve, Belgium {renaud.hartert,pierre.schaus}@uclouvain.be Abstract. Multi-Objective

More information

Core problems in the bi-criteria {0,1}-knapsack: new developments

Core problems in the bi-criteria {0,1}-knapsack: new developments Core problems in the bi-criteria {0,}-knapsack: new developments Carlos Gomes da Silva (2,3, ), João Clímaco (,3) and José Figueira (3,4) () Faculdade de Economia da Universidade de Coimbra Av. Dias da

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

MANAGEMENT OPTIMIZATION PROBLEMS ON FUZZY GRAPHS

MANAGEMENT OPTIMIZATION PROBLEMS ON FUZZY GRAPHS Investigaciones Europeas de Dirección y Economía de la Empresa Vol. 1, W 3,1995, pp. 63-69. MANAGEMENT OPTIMIZATION PROBLEMS ON FUZZY GRAPHS Krasnoproshin, V. Obraztsov, V. Belarus State University ABSTRACT

More information

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming

More information

Procedia Computer Science 00 (2012) 1 21. Trieu Minh Nhut Le, Jinli Cao, and Zhen He. trieule@sgu.edu.vn, j.cao@latrobe.edu.au, z.he@latrobe.edu.

Procedia Computer Science 00 (2012) 1 21. Trieu Minh Nhut Le, Jinli Cao, and Zhen He. trieule@sgu.edu.vn, j.cao@latrobe.edu.au, z.he@latrobe.edu. Procedia Computer Science 00 (2012) 1 21 Procedia Computer Science Top-k best probability queries and semantics ranking properties on probabilistic databases Trieu Minh Nhut Le, Jinli Cao, and Zhen He

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

NP-Hardness Results Related to PPAD

NP-Hardness Results Related to PPAD NP-Hardness Results Related to PPAD Chuangyin Dang Dept. of Manufacturing Engineering & Engineering Management City University of Hong Kong Kowloon, Hong Kong SAR, China E-Mail: mecdang@cityu.edu.hk Yinyu

More information

A Weighted-Sum Mixed Integer Program for Bi-Objective Dynamic Portfolio Optimization

A Weighted-Sum Mixed Integer Program for Bi-Objective Dynamic Portfolio Optimization AUTOMATYKA 2009 Tom 3 Zeszyt 2 Bartosz Sawik* A Weighted-Sum Mixed Integer Program for Bi-Objective Dynamic Portfolio Optimization. Introduction The optimal security selection is a classical portfolio

More information

Dynamic programming. Doctoral course Optimization on graphs - Lecture 4.1. Giovanni Righini. January 17 th, 2013

Dynamic programming. Doctoral course Optimization on graphs - Lecture 4.1. Giovanni Righini. January 17 th, 2013 Dynamic programming Doctoral course Optimization on graphs - Lecture.1 Giovanni Righini January 1 th, 201 Implicit enumeration Combinatorial optimization problems are in general NP-hard and we usually

More information

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES Silvija Vlah Kristina Soric Visnja Vojvodic Rosenzweig Department of Mathematics

More information

Shortcut sets for plane Euclidean networks (Extended abstract) 1

Shortcut sets for plane Euclidean networks (Extended abstract) 1 Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,

More information

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

SIMS 255 Foundations of Software Design. Complexity and NP-completeness SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity

More information

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Dahai Xu, Ph.D. Florham Park AT&T Labs - Research Joint work with Mung Chiang and Jennifer Rexford (Princeton University)

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms

Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms Solving Method for a Class of Bilevel Linear Programming based on Genetic Algorithms G. Wang, Z. Wan and X. Wang Abstract The paper studies and designs an genetic algorithm (GA) of the bilevel linear programming

More information

An interval linear programming contractor

An interval linear programming contractor An interval linear programming contractor Introduction Milan Hladík Abstract. We consider linear programming with interval data. One of the most challenging problems in this topic is to determine or tight

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

Integer factorization is in P

Integer factorization is in P Integer factorization is in P Yuly Shipilevsky Toronto, Ontario, Canada E-mail address: yulysh2000@yahoo.ca Abstract A polynomial-time algorithm for integer factorization, wherein integer factorization

More information

Key words. multi-objective optimization, approximate Pareto set, bi-objective shortest path

Key words. multi-objective optimization, approximate Pareto set, bi-objective shortest path SMALL APPROXIMATE PARETO SETS FOR BI OBJECTIVE SHORTEST PATHS AND OTHER PROBLEMS ILIAS DIAKONIKOLAS AND MIHALIS YANNAKAKIS Abstract. We investigate the problem of computing a minimum set of solutions that

More information

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization Hindawi Publishing Corporation Journal of Inequalities and Applications Volume 2010, Article ID 510838, 15 pages doi:10.1155/2010/510838 Research Article Stability Analysis for Higher-Order Adjacent Derivative

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

Outsourcing Prioritized Warranty Repairs

Outsourcing Prioritized Warranty Repairs Outsourcing Prioritized Warranty Repairs Peter S. Buczkowski University of North Carolina at Chapel Hill Department of Statistics and Operations Research Mark E. Hartmann University of North Carolina at

More information

Compact Representations and Approximations for Compuation in Games

Compact Representations and Approximations for Compuation in Games Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions

More information

The Advantages and Disadvantages of Online Linear Optimization

The Advantages and Disadvantages of Online Linear Optimization LINEAR PROGRAMMING WITH ONLINE LEARNING TATSIANA LEVINA, YURI LEVIN, JEFF MCGILL, AND MIKHAIL NEDIAK SCHOOL OF BUSINESS, QUEEN S UNIVERSITY, 143 UNION ST., KINGSTON, ON, K7L 3N6, CANADA E-MAIL:{TLEVIN,YLEVIN,JMCGILL,MNEDIAK}@BUSINESS.QUEENSU.CA

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

More information

Semi-Matchings for Bipartite Graphs and Load Balancing

Semi-Matchings for Bipartite Graphs and Load Balancing Semi-Matchings for Bipartite Graphs and Load Balancing Nicholas J. A. Harvey Richard E. Ladner László Lovász Tami Tamir Abstract We consider the problem of fairly matching the left-hand vertices of a bipartite

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Multiple Spanning Tree Protocol (MSTP), Multi Spreading And Network Optimization Model

Multiple Spanning Tree Protocol (MSTP), Multi Spreading And Network Optimization Model Load Balancing of Telecommunication Networks based on Multiple Spanning Trees Dorabella Santos Amaro de Sousa Filipe Alvelos Instituto de Telecomunicações 3810-193 Aveiro, Portugal dorabella@av.it.pt Instituto

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

Statistical Machine Learning

Statistical Machine Learning Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes

More information

QoS optimization for an. on-demand transportation system via a fractional linear objective function

QoS optimization for an. on-demand transportation system via a fractional linear objective function QoS optimization for an Load charge ratio on-demand transportation system via a fractional linear objective function Thierry Garaix, University of Avignon (France) Column Generation 2008 QoS optimization

More information

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation 6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma

More information

Section 1.1. Introduction to R n

Section 1.1. Introduction to R n The Calculus of Functions of Several Variables Section. Introduction to R n Calculus is the study of functional relationships and how related quantities change with each other. In your first exposure to

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

More information

LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014

LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014 LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING ----Changsheng Liu 10-30-2014 Agenda Semi Supervised Learning Topics in Semi Supervised Learning Label Propagation Local and global consistency Graph

More information

Random graphs with a given degree sequence

Random graphs with a given degree sequence Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.

More information

Integrating Benders decomposition within Constraint Programming

Integrating Benders decomposition within Constraint Programming Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP

More information

How To Find Local Affinity Patterns In Big Data

How To Find Local Affinity Patterns In Big Data Detection of local affinity patterns in big data Andrea Marinoni, Paolo Gamba Department of Electronics, University of Pavia, Italy Abstract Mining information in Big Data requires to design a new class

More information

Dimensioning an inbound call center using constraint programming

Dimensioning an inbound call center using constraint programming Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France ccanon@fr.snt.com

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation: CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Classification of Cartan matrices

Classification of Cartan matrices Chapter 7 Classification of Cartan matrices In this chapter we describe a classification of generalised Cartan matrices This classification can be compared as the rough classification of varieties in terms

More information

17.3.1 Follow the Perturbed Leader

17.3.1 Follow the Perturbed Leader CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.

More information

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS Journal of the Operations Research Society of Japan Vol. 45, No. 3, September 2002 2002 The Operations Research Society of Japan FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Graph Classification and Easy Reliability Polynomials

Graph Classification and Easy Reliability Polynomials Mathematical Assoc. of America American Mathematical Monthly 121:1 November 18, 2014 1:11 a.m. AMM.tex page 1 Graph Classification and Easy Reliability Polynomials Pablo Romero and Gerardo Rubino Abstract.

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,

More information

Constraint-Based Local Search for Constrained Optimum Paths Problems

Constraint-Based Local Search for Constrained Optimum Paths Problems Constraint-Based Local Search for Constrained Optimum Paths Problems Quang Dung PHAM 1, Yves DEVILLE 1, Pascal Van HENTENRYCK 2 1 Université catholique de Louvain B-1348 Louvain-la-Neuve, Belgium {quang.pham,yves.deville}@uclouvain.be

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information

Kent Business School. Working Paper Series. A Multi-Objective Heuristic Approach for the Casualty Collection Points Location Problam

Kent Business School. Working Paper Series. A Multi-Objective Heuristic Approach for the Casualty Collection Points Location Problam Kent Business School Working Paper Series ISSN 1748-7595 (Online) A Multi-Objective Heuristic Approach for the Casualty Collection Points Location Problam Tammy Drezner and Zvi Drezner California State

More information

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics

More information

P versus NP, and More

P versus NP, and More 1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued. Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.

More information

Binary Image Reconstruction

Binary Image Reconstruction A network flow algorithm for reconstructing binary images from discrete X-rays Kees Joost Batenburg Leiden University and CWI, The Netherlands kbatenbu@math.leidenuniv.nl Abstract We present a new algorithm

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

СLARA EXPERT VERBAL METHOD OF DETERMINING INVESTMENT RISK IN CONSTRUCTION

СLARA EXPERT VERBAL METHOD OF DETERMINING INVESTMENT RISK IN CONSTRUCTION СLARA EXPERT VERBAL METHOD OF DETERMINING INVESTMENT RISK IN CONSTRUCTION Leonas Ustinovičius 1, Dmitry Kochin 2, Galina Ševčenko 1, 1 Department of Construction Technology and Management, Vilnius Gediminas

More information

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

P vs NP problem in the field anthropology

P vs NP problem in the field anthropology Research Article P vs NP problem in the field anthropology Michael.A. Popov, Oxford, UK Email Michael282.eps@gmail.com Keywords P =?NP - complexity anthropology - M -decision - quantum -like game - game-theoretical

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Rita Girão-Silva 1,2*, José Craveirinha 1,2 and João Clímaco 2

Rita Girão-Silva 1,2*, José Craveirinha 1,2 and João Clímaco 2 Girão-Silva et al. Journal of Uncertainty Analysis and Applications 2014, 2:3 RESEARCH Open Access Stochastic hierarchical multiobjective routing model in MPLS networks with two service classes: an experimental

More information

Analysis of an Artificial Hormone System (Extended abstract)

Analysis of an Artificial Hormone System (Extended abstract) c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating

More information

Mining Social Network Graphs

Mining Social Network Graphs Mining Social Network Graphs Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata November 13, 17, 2014 Social Network No introduc+on required Really? We s7ll need to understand

More information

A Comparison of General Approaches to Multiprocessor Scheduling

A Comparison of General Approaches to Multiprocessor Scheduling A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA jing@jolt.mt.att.com Michael A. Palis Department of Computer Science Rutgers University

More information

Optimal Scheduling for Dependent Details Processing Using MS Excel Solver

Optimal Scheduling for Dependent Details Processing Using MS Excel Solver BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8, No 2 Sofia 2008 Optimal Scheduling for Dependent Details Processing Using MS Excel Solver Daniela Borissova Institute of

More information

Least Squares Estimation

Least Squares Estimation Least Squares Estimation SARA A VAN DE GEER Volume 2, pp 1041 1045 in Encyclopedia of Statistics in Behavioral Science ISBN-13: 978-0-470-86080-9 ISBN-10: 0-470-86080-4 Editors Brian S Everitt & David

More information

The Trip Scheduling Problem

The Trip Scheduling Problem The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems

More information

Machine Learning and Pattern Recognition Logistic Regression

Machine Learning and Pattern Recognition Logistic Regression Machine Learning and Pattern Recognition Logistic Regression Course Lecturer:Amos J Storkey Institute for Adaptive and Neural Computation School of Informatics University of Edinburgh Crichton Street,

More information

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy

More information

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Load balancing in a heterogeneous computer system by self-organizing Kohonen network Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.

More information

most 4 Mirka Miller 1,2, Guillermo Pineda-Villavicencio 3, The University of Newcastle Callaghan, NSW 2308, Australia University of West Bohemia

most 4 Mirka Miller 1,2, Guillermo Pineda-Villavicencio 3, The University of Newcastle Callaghan, NSW 2308, Australia University of West Bohemia Complete catalogue of graphs of maimum degree 3 and defect at most 4 Mirka Miller 1,2, Guillermo Pineda-Villavicencio 3, 1 School of Electrical Engineering and Computer Science The University of Newcastle

More information

Data Structures and Algorithms

Data Structures and Algorithms Data Structures and Algorithms Computational Complexity Escola Politècnica Superior d Alcoi Universitat Politècnica de València Contents Introduction Resources consumptions: spatial and temporal cost Costs

More information

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College

More information