Online Supplement for An integer programming approach for fault-tolerant connected dominating sets
|
|
- Estella May
- 5 years ago
- Views:
Transcription
1 Submitted to INFORMS Journal on Computing manuscript (Please, provide the mansucript number!) Authors are encouraged to submit new papers to INFORMS journals by means of a style file template, which includes the journal title. However, use of a template does not certify that the paper has been accepted for publication in the named journal. INFORMS journal templates are for the exclusive purpose of submitting to an INFORMS journal and should not be used to distribute the papers in print or online or to submit the papers to another publication. Online Supplement for An integer programming approach for fault-tolerant connected dominating sets Austin Buchanan Industrial & Systems Engineering, Texas A&M University, College Station, TX , USA, buchanan@tamu.edu, Je Sang Sung Industrial & Systems Engineering, Texas A&M University, College Station, TX , USA, je.sung@tamu.edu, Sergiy Butenko Industrial & Systems Engineering, Texas A&M University, College Station, TX , USA, butenko@tamu.edu, Eduardo L. Pasiliao Air Force Research Laboratory, Munitions Directorate, Eglin, FL 32542, USA, eduardo.pasiliao@eglin.af.mil, In this online supplement, we provide detailed computational results for solving the minimum k-d-cds problem using a lazy-constraint approach. We also list all facets of the 1-1-CDS polytope of the Grötzsch graph. Key words : connected dominating set; k-connected m-dominating set; integer programming; fault-tolerant History : In this online supplement, we provide detailed computational results for solving the minimum k-d-cds problem using a lazy-constraint approach. We also list all facets of the 1-1-CDS polytope of the Grötzsch graph. For information not discussed here, please see Section 4.1 of the main paper. All of our computational experiments were conducted on a Dell Precision WorkStation T7500 R machine with two Intel Xeon R E GHz quad-core processors and 12 GB RAM. The solver used was Gurobi Optimizer version 5.5 with its lazy-constraint callback (Gurobi Optimization, Inc 2013). In Table 1, we compare the runtime of the lazy-constraint approach (referred to in the table as Lazy ) with other approaches for the MCDS problem. The first six approaches 1
2 2 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) were proposed by Gendron et al. (2014), and include stand-alone (SA) and iterative-probing (IP) versions of Bender s decomposition (BE), branch-and-cut (BC), and a hybrid (HY) of BE and BC. The next three approaches are as follows: p-sabc is a branch-and-cut approach from Simonetti et al. (2011); DGR is a branch-and-cut approach from Lucena et al. (2010); and MTZ uses Miller-Tucker-Zemlin constraints to enforce connectivity (as proposed by Fan and Watson (2012)). We note that the experiments of Gendron et al. (2014) for the first six approaches and the MTZ approach were conducted on a 2.0 GHz Intel Xeon R E5405 machine with 8 GB RAM. More details regarding the experiments for 1-1-CDS can be found in Tables 2 and 3. Table 2 includes the initial LP relaxation, the number of lazy cuts added, and the number of branch-and-bound nodes. Table 3 compares the computational effort expended when using arbitrary vertex-cuts versus minimal vertex-cuts. In Table 4, we report experimental results for the minimum 2-1-CDS problem using the lazy approach. A minimal vertex-cut C can be an a-b separator for many choices of a and b leading to numerous possible lazy cuts. It was not clear to us which or how many of them should be used. This lead us to consider two possible approaches: (Single cut) add the a-b-separator inequality for which a and b are the lexicographically smallest, and (All cuts) add all possible a-b-separator inequalities. In Table 5, we provide runtimes and solution sizes for the same instances for both the minimum k-total dominating set (ktds) problem and the minimum k-k-cds problem for k = 1, 2, 3, 4. Recall that the minimum k-total dominating set problem can be stated as (minimum ktds problem) min x i x {0,1} n x j k, v V. i V j N(v) 1. CDS facets for the Grötzsch graph The convex hull of characteristic vectors of 1-1-CDSs of the Mycielski graph (Mycielski 1955) on eleven vertices (also known as the Grötzsch graph) is not fully described by the r-robust vertex-cut inequalities. Below are all facet-defining inequalities except for the trivial 0-1 facets as given by PORTA (Christof et al. 1997). The vertex numbering is the same as in the graph file provided by Michael Trick for the DIMACS coloring challenge (Trick 2013).
3 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 3 x1+ x2+ x3+ x4+ x5+ x6+ x7+ x8+ x9+ x10+ x11 >= 4 x1+ x2+ x3+ x4+ x5+ x6 + x8 +2x11 >= 3 x1+ x2+ x3+ x4+ x5+ x6 + x10+2x11 >= 3 x1+ x2+ x3+ x4+ x5 + x7 + x9 +2x11 >= 3 x1+ x2+ x3+ x4+ x5 + x7 + x10+2x11 >= 3 x1+ x2+ x3+ x4+ x5 + x8+ x9 +2x11 >= 3 2x1 + x3 + x5+2x6+ x7+ x8+ x9+ x10+ x11 >= 3 x1+ x2 +2x5+ x6+ x7+ x8+ x9+2x10+ x11 >= 3 x1 +2x3+ x4 + x6+ x7+2x8+ x9+ x10+ x11 >= 3 2x2 + x4+ x5+ x6+2x7+ x8+ x9+ x10+ x11 >= 3 x2+ x3+2x4 + x6+ x7+ x8+2x9+ x10+ x11 >= 3 x1+ x2+ x3+ x4+ x5 +3x11 >= 3 x1+ x2+ x3+ x4 + x8+ x9 + x11 >= 2 x1+ x2+ x3 + x5+ x6 + x10+ x11 >= 2 x1+ x2 + x4+ x5 + x7 + x10+ x11 >= 2 x1 + x3+ x4+ x5+ x6 + x8 + x11 >= 2 x2+ x3+ x4+ x5 + x7 + x9 + x11 >= 2 x1+ x2 + x5+ x6+ x7+ x8+ x9+2x10 >= 2 x1 + x3+ x4 + x6+ x7+2x8+ x9+ x10 >= 2 x1 + x3 + x5+2x6+ x7+ x8+ x9+ x10 >= 2 x2+ x3+ x4 + x6+ x7+ x8+2x9+ x10 >= 2 x2 + x4+ x5+ x6+2x7+ x8+ x9+ x10 >= 2 x1 + x3 + x11 >= 1 x1 + x5 + x11 >= 1 x2 + x4 + x11 >= 1 x2 + x5 + x11 >= 1 x3+ x4 + x11 >= 1 x1 + x3 + x6 + x8 >= 1 x1 + x5+ x6 + x10 >= 1 x2 + x4 + x7 + x9 >= 1 x2 + x5 + x7 + x10 >= 1 x3+ x4 + x8+ x9 >= 1 x6+ x7+ x8+ x9+ x10 >= 1 References Christof, T., A. Löbel, M. Stoer PORTA-polyhedron representation transformation algorithm. URL Fan, N., J.P. Watson Solving the connected dominating set problem and power dominating set problem by integer programming. G. Lin, ed., Combinatorial Optimization and Applications, Lecture Notes in Computer Science, vol Springer,
4 4 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) Gendron, B., A. Lucena, A.S. da Cunha, L. Simonetti Benders decomposition, branch-and-cut, and hybrid algorithms for the minimum connected dominating set problem. INFORMS Journal on Computing To Appear. Gurobi Optimization, Inc Gurobi Optimizer Reference Manual. URL Lucena, A., N. Maculan, L. Simonetti Reformulations and solution algorithms for the maximum leaf spanning tree problem. Computational Management Science Mycielski, J Sur le coloriage des graphes. Colloq. Math Simonetti, L., A.S. da Cunha, A. Lucena The minimum connected dominating set problem: formulation, valid inequalities and a branch-and-cut algorithm. Network Optimization Trick, M Graph coloring instances. URL
5 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 5 Table 1 A comparison of runtimes, in seconds, to solve the MCDS problem (i.e., minimum 1-1-CDS). Aside from the Lazy approach, all times are from Gendron et al. (2014). A dash indicates unsolved in time limit. Instance SABE IPBE SABC IPBC SAHY IPHY p-sabc DGR MTZ Lazy v30 d v30 d v30 d v30 d v30 d v50 d v50 d v50 d v50 d v50 d v50 d v70 d v70 d v70 d v70 d v70 d v70 d v100 d v100 d v100 d v100 d v100 d v100 d v120 d v120 d v120 d v120 d v120 d v120 d v150 d v150 d v150 d v150 d v150 d v150 d v200 d v200 d v200 d v200 d v200 d v200 d IEEE-14-Bus IEEE-30-Bus IEEE-57-Bus RTS IEEE-118-Bus IEEE-300-Bus # in 1 sec # in 10 sec # in 100 sec # in 1000 sec # solved # fastest
6 6 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) Table 2 Extended computational results for solving the minimum 1-1-CDS problem using the lazy approach. Instance IP Opt Root LP # Lazy cuts # B&B nodes IP Time v30 d v30 d v30 d v30 d v30 d v50 d , v50 d v50 d v50 d v50 d v50 d v70 d , v70 d v70 d v70 d v70 d v70 d v100 d , v100 d v100 d v100 d , v100 d v100 d v120 d v120 d v120 d , v120 d , v120 d v120 d v150 d , v150 d , v150 d , v150 d , v150 d v150 d v200 d , v200 d ,182, v200 d , v200 d , v200 d , v200 d IEEE-14-Bus IEEE-30-Bus IEEE-57-Bus , RTS , IEEE-118-Bus IEEE-300-Bus , ,
7 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 7 Table 3 The effect of Algorithm 1 on reducing the computational effort for the minimum 1-1-CDS problem. Without Algorithm 1 With Algorithm 1 Instance # Lazy cuts # B&B nodes Time # Lazy cuts # B&B nodes Time v30 d10 54,750 81, v30 d v30 d v30 d v30 d v50 d5 >110,425 >125,657 > , v50 d v50 d v50 d v50 d v50 d v70 d5 >88,233 >97,749 > , v70 d v70 d v70 d v70 d v70 d v100 d5 10,266 14, , v100 d v100 d v100 d30 0 1, , v100 d v100 d v120 d , v120 d v120 d20 0 2, , v120 d30 0 2, , v120 d v120 d v150 d5 1,125 15, , v150 d , , v150 d , , v150 d30 1 5, , v150 d v150 d v200 d , , v200 d10 6 2,220, ,182, v200 d , , v200 d , , v200 d50 0 1, , v200 d IEEE-14-Bus IEEE-30-Bus IEEE-57-Bus >102,288 >116,896 > , RTS96 >78,608 >77,532 > , IEEE-118-Bus >67,771 >43,083 > IEEE-300-Bus >39,576 >86,494 > , ,
8 8 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) Table 4 Comparing two approaches for solving minimum 2-1-CDS: adding a single lazy cut versus adding all lazy cuts. IP Opt Single cut All cuts # Lazy Cuts # B&B nodes Time # Lazy Cuts # B&B nodes Time v30 d v30 d v30 d v30 d v30 d v50 d v50 d v50 d v50 d v50 d v50 d v70 d v70 d v70 d v70 d v70 d v70 d v100 d v100 d v100 d , , v100 d , , v100 d v100 d v120 d v120 d v120 d , , v120 d , , v120 d v120 d v150 d , , v150 d , , v150 d , , v150 d , , v150 d v150 d v200 d , , v200 d , ,328, v200 d ,296, , v200 d , , v200 d v200 d IEEE IEEE IEEE RTS , IEEE IEEE
9 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 9 Table 5 A comparison of running times for minimum k-total dominating set and minimum k-k-cds. Blank entries denote that the instance is infeasible. 1TDS 1-1-CDS 2TDS 2-2-CDS 3TDS 3-3-CDS 4TDS 4-4-CDS Graph Opt Time Opt Time Opt Time Opt Time Opt Time Opt Time Opt Time Opt Time v30 d v30 d v30 d v30 d v30 d v50 d v50 d v50 d v50 d v50 d v50 d v70 d v70 d v70 d v70 d v70 d v70 d v100 d v100 d v100 d v100 d v100 d v100 d v120 d v120 d v120 d v120 d v120 d v120 d v150 d v150 d v150 d v150 d v150 d v150 d v200 d v200 d , , , , , , v200 d , , , , v200 d , , , , v200 d , , v200 d
Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks
Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional
More informationThe Wireless Network Jamming Problem Subject to Protocol Interference
The Wireless Network Jamming Problem Subject to Protocol Interference Author information blinded December 22, 2014 Abstract We study the following problem in wireless network security: Which jamming device
More informationA Memory-Efficient Method for Fast Computation of Short 15-Puzzle Solutions
A Memory-Efficient Method for Fast Computation of Short 15-Puzzle Solutions Ian Parberry Technical Report LARC-2014-02 Laboratory for Recreational Computing Department of Computer Science & Engineering
More informationA new mixed integer linear programming formulation for one problem of exploration of online social networks
manuscript No. (will be inserted by the editor) A new mixed integer linear programming formulation for one problem of exploration of online social networks Aleksandra Petrović Received: date / Accepted:
More informationDecoding Turbo Codes and LDPC Codes via Linear Programming
Decoding Turbo Codes and LDPC Codes via Linear Programming Jon Feldman David Karger jonfeld@theorylcsmitedu karger@theorylcsmitedu MIT LCS Martin Wainwright martinw@eecsberkeleyedu UC Berkeley MIT LCS
More informationTwo-stage column generation and applications in container terminal management
Two-stage column generation and applications in container terminal management Ilaria Vacca Matteo Salani Michel Bierlaire Transport and Mobility Laboratory EPFL 8th Swiss Transport Research Conference
More informationA GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS
A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless
More informationBranch-and-cut for a real-life highly constrained soccer tournament scheduling problem
Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem Guillermo Durán 1, Thiago F. Noronha 2, Celso C. Ribeiro 3, Sebastián Souyris 1, and Andrés Weintraub 1 1 Department
More informationColumn Generation. A short Introduction. Martin Riedler. AC Retreat
Column Generation A short Introduction Martin Riedler AC Retreat Contents 1 Introduction 2 Motivation 3 Further Notes MR Column Generation June 29 July 1 2 / 13 Basic Idea We already heard about Cutting
More informationMULTI-STAGE TRANSMISSION EXPANSION PLANNING CONSIDERING MULTIPLE DISPATCHES AND CONTINGENCY CRITERION
MULTI-STAGE TRANSMISSION EXPANSION PLANNING CONSIDERING MULTIPLE DISPATCHES AND CONTINGENCY CRITERION GERSON C. OLIVEIRA, SILVIO BINATO, MARIO V. PEREIRA, LUIZ M. THOMÉ PSR CONSULTORIA LTDA R. VOLUNTARIOS
More informationFrom Shared Memory to Message Passing
From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich
More informationComputational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010
Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)
More informationA GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks
MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio
More informationFinding First and Most-Beautiful Queens by Integer Programming
Finding First and Most-Beautiful Queens by Integer Programming Matteo Fischetti a,, Domenico Salvagnin a a DEI, University of Padova, Italy Abstract The n-queens puzzle is a well-known combinatorial problem
More informationAnalysis of Power Assignment in Radio Networks with Two Power Levels
Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two
More informationAn efficient and robust approach to generate high quality solutions for the Traveling Tournament Problem
An efficient and robust approach to generate high quality solutions for the Traveling Tournament Problem Douglas Moody, Graham Kendall and Amotz Bar-Noy City University of New York Graduate Center and
More informationAn applied optimization based method for line planning to minimize travel time
Downloaded from orbit.dtu.dk on: Dec 15, 2017 An applied optimization based method for line planning to minimize travel time Bull, Simon Henry; Rezanova, Natalia Jurjevna; Lusby, Richard Martin ; Larsen,
More informationCommon Mistakes. Quick sort. Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen.
Common Mistakes Examples of typical mistakes Correct version Quick sort Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen. e.g. Use a quick sort to sort the
More informationComplete and Incomplete Algorithms for the Queen Graph Coloring Problem
Complete and Incomplete Algorithms for the Queen Graph Coloring Problem Michel Vasquez and Djamal Habet 1 Abstract. The queen graph coloring problem consists in covering a n n chessboard with n queens,
More informationComputing Explanations for the Unary Resource Constraint
Computing Explanations for the Unary Resource Constraint Petr Vilím Charles University Faculty of Mathematics and Physics Malostranské náměstí 2/25, Praha 1, Czech Republic vilim@kti.mff.cuni.cz Abstract.
More informationOptimization of On-line Appointment Scheduling
Optimization of On-line Appointment Scheduling Brian Denton Edward P. Fitts Department of Industrial and Systems Engineering North Carolina State University Tsinghua University, Beijing, China May, 2012
More informationAn improved strategy for solving Sudoku by sparse optimization methods
An improved strategy for solving Sudoku by sparse optimization methods Yuchao Tang, Zhenggang Wu 2, Chuanxi Zhu. Department of Mathematics, Nanchang University, Nanchang 33003, P.R. China 2. School of
More informationLocalization (Position Estimation) Problem in WSN
Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless
More informationDesign of Parallel Algorithms. Communication Algorithms
+ Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter
More informationUsing hybrid optimization algorithms for very-large graph problems and for small real-time problems
Using hybrid optimization algorithms for very-large graph problems and for small real-time problems Karla Hoffman George Mason University Joint work with: Brian Smith, Tony Coudert, Rudy Sultana and James
More informationADC Bit Optimization for Spectrum- and Energy-Efficient Millimeter Wave Communications
ADC Bit Optimization for Spectrum- and Energy-Efficient Millimeter Wave Communications Jinseok Choi, Junmo Sung, Brian Evans, and Alan Gatherer* Electrical and Computer Engineering, The University of Texas
More informationA TREE-SEARCH BASED HEURISTIC FOR A COMPLEX STACKING PROBLEM WITH CONTINUOUS PRODUCTION AND RETRIEVAL
A TREE-SEARCH BASED HEURISTIC FOR A COMPLEX STACKING PROBLEM WITH CONTINUOUS PRODUCTION AND RETRIEVAL Sebastian Raggl (a), Beham Andreas (b), Fabien Tricoire (c), Michael Affenzeller (d) (a,b,d) Heuristic
More informationTransportation Timetabling
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling
More informationAutomated Antenna Positioning for Wireless Networks
Automated Antenna Positioning for Wireless Networks Amit Dvir, Yehuda Ben-Shimol, Yoav Ben-Yehezkel, Michael Segal Department of Communication Systems Engineering, Ben Gurion University, Israel Boaz Ben-Moshe
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationAn Illustrated Guide To Linear Programming By Dr. Saul I. Gass
An Illustrated Guide To Linear Programming By Dr. Saul I. Gass An Illustrated Guide to Linear Programming has 25 ratings and 4 reviews. James said: An Illustrated Guide to Linear Programming is a bare-bones
More informationEdge-disjoint tree representation of three tree degree sequences
Edge-disjoint tree representation of three tree degree sequences Ian Min Gyu Seong Carleton College seongi@carleton.edu October 2, 208 Ian Min Gyu Seong (Carleton College) Trees October 2, 208 / 65 Trees
More informationarxiv: v1 [cs.dm] 2 Jul 2018
A SAT Encoding for the n-fractions Problem Michael Codish Department of Computer Science, Ben-Gurion University of the Negev, Israel arxiv:1807.00507v1 [cs.dm] 2 Jul 2018 Abstract. This note describes
More informationCOMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba
COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More informationAircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study
Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study Pedro Munari, Aldair Alvarez Production Engineering Department, Federal University
More informationAdverserial Search Chapter 5 minmax algorithm alpha-beta pruning TDDC17. Problems. Why Board Games?
TDDC17 Seminar 4 Adversarial Search Constraint Satisfaction Problems Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning 1 Why Board Games? 2 Problems Board games are one of the oldest branches
More informationA Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters
A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters Ahmad Faraj Xin Yuan Pitch Patarasuk Department of Computer Science, Florida State University Tallahassee,
More informationA Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification
A Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification 8.2 Dionysios Kouroussis Department of ECE University of Toronto Toronto, Ontario, Canada diony@eecg.utoronto.ca Farid
More information06M1 Lecture Frequency Assignment for GSM Mobile Phone Systems
06M1 Lecture Frequency Assignment for GSM Mobile Phone Systems Martin Grötschel Block Course at TU Berlin "Combinatorial Optimization at Work October 4 15, 2005 Martin Grötschel groetschel@zib.de Institut
More informationParallel Partition and Extension:
Parallel Partition and Extension: Better Permutation Arrays for Hamming Distances Sergey Bereg, Luis Gerardo Mojica, Linda Morales and Hal Sudborough Department of Computer Science, University of Texas
More informationYield-driven Robust Iterative Circuit Optimization
Yield-driven Robust Iterative Circuit Optimization Yan Li, Vladimir Stojanovic July 29, 2009 Integrated System Group Massachusetts Institute of Technology Systems-on-chip is difficult to design Integrated
More informationCSE 473 Midterm Exam Feb 8, 2018
CSE 473 Midterm Exam Feb 8, 2018 Name: This exam is take home and is due on Wed Feb 14 at 1:30 pm. You can submit it online (see the message board for instructions) or hand it in at the beginning of class.
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationTHE WIRELESS NETWORK JAMMING PROBLEM
THE WIRELESS NETWORK JAMMING PROBLEM CLAYTON W. COMMANDER, PANOS M. PARDALOS, VALERIY RYABCHENKO, STAN URYASEV, AND GRIGORIY ZRAZHEVSKY ABSTRACT. In adversarial environments, disabling the communication
More informationAnnual Conference of the IEEE Industrial Electronics Society - IECON(39.,2013, Vienna, Áustria
Universidade de São Paulo Biblioteca Digital da Produção Intelectual - BDPI Departamento de Engenharia Elétrica - EESC/SEL Comunicações em Eventos - EESC/SEL 2013-11 Combining subpopulation tables, nondominated
More informationVEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL
VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu
More informationSOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique
More informationand 6.855J. Network Simplex Animations
.8 and 6.8J Network Simplex Animations Calculating A Spanning Tree Flow -6 7 6 - A tree with supplies and demands. (Assume that all other arcs have a flow of ) What is the flow in arc (,)? Calculating
More informationNetwork Flow Based Datapath Bit Slicing
Network Flow Based Bit licing Hua Xiang Minsik Cho Haoxing Ren Matthew Ziegler Ruchir Puri 03/27/2013 Introduction s are composed of bit slices What are bit slices? For ideal datapath, each bit should
More informationCS 171, Intro to A.I. Midterm Exam Fall Quarter, 2016
CS 171, Intro to A.I. Midterm Exam all Quarter, 2016 YOUR NAME: YOUR ID: ROW: SEAT: The exam will begin on the next page. Please, do not turn the page until told. When you are told to begin the exam, please
More informationPhysical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications
Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications Renshen Wang 1, Evangeline Young 2, Ronald Graham 1 and Chung-Kuan Cheng 1 1 University of California San Diego 2 The
More informationTowards Real-Time Volunteer Distributed Computing
Towards Real-Time Volunteer Distributed Computing Sangho Yi 1, Emmanuel Jeannot 2, Derrick Kondo 1, David P. Anderson 3 1 INRIA MESCAL, 2 RUNTIME, France 3 UC Berkeley, USA Motivation Push towards large-scale,
More informationDiffusion of Networking Technologies
Diffusion of Networking Technologies ISP Bellairs Workshop on Algorithmic Game Theory Barbados April 2012 Sharon Goldberg Boston University Princeton University Zhenming Liu Harvard University Diffusion
More informationLectures: Feb 27 + Mar 1 + Mar 3, 2017
CS420+500: Advanced Algorithm Design and Analysis Lectures: Feb 27 + Mar 1 + Mar 3, 2017 Prof. Will Evans Scribe: Adrian She In this lecture we: Summarized how linear programs can be used to model zero-sum
More informationSolution of the Airline ToD Problem using Severely Limited Subsequence
Solution of the Airline ToD Problem using Severely Limited Subsequence James Priestley Department of Engineering Science University of Auckland New Zealand j.priestley@aucland.ac.nz Abstract The minimum-cost
More informationCSC384 Introduction to Artificial Intelligence : Heuristic Search
CSC384 Introduction to Artificial Intelligence : Heuristic Search September 18, 2014 September 18, 2014 1 / 12 Heuristic Search (A ) Primary concerns in heuristic search: Completeness Optimality Time complexity
More informationDimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings
Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings Feng Su 1, Jiqiang Song 1, Chiew-Lan Tai 2, and Shijie Cai 1 1 State Key Laboratory for Novel Software Technology,
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationFOUR TOTAL TRANSFER CAPABILITY. 4.1 Total transfer capability CHAPTER
CHAPTER FOUR TOTAL TRANSFER CAPABILITY R structuring of power system aims at involving the private power producers in the system to supply power. The restructured electric power industry is characterized
More informationUsing Nested Column Generation & Generic Programming to solve Staff Scheduling Problems:
Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems: Using Compile-time Customisation to create a Flexible C++ Engine for Staff Rostering Andrew Mason & Ed Bulog Department
More informationComparing BFS, Genetic Algorithms, and the Arc-Constancy 3 Algorithm to solve N Queens and Cross Math
Comparing BFS, Genetic Algorithms, and the Arc-Constancy 3 Algorithm to solve N Queens and Cross Math Peter Irvine College of Science And Engineering University of Minnesota Minneapolis, Minnesota 55455
More informationCCO Commun. Comb. Optim.
Communications in Combinatorics and Optimization Vol. 2 No. 2, 2017 pp.149-159 DOI: 10.22049/CCO.2017.25918.1055 CCO Commun. Comb. Optim. Graceful labelings of the generalized Petersen graphs Zehui Shao
More informationEric J. Nava Department of Civil Engineering and Engineering Mechanics, University of Arizona,
A Temporal Domain Decomposition Algorithmic Scheme for Efficient Mega-Scale Dynamic Traffic Assignment An Experience with Southern California Associations of Government (SCAG) DTA Model Yi-Chang Chiu 1
More information10/5/2015. Constraint Satisfaction Problems. Example: Cryptarithmetic. Example: Map-coloring. Example: Map-coloring. Constraint Satisfaction Problems
0/5/05 Constraint Satisfaction Problems Constraint Satisfaction Problems AIMA: Chapter 6 A CSP consists of: Finite set of X, X,, X n Nonempty domain of possible values for each variable D, D, D n where
More informationHarold Benson American Economic Institutions Professor of Information Systems and Operations Management
Harold Benson American Economic Institutions Professor of Information Systems and Operations Management Biography Interests: Global optimization, Multiple criteria decision making, Management science,
More informationAlgorithm Performance For Chessboard Separation Problems
Algorithm Performance For Chessboard Separation Problems R. Douglas Chatham Maureen Doyle John J. Miller Amber M. Rogers R. Duane Skaggs Jeffrey A. Ward April 23, 2008 Abstract Chessboard separation problems
More informationLocally Informed Global Search for Sums of Combinatorial Games
Locally Informed Global Search for Sums of Combinatorial Games Martin Müller and Zhichao Li Department of Computing Science, University of Alberta Edmonton, Canada T6G 2E8 mmueller@cs.ualberta.ca, zhichao@ualberta.ca
More informationFree Cell Solver. Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001
Free Cell Solver Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001 Abstract We created an agent that plays the Free Cell version of Solitaire by searching through the space of possible sequences
More informationSurvey of VLSI Adders
Survey of VLSI Adders Swathy.S 1, Vivin.S 2, Sofia Jenifer.S 3, Sinduja.K 3 1UG Scholar, Dept. of Electronics and Communication Engineering, SNS College of Technology, Coimbatore- 641035, Tamil Nadu, India
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,
More informationTowards Ultra Rapid Restarts
Towards Ultra Rapid Restarts Shai Haim 1 and Marijn Heule 2 1 University of New South Wales and NICTA, Sydney, Australia 2 Delft University of Technology, Delft, The Netherlands Abstract. We observe a
More informationControl of the Contract of a Public Transport Service
Control of the Contract of a Public Transport Service Andrea Lodi, Enrico Malaguti, Nicolás E. Stier-Moses Tommaso Bonino DEIS, University of Bologna Graduate School of Business, Columbia University SRM
More informationPermutation Tableaux and the Dashed Permutation Pattern 32 1
Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn
More informationAlexandre Fréchette, Neil Newman, Kevin Leyton-Brown
Solving the Station Repacking Problem Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Agenda Background Problem Novel Approach Experimental Results Background A Brief History Spectrum rights have
More informationGeneralized Game Trees
Generalized Game Trees Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, Ca. 90024 Abstract We consider two generalizations of the standard two-player game
More informationCITS2211 Discrete Structures Turing Machines
CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new
More informationOn the Combination of Constraint Programming and Stochastic Search: The Sudoku Case
On the Combination of Constraint Programming and Stochastic Search: The Sudoku Case Rhydian Lewis Cardiff Business School Pryfysgol Caerdydd/ Cardiff University lewisr@cf.ac.uk Talk Plan Introduction:
More informationTraffic Grooming for WDM Rings with Dynamic Traffic
1 Traffic Grooming for WDM Rings with Dynamic Traffic Chenming Zhao J.Q. Hu Department of Manufacturing Engineering Boston University 15 St. Mary s Street Brookline, MA 02446 Abstract We study the problem
More informationCross-layer Wireless Networking:
Cross-layer Wireless Networking: Complexity, Approximation, and Opportunities for SP Research Nikos Sidiropoulos Dept. ECE, TU Crete IEEE SPAWC, 23/6/21 Nikos Sidiropoulos (Dept. ECE, TU Crete) Cross-layer
More informationAlgorithms for Data Structures: Search for Games. Phillip Smith 27/11/13
Algorithms for Data Structures: Search for Games Phillip Smith 27/11/13 Search for Games Following this lecture you should be able to: Understand the search process in games How an AI decides on the best
More informationCS510 \ Lecture Ariel Stolerman
CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will
More informationMulticast beamforming and admission control for UMTS-LTE and e
Multicast beamforming and admission control for UMTS-LTE and 802.16e N. D. Sidiropoulos Dept. ECE & TSI TU Crete - Greece 1 Parts of the talk Part I: QoS + max-min fair multicast beamforming Part II: Joint
More informationSudoku Solvers. A Different Approach. DD143X Degree Project in Computer Science, First Level CSC KTH. Supervisor: Michael Minock
Sudoku Solvers A Different Approach DD143X Degree Project in Computer Science, First Level CSC KTH Supervisor: Michael Minock Christoffer Nilsson Professorsslingan 10 114 17 Stockholm Tel: 073-097 87 24
More informationNeighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities
Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities Bernardetta Addis, Giuliana Carello Alberto Ceselli Dipartimento di Elettronica e Informazione,
More informationDecision Mathematics D1 Advanced/Advanced Subsidiary. Friday 17 May 2013 Morning Time: 1 hour 30 minutes
Paper Reference(s) 6689/01R Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Friday 17 May 2013 Morning Time: 1 hour 30 minutes Materials required for examination Nil Items included with
More informationThe Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis
The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis Jeffery L. Kennington Mark W. Lewis Department of Computer
More informationSection Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46
Name: CS 331 Midterm Spring 2017 You have 50 minutes to complete this midterm. You are only allowed to use your textbook, your notes, your assignments and solutions to those assignments during this midterm.
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationEnergy Efficient Scheduling Techniques For Real-Time Embedded Systems
Energy Efficient Scheduling Techniques For Real-Time Embedded Systems Rabi Mahapatra & Wei Zhao This work was done by Rajesh Prathipati as part of his MS Thesis here. The work has been update by Subrata
More informationMinimization of Dynamic and Static Power Through Joint Assignment of Threshold Voltages and Sizing Optimization
Minimization of Dynamic and Static Power Through Joint Assignment of Threshold Voltages and Sizing Optimization David Nguyen, Abhijit Davare, Michael Orshansky, David Chinnery, Brandon Thompson, and Kurt
More informationDummy Fill as a Reduction to Chip-Firing
Dummy Fill as a Reduction to Chip-Firing Robert Ellis CSE 291: Heuristics and VLSI Design (Andrew Kahng) Preliminary Project Report November 27, 2001 1 Introduction 1.1 Chip-firing games Chip-firing games
More informationOn Range of Skill. Thomas Dueholm Hansen and Peter Bro Miltersen and Troels Bjerre Sørensen Department of Computer Science University of Aarhus
On Range of Skill Thomas Dueholm Hansen and Peter Bro Miltersen and Troels Bjerre Sørensen Department of Computer Science University of Aarhus Abstract At AAAI 07, Zinkevich, Bowling and Burch introduced
More information22c:145 Artificial Intelligence
22c:145 Artificial Intelligence Fall 2005 Informed Search and Exploration II Cesare Tinelli The University of Iowa Copyright 2001-05 Cesare Tinelli and Hantao Zhang. a a These notes are copyrighted material
More informationInverse Shortest Path Algorithms in Protected UMTS Access Networks
Inverse Shortest Path lgorithms in Protected UMTS ccess Networks István Gódor, Jás Harmatos and lpár Jüttner Ericsson esearch, Traffic nalysis and Network Performance Laboratory, PO 07, H-300 udapest,
More informationSignal Recovery from Random Measurements
Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse
More informationMinimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks
1 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta, and Samir R. Das {anandps, hgupta, samir}@cs.sunysb.edu Stony Brook University,
More informationCoordinated Scheduling and Power Control in Cloud-Radio Access Networks
Coordinated Scheduling and Power Control in Cloud-Radio Access Networks Item Type Article Authors Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim Citation Coordinated Scheduling
More informationW-CDMA network design. Joakim Kalvenes. Jeffery Kennington and Eli V. Olinick
Int. J. Mobile Network Design and Innovation, Vol. X, No. Y, XXXX 1 W-CDMA network design Qibin Cai* Verizon Business, Network Engineering Systems, Richardson, TX, USA E-mail: kevin.cai@verizonbusiness.com
More informationOptimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function
Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering
More information