A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology

Size: px
Start display at page:

Download "A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology"

Transcription

1 A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology Carlos A. S. OLIVEIRA CAO Lab, Dept. of ISE, University of Florida Gainesville, FL 32611, USA David PAOLINI Cingular Wireless Corporation Panos M. PARDALOS CAO Lab., Dept. of ISE, University of Florida Gainesville, FL 32611, USA ABSTRACT We present a computational approach to a practical problem occurring in the mobile telecommunications industry. Due to changes in cellular technology, there is sometimes the necessity of moving users from one network to another (in this case from TDMA to GSM). In this paper we address the problem of minimizing the number of users affected by changes in cellular technology, subject to the constraint that the selected users must be uniformly spread along the covered area. The resulting problem is shown to be NP-hard and a Lagrangian relaxation method is used to find approximate results. We also propose a heuristic algorithm, which is shown to give good results for some instances. Keywords: Telecommunications, Cellular Telephony, Heuristics, Simulated Annealing, Massive Data Sets. 1. INTRODUCTION In the world of mobile telecommunications, many competing technologies are available to be used by cellular carriers. Eventually there is a necessity of changing from one technology to another, and at the same time maintaining the quality of service. In this paper we discuss the problem involving a change from TDMA to GSM technology. The change is planned to be done progressively, and at first just a certain number of users should be selected to change 303 Weil Hall, University of Florida, Gainesville, USA, Phone: 1 (352) Fax: 1 (352) addresses: {oliveira,pardalos}@ise.ufl.edu from one network to another. The number of users moved from the TDMA network must be proportional to the amount of channels assigned to the new GSM network. Moreover, the selected users must be spread evenly all over the network because the number of new GSM channels in each base station will be approximately equal. In the formulation of the problem we consider some characteristics of user access as occurring in practice. For example, in each call more than one cell is usually involved: the (possibly distinct) originating and destination cells along with the cells for which hand-offs are directed. The problem input is the data generated by usage of the cellular network during a period of days. To avoid unnecessary optimization, only the information about peak hours of usage (say, during two hours each day) is used as a baseline. It must be considered that there is a relatively large variability in usage data from day to day, since users have different calling patterns. For example, some users make calls in specific days only (e.g., each Tuesday and Thursday). The established goal for the problem we are modeling is to select which users to change from TDMA to GSM. In this process, we wish to minimize the total number of users affected by the change and at the same time guarantee that they will have a suitable service with the new available GSM capacity. It is also interesting to keep a minimum usage of this new GSM capacity. For example, we must ensure that each cell has at least some of the selected GSM users. It must be clear that the methods used in this paper are general enough to be applied to other technologies other than GSM and TDMA. This is true, since we consider a general selection problem, with the required constraints added. The available data con-

2 sists of daily listings of calls in a specified region, with source and destination cells, duration, and number of hand-offs made during each call. Some real instances of the problem can generate a large amount of data, with some examples having around 100 MB of size per day. Considering all variation and massive size of the data, it seams clear that its very difficult to give an exact solution to this scenario. We will show later that the resulting binary problem is NP-hard. That is why in this paper we are interested in giving only approximate good (near optimal) solutions to the problem. This paper is divided as follows. In the next section we present a mathematical formulation of the problem, which we call the Minimum User Disturbance Problem (MUDP). In Section 3 we propose a randomized algorithm to solve it. In Section 4 we give computational results of our approach. Finally, in Section 5 we make some concluding remarks about the work, as well as future directions of research. 2. MATHEMATICAL PROGRAMMING MODEL We start with some definitions. Let U = {u 1,..., u n} be the set of users in the system, and V = {v 1,..., v k } be the set of available cells. We need to select a subset A U such that the size of A is minimum and the selected users have some characteristics that ensure spreading over the network. We define next what we mean by spreading, by defining the constraints that need to be satisfied by a feasible solution. We assume that there is enough information about the network usage for each user in the system. This information is given by the baseline, collected during a period of m days. The information is given as the following set of functions, defined for each user u U, for each period i, of the m periods considered, during peak time. The peak time is considered to be a daily interval of two hours. C i : U N, the number of calls made by user u, for each user u U, i = 1,..., m; T i : U N, the total time of calls made by user u U, i = 1,..., m; H i : U N, the number of hand-offs make by user u U, i = 1,..., m; S i : U V N, the demand of user u U in cell j {v 1,..., v k }, i = 1,..., m. Based on the known data, we can consider some features of the desired users in our problem. In general, it would be beneficial to select users which make frequent calls during peak time, make long calls, make frequent hand-offs, are in the most crowded areas, maintain a predictable behavior during some days. With these features in mind, given the binary variables { 1 if user u is selected x u =, 0 otherwise we can define the Minimum User Disturbance Problem (MUDP) as: subject to min S i(u, j)x u s j d i j V, (1) where x u i = 1,..., m C i(u)x u c i i = 1,..., m (2) T i (u)x u t i i = 1,..., m (3) H i (u)x u h i i = 1,..., m (4) x u {0, 1} u = 1,..., n s j = capacity available for GSM in cell j, d i = maximum usage deviation on day i, and c i, t i, h i are minimal thresholds computed for each day i = 1,..., m. The first constraint means that the total GSM usage in cell j must be at most the allocated capacity s j, with maximum deviation d, for j = 1,..., m. The second through the forth constraints guarantee that the selected users are relevant to the system, i.e., they have usage parameters at least equal to the minimum parameters c i, t i and h i, for i = 1,..., m. This is an integer 0-1 programming problem with a large number of constraints. Thus, it is not surprising that this is a NP-hard problem, as shown bellow: Theorem 1 The Minimum User Disturbance problem is NP-hard. Proof: We need to make a reduction in polynomial time from a problem known to be NP-hard to the MUDP. The problem chosen (from [2]) is: Set Cover: Given a set S = {1,..., k} and a collection C = {S 1,..., S n }, with S i S for i = 1,..., m, we want to find the minimum cardinality subset T of

3 C such that the union of all S i T is equal to S. We say that the subset T is a cover for the set S. We can formulate the above problem using integer 0-1 programming as follows. Let us define the variable y j, for j = 1,..., n as and let { 1 if set Sj is selected x j = 0 otherwise a ij = { 1 if i Sj 0 otherwise for i = 1,..., k and j = 1,..., n. Then, Set Cover is equivalent to min subject to j=1 a ij y j 1 j=1 y j y {0, 1} n i S Now, suppose that we interpret S as the set of cells and C as the set of users in the cellular system. It is easy to see that, given an instance I of Set Cover we can construct an equivalent instance of the MUDP. To do this, let us use the following parameters: s 1 = 1/2, d 1 = 1/2, m = 1; { 1 if i Sj S 1(u, j) = 0 otherwise; C i (u) = c i = 0, T i (u) = t i = 0, H i (u) = h i = 0, for all u = 1,..., n, i = 1,..., m. The resulting instance of the MUDP has an optimal solution equal to the optimal solution of I. Thus, Set Cover can be reduced to MUDP in polynomial time and therefore MUDP is NP-hard. One of the biggest challenges in solving this problem exactly is the large number of variables. For example, a typical set of data can have as much as 300,000 variables. This is very hard to solve exactly using traditional methods for integer programming. Moreover, from the proof of Theorem 1 we see that even for a extremely simplified case, the problem is still NP-hard. The problem above can also be seen as a constraint satisfaction problem (CSP) [3]. In such problems, we are given a set Φ of discrete variables with constraints Γ i, i = 1,..., k, defined over Φ. The objective is finding an assignment of values for Φ such that each Γ i is satisfied. As often happens with CSP s, it is hard to find solutions satisfying all restrictions. This is shown in the next theorem. Theorem 2 Finding a feasible solution to the MUD problem is NP-hard. Proof: Again we must try to reduce a NP-hard problem to MUDP. This time we choose Set Cover Decision (which is also NP-complete): Set Cover Decision: Given an instance I of Set Cover and an integer B, determine if there is a solution x {0, 1} n to I such that x i < B (5) i=1 for a fixed integer number B. The reduction is similar, but this time we set m = 2, and, in addition, s 2 = B/2, d 2 = B/2 and { 1 if j = 1 S 2 (u, j) = 0 otherwise. With these values, it is easy to see that we create an additional restriction equal to (5). Thus, any feasible solution to the problem constructed as above is a solution to the NP-complete Set Cover Decision problem, and therefore it is NP-hard to find a feasible solution to MUDP. Lagrangian Relaxation to the MUDP A general method for handling a large number of restrictions is trying to incorporate some of them to the objective function. This is done while, at the same time, the corresponding restrictions are relaxed. This technique is the basis of the so-called Lagrangian relaxation (LR) method. To simplify notation, let us denote F 1,i(u) = N i(u), F 2,i (u) = T i (u), and F 3,i (u) = H i (u). Applying LR to our problem, and removing the constant factors c i, h i and t i, we are left with the following formulation subject to min x i 3 m k=1 i=1 w k,i n F k,i (u)x u S i(u, j)x u s j d j V, i = 1,..., m x u {0, 1} u = 1,..., n for some suitable weights w j,i, j = 1,..., 3, i = 1,..., m. The problem becomes finding a feasible vector x for some fixed w j,i such that the problem is minimized. It is clear that feasible solutions to this formulations represent lower bounds for the original problem. Note that, in general, the values w j,i can assume any positive value. Thus, the standard Lagrangian relaxation we need to find a vector w which maximizes the lower bound to the original problem. However, we can just say that the weights w j,i are defined according to our relative interest in solving each of the

4 constraints, and is why we consider the values w i,j to be fixed. Thus, we can define some weights w i,j and solve the problem for these specific values. In the next session we discuss a heuristic algorithm to solve this relaxed version of the MUD problem. 3. AN ALGORITHM TO THE MUD PROBLEM In this section, we present a heuristic algorithm for the MUD problem. Since the MUDP is NP-hard, we need a practical way to solve large instances arising in the real application. Although many advances have being made in enumerative algorithms in the last years, the only computationally efficient approach for such problems is to look for reasonably good (heuristic) solutions, instead of the global optimum. In our case, there is the added requirement that the algorithm must be applied for large data sets, which cannot in general fit the computer s main memory. As an example, the size of the data for a medium-size instance amounts to around 200MB per day. If we require that the problem be solved for an exted period of time, an algorithm with low complexity must be found. The algorithm we propose is a variation of the well known Simulated Annealing (SA) meta-heuristic. The SA meta-heuristic was initially proposed by [6] and has since being used successfully in many applications [1, 4, 5, 7]. In SA, the solution method is an extension of the steepest descent algorithm for combinatorial optimization. At each iteration, a new solution y is generated in the neighborhood of the current solution x. To be accepted, y must either be better than x, or be included randomly with exponentially distributed probability, with mean equal to α. The parameter α is used to control the amount of randomness acceptable at each stage of optimization. In the beginning, many non-improving solutions can be accepted. However, when α decreases, there are less opportunities for accepting non-improving solutions. The idea is that the system will converge to the optimum solution, as α converges to zero. The main difference between SA and the proposed algorithm is the need of dividing operations in more than one phase. The data representing one day of operation in the cellular network is called a data-frame. As we are processing data for m days, there are m data-frames. In our algorithm, each phase represents the processing of one data-frame. With the data for the first day we compute an initial solution (the construction phase). Then we use the next data-frames to compute improvements to the objective function. Due to the large amount of memory required to store all data-frames, we cannot expect to have the exact cost of the objective function every time we make a local change. For example, if we set x u = 1 for user u U in iteration j of the algorithm (corresponding to the j-th data-frame), we cannot calculate the exact change in the objective function since other dataframes are out of memory. Thus, we need to content ourselves with an approximation of the objective function, updated every time we read additional data. To compute an approximate objective function, we define a function P (x, p) as the penalty incurred by solution x until day p. In other words, we define P (x, p) = p 1 3 k=1 j=1 w k,j n F k,j (u)x u. This is exactly the part of the objective function that cannot be computed without knowledge of previous data. Thus, the objective function that we are really using at step j is f(x, j) = x u 3 k=1 w k,j n The Randomized Algorithm F k,j (u)x u P (x, j) There are two important steps in the operation of a meta-heuristic. In the construction phase a new solution is assembled from basic elements of the problem. In the improvement phase, the current solution(s) is (are) modified in order to find a local optimum, hopefully close to the the global optimum of the problem. In our approach, the initial phase, where the first data-frame is processed, corresponds to the construction phase. The remaining computation is divided in sub-phases, each corresponding to the remaining dataframes. Algorithm 1 gives a formal description of the general method used. Algorithm 1: Randomized algorithm for MUDP. Process Data1 for j 1 to m do Process-Data(j) while not terminate flag do r random(m) Process-Data(r) The description for the initial phase is shown in Algorithm 2. Initially, the users are sorted by increasing value of their contribution to the objective function. We define the contribution g(u) of user u to the objective function as g i(u) = w i,1n(u) + w i,2t (u) + w i,3h(u).

5 A user u is said to be viable for a partial solution x if, after making x u = 1, constraint (1) in the integer formulation is still valid. During the first phase, we use viable users to create an initial solution to the problem. The algorithm analyzes all data for the first data-frame and sets x u = 1 for viable users u with probability P 1 = ρ (ρ is a parameter of the algorithm). After the of the algorithm for the first dataframe, the process continues with the remaining data. The technique for subsequent data-frames, shown in Algorithm 3, is similar, with exception of the construction phase, where we are now concerned in improving the existing solution. For each subsequent data-frame i, the file is read into the memory and viable users are changed with a probability P i = γp i 1. We repeat this step while improvements are possible. The general idea is that if user u is important, it should appear in most of the days, so the probability of assign users appearing in just some days is smaller. The steps in the algorithm are detailed bellow. Algorithm 2: Process-Data(1) for u U do Compute T (u, i), H(u, i), C(u, i). P 1 ρ. Sort(U, g(u)). for i = 1 to n do if Viable(u) then x u 1 w.p. P 1. ImprovementPhase() Algorithm 3: Process-Data(j). Data : j Result : A set of users initialization for u U do Compute T (u, i), H(u, i), C(u, i). P i γp i 1, for (0 < γ < 1). P 1 ρ Sort(U, g(u)) for i = 1 to n do if Viable(u) then if x u = 0 then x u 1 w.p. P 1 else if x u = 1 then x u 0 w.p. P 1 ImprovementPhase() An improvement phase is applied for each dataframe, as show in Algorithm 2 and 3. We change the solution by verifying if the status of a user can be changed (x u = 1 if x u was 0, or x u = 0 if x u was 1). If this improves the objective function, then we accept the change. Otherwise, we can still accept the change with probability P i. After a fixed number of iterations without change, probability p i is multiplied by ρ, such that 0 < ρ < 1. Thus, the probability of accepting a non-improving change goes to 0 as the number of iterations increase. The resulting improvement procedure is shown in Algorithm 4. Algorithm 4: ImprovementPhase() P ρ j i 0 while i < MAX IT do u random(n) if user u improves the objective then change x u w.p. P i 0 else i i + 1 j j + 1 if j = n then P γp ; j 0 In this algorithm there are some parameters that must be set. They are the Lagrangian multipliers w i,j, for j = 1,..., 3, i = 1,..., m, and the randomization parameters ρ and γ. The last two represent, respectively, the initial probability of selecting users and the multiplicative factor for the probability of changing values in the current solution. 4. COMPUTATIONAL EXPERIMENTS To evaluate the efficiency of the proposed algorithm we developed a simple local search (LS) and used it as a baseline for comparison. The instances used in the experiments are derived from some real data supplied by Cingular Wireless. Two data frames of real data were used as the initial description of the instances. From these data frames, other 15 instances were created, using random numbers distributed according to the values observed in the real files. The experiment was performed by first running LS on a random initial solution, for each instance. We then run Algorithm 1 in these instances, for the same number of iterations. Both algorithms were implemented using the C programming language. The random parameters used were ρ = 0.7, and γ = 0.8. The resulting code was compiled using the gcc optimized compiler,

6 Objective function cost Pure Local Search Algorith Instance number Figure 1: Results for Algorithm 1 applied to generated instances of the MUDP. Objective function cost Pure Local Search Algorithm time (seconds) Figure 2: Comparison of solution quality for local search and Algorithm 1, applied to an instance of MUDP. In this paper we formulate and propose an algorithmic solution to a real-life problem occurring in the telecommunications industry. We call it the Minimum User Disturbance Problem. The problem is modeled using mathematical formulation and solved by a heuristic procedure, based on randomized local search, and using ideas from the Simulated Annealing metaheuristic. Additional computational experiments with the proposed method are being performed. It remains as a future topic of research to determine new ways of improving this solution. For example, the algorithm seams to be very suitable for parallelization. Also, it would be beneficial to compare our approach with other heuristic methods that could exploit different characteristics of the problem. 6. REFERENCES [1] N. E. Collins, R. W. Eglese, and B. L. Golden. Simulated annealing an annotated bibliography. AJMMS, 8: , [2] M. R. Garey and D. S. Johnson. Computers and Intractability a Guide to the Theory of NP- Completeness. W. H. Freeman and Company, [3] Walter Hower. Constraint satisfaction - algorithms and complexity analysis. Information Processing Letters, 55: , [4] D. S. Johnson, C. R. Aragon, L. A. McGeoch, and C. Schevon. Optimization by simulated annealing: and experimental evaluation; part I, graph partitioning. Operations Research, [5] D. S. Jonhson, C. A. Aragon, L. A. Mcgeoch, and C. Schevon. Optimization by simulated annealing: an experimental evaluation Part II (graph coloring and number partition). Operations research, 31: , [6] S. Kirkpatrick, C. D. Gellat Jr., and M. P.Vicchi. Optimization by simulated annealing. Science, 220: , [7] P. J. M van Laarhoren and E. H. L. Aarts. Simulated Annealing: theory and applications. D. Reidel Publishing Co., Holanda, in a PC using Linux, with 256 MB of RAM and a 1.8 GHz processor. The results of the comparisons are shown in Figure 1. In Figure 2 we present a comparison of solution quality for the two methods when applied to a particular instance. The same pattern was also observed in other instances. 5. CONCLUDING REMARKS

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

Set Cover with Almost Consecutive Ones Property

Set Cover with Almost Consecutive Ones Property Set Cover with Almost Consecutive Ones Property 2004; Mecke, Wagner Entry author: Michael Dom INDEX TERMS: Covering Set problem, data reduction rules, enumerative algorithm. SYNONYMS: Hitting Set PROBLEM

More information

MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms

MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms Ann-Brith Strömberg 2018 04 24 Lecture 9 Linear and integer optimization with applications

More information

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM SERGIY I. BUTENKO, CLAYTON W. COMMANDER, AND PANOS M. PARDALOS Abstract. In this paper, a Broadcast Scheduling Problem (bsp) in a time division multiple

More information

ACO and other (meta)heuristics for CO

ACO and other (meta)heuristics for CO ACO and other (meta)heuristics for CO 32 33 Outline Notes on combinatorial optimization and algorithmic complexity Construction and modification metaheuristics: two complementary ways of searching a solution

More information

1. Lecture notes on bipartite matching February 4th,

1. Lecture notes on bipartite matching February 4th, 1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)

More information

α Coverage to Extend Network Lifetime on Wireless Sensor Networks

α Coverage to Extend Network Lifetime on Wireless Sensor Networks Noname manuscript No. (will be inserted by the editor) α Coverage to Extend Network Lifetime on Wireless Sensor Networks Monica Gentili Andrea Raiconi Received: date / Accepted: date Abstract An important

More information

The complement of PATH is in NL

The complement of PATH is in NL 340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Optimization of fuzzy multi-company workers assignment problem with penalty using genetic algorithm

Optimization of fuzzy multi-company workers assignment problem with penalty using genetic algorithm Optimization of fuzzy multi-company workers assignment problem with penalty using genetic algorithm N. Shahsavari Pour Department of Industrial Engineering, Science and Research Branch, Islamic Azad University,

More information

Parallel Implementation of a Random Search Procedure: An Experimental Study

Parallel Implementation of a Random Search Procedure: An Experimental Study Parallel Implementation of a Random Search Procedure: An Experimental Study NIKOLAI K. KRIVULIN Faculty of Mathematics and Mechanics St. Petersburg State University 28 University Ave., St. Petersburg,

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Constrained and Unconstrained Optimization

Constrained and Unconstrained Optimization Constrained and Unconstrained Optimization Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Oct 10th, 2017 C. Hurtado (UIUC - Economics) Numerical

More information

9.1 Cook-Levin Theorem

9.1 Cook-Levin Theorem CS787: Advanced Algorithms Scribe: Shijin Kong and David Malec Lecturer: Shuchi Chawla Topic: NP-Completeness, Approximation Algorithms Date: 10/1/2007 As we ve already seen in the preceding lecture, two

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

3 INTEGER LINEAR PROGRAMMING

3 INTEGER LINEAR PROGRAMMING 3 INTEGER LINEAR PROGRAMMING PROBLEM DEFINITION Integer linear programming problem (ILP) of the decision variables x 1,..,x n : (ILP) subject to minimize c x j j n j= 1 a ij x j x j 0 x j integer n j=

More information

Machine Learning for Software Engineering

Machine Learning for Software Engineering Machine Learning for Software Engineering Introduction and Motivation Prof. Dr.-Ing. Norbert Siegmund Intelligent Software Systems 1 2 Organizational Stuff Lectures: Tuesday 11:00 12:30 in room SR015 Cover

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can

More information

Non-convex Multi-objective Optimization

Non-convex Multi-objective Optimization Non-convex Multi-objective Optimization Multi-objective Optimization Real-world optimization problems usually involve more than one criteria multi-objective optimization. Such a kind of optimization problems

More information

Financial Optimization ISE 347/447. Lecture 13. Dr. Ted Ralphs

Financial Optimization ISE 347/447. Lecture 13. Dr. Ted Ralphs Financial Optimization ISE 347/447 Lecture 13 Dr. Ted Ralphs ISE 347/447 Lecture 13 1 Reading for This Lecture C&T Chapter 11 ISE 347/447 Lecture 13 2 Integer Linear Optimization An integer linear optimization

More information

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs 15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest

More information

Variable Neighborhood Search for Solving the Balanced Location Problem

Variable Neighborhood Search for Solving the Balanced Location Problem TECHNISCHE UNIVERSITÄT WIEN Institut für Computergraphik und Algorithmen Variable Neighborhood Search for Solving the Balanced Location Problem Jozef Kratica, Markus Leitner, Ivana Ljubić Forschungsbericht

More information

Anale. Seria Informatică. Vol. X fasc Annals. Computer Science Series. 10 th Tome 1 st Fasc. 2012

Anale. Seria Informatică. Vol. X fasc Annals. Computer Science Series. 10 th Tome 1 st Fasc. 2012 Anale. Seria Informatică. Vol. X fasc. 1 2012 9 HEURISTIC ALGORITHM FOR GRAPH COLORING BASED ON MAXIMUM INDEPENDENT SET Hilal Al Mara beh, Amjad Suleiman Department Basic Science King Saud bin Abdulaziz

More information

Tabu Search for Constraint Solving and Its Applications. Jin-Kao Hao LERIA University of Angers 2 Boulevard Lavoisier Angers Cedex 01 - France

Tabu Search for Constraint Solving and Its Applications. Jin-Kao Hao LERIA University of Angers 2 Boulevard Lavoisier Angers Cedex 01 - France Tabu Search for Constraint Solving and Its Applications Jin-Kao Hao LERIA University of Angers 2 Boulevard Lavoisier 49045 Angers Cedex 01 - France 1. Introduction The Constraint Satisfaction Problem (CSP)

More information

Size of a problem instance: Bigger instances take

Size of a problem instance: Bigger instances take 2.1 Integer Programming and Combinatorial Optimization Slide set 2: Computational Complexity Katta G. Murty Lecture slides Aim: To study efficiency of various algo. for solving problems, and to classify

More information

Framework for Design of Dynamic Programming Algorithms

Framework for Design of Dynamic Programming Algorithms CSE 441T/541T Advanced Algorithms September 22, 2010 Framework for Design of Dynamic Programming Algorithms Dynamic programming algorithms for combinatorial optimization generalize the strategy we studied

More information

Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach

Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach Amir Salehipour School of Mathematical and Physical Sciences, The University of Newcastle, Australia

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization Frank de Zeeuw EPFL 2012 Today Introduction Graph problems - What combinatorial things will we be optimizing? Algorithms - What kind of solution are we looking for? Linear Programming

More information

VNS-based heuristic with an exponential neighborhood for the server load balancing problem

VNS-based heuristic with an exponential neighborhood for the server load balancing problem Available online at www.sciencedirect.com Electronic Notes in Discrete Mathematics 47 (2015) 53 60 www.elsevier.com/locate/endm VNS-based heuristic with an exponential neighborhood for the server load

More information

arxiv: v2 [cs.dm] 3 Dec 2014

arxiv: v2 [cs.dm] 3 Dec 2014 The Student/Project Allocation problem with group projects Aswhin Arulselvan, Ágnes Cseh, and Jannik Matuschke arxiv:4.035v [cs.dm] 3 Dec 04 Department of Management Science, University of Strathclyde,

More information

Instituto Nacional de Pesquisas Espaciais - INPE/LAC Av. dos Astronautas, 1758 Jd. da Granja. CEP São José dos Campos S.P.

Instituto Nacional de Pesquisas Espaciais - INPE/LAC Av. dos Astronautas, 1758 Jd. da Granja. CEP São José dos Campos S.P. XXXIV THE MINIMIZATION OF TOOL SWITCHES PROBLEM AS A NETWORK FLOW PROBLEM WITH SIDE CONSTRAINTS Horacio Hideki Yanasse Instituto Nacional de Pesquisas Espaciais - INPE/LAC Av. dos Astronautas, 1758 Jd.

More information

Approximability Results for the p-center Problem

Approximability Results for the p-center Problem Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center

More information

Effective probabilistic stopping rules for randomized metaheuristics: GRASP implementations

Effective probabilistic stopping rules for randomized metaheuristics: GRASP implementations Effective probabilistic stopping rules for randomized metaheuristics: GRASP implementations Celso C. Ribeiro Isabel Rosseti Reinaldo C. Souza Universidade Federal Fluminense, Brazil July 2012 1/45 Contents

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

HEURISTIC ALGORITHMS FOR THE GENERALIZED MINIMUM SPANNING TREE PROBLEM

HEURISTIC ALGORITHMS FOR THE GENERALIZED MINIMUM SPANNING TREE PROBLEM Proceedings of the International Conference on Theory and Applications of Mathematics and Informatics - ICTAMI 24, Thessaloniki, Greece HEURISTIC ALGORITHMS FOR THE GENERALIZED MINIMUM SPANNING TREE PROBLEM

More information

Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity

More information

Optimization Techniques for Design Space Exploration

Optimization Techniques for Design Space Exploration 0-0-7 Optimization Techniques for Design Space Exploration Zebo Peng Embedded Systems Laboratory (ESLAB) Linköping University Outline Optimization problems in ERT system design Heuristic techniques Simulated

More information

Introduction. Introduction. Heuristic Algorithms. Giovanni Righini. Università degli Studi di Milano Department of Computer Science (Crema)

Introduction. Introduction. Heuristic Algorithms. Giovanni Righini. Università degli Studi di Milano Department of Computer Science (Crema) Introduction Heuristic Algorithms Giovanni Righini Università degli Studi di Milano Department of Computer Science (Crema) Objectives The course aims at illustrating the main algorithmic techniques for

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

GENERALIZED ASSIGNMENT PROBLEM

GENERALIZED ASSIGNMENT PROBLEM Chapter 3 GENERALIZED ASSIGNMENT PROBLEM 1 1 A part of this chapter appears in International Journal of Computational and Mathematical Sciences Vol.3:8, 418-423, 2009 as A new heuristic approach for the

More information

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:

More information

Column Generation Method for an Agent Scheduling Problem

Column Generation Method for an Agent Scheduling Problem Column Generation Method for an Agent Scheduling Problem Balázs Dezső Alpár Jüttner Péter Kovács Dept. of Algorithms and Their Applications, and Dept. of Operations Research Eötvös Loránd University, Budapest,

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems

Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems Mohammad Komaki, Shaya Sheikh, Behnam Malakooti Case Western Reserve University Systems Engineering Email: komakighorban@gmail.com Abstract

More information

Algorithms for Integer Programming

Algorithms for Integer Programming Algorithms for Integer Programming Laura Galli November 9, 2016 Unlike linear programming problems, integer programming problems are very difficult to solve. In fact, no efficient general algorithm is

More information

An Introduction to Dual Ascent Heuristics

An Introduction to Dual Ascent Heuristics An Introduction to Dual Ascent Heuristics Introduction A substantial proportion of Combinatorial Optimisation Problems (COPs) are essentially pure or mixed integer linear programming. COPs are in general

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Approximation Algorithms: The Primal-Dual Method. My T. Thai

Approximation Algorithms: The Primal-Dual Method. My T. Thai Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne Two-level Logic Synthesis and Optimization Giovanni De Micheli Integrated Systems Centre EPF Lausanne This presentation can be used for non-commercial purposes as long as this note and the copyright footers

More information

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS An Undergraduate Research Scholars Thesis by DENISE IRVIN Submitted to the Undergraduate Research Scholars program at Texas

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

DETERMINISTIC OPERATIONS RESEARCH

DETERMINISTIC OPERATIONS RESEARCH DETERMINISTIC OPERATIONS RESEARCH Models and Methods in Optimization Linear DAVID J. RADER, JR. Rose-Hulman Institute of Technology Department of Mathematics Terre Haute, IN WILEY A JOHN WILEY & SONS,

More information

A Course in Machine Learning

A Course in Machine Learning A Course in Machine Learning Hal Daumé III 13 UNSUPERVISED LEARNING If you have access to labeled training data, you know what to do. This is the supervised setting, in which you have a teacher telling

More information

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University) Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,

More information

A Column Generation based Heuristic for Maximum Lifetime Coverage in Wireless Sensor Networks

A Column Generation based Heuristic for Maximum Lifetime Coverage in Wireless Sensor Networks A Column Generation based Heuristic for Maximum Lifetime Coverage in Wireless Sensor Networks Karine Deschinkel LIFC Laboratory, Université de Franche-Comté Belfort, France Email: karine.deschinkel@univ-fcomte.fr

More information

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems J.M. López, M. García, J.L. Díaz, D.F. García University of Oviedo Department of Computer Science Campus de Viesques,

More information

ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES. Nikolay Kosovskiy

ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES. Nikolay Kosovskiy International Journal Information Theories and Applications, Vol. 20, Number 2, 2013 131 ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES Nikolay Kosovskiy Abstract: A mathematical

More information

Parallel Machine Scheduling: A (Meta)Heuristic Computational Evaluation MIC 2001, Porto, Portugal

Parallel Machine Scheduling: A (Meta)Heuristic Computational Evaluation MIC 2001, Porto, Portugal Parallel Machine Scheduling: A (Meta)Heuristic Computational Evaluation MIC 2001, Porto, Portugal Marc Sevaux, Philippe Thomin fmarc.sevaux, Philippe.Thoming@univ-valenciennes.fr. University of Valenciennes

More information

A Benders decomposition approach for the robust shortest path problem with interval data

A Benders decomposition approach for the robust shortest path problem with interval data A Benders decomposition approach for the robust shortest path problem with interval data R. Montemanni, L.M. Gambardella Istituto Dalle Molle di Studi sull Intelligenza Artificiale (IDSIA) Galleria 2,

More information

Methods and Models for Combinatorial Optimization Heuristis for Combinatorial Optimization

Methods and Models for Combinatorial Optimization Heuristis for Combinatorial Optimization Methods and Models for Combinatorial Optimization Heuristis for Combinatorial Optimization L. De Giovanni 1 Introduction Solution methods for Combinatorial Optimization Problems (COPs) fall into two classes:

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

2 Review of Set Theory

2 Review of Set Theory 2 Review of Set Theory Example 2.1. Let Ω = {1, 2, 3, 4, 5, 6} 2.2. Venn diagram is very useful in set theory. It is often used to portray relationships between sets. Many identities can be read out simply

More information

Maximum Betweenness Centrality: Approximability and Tractable Cases

Maximum Betweenness Centrality: Approximability and Tractable Cases Maximum Betweenness Centrality: Approximability and Tractable Cases Martin Fink and Joachim Spoerhase Chair of Computer Science I University of Würzburg {martin.a.fink, joachim.spoerhase}@uni-wuerzburg.de

More information

LOCAL SEARCH FOR THE MINIMUM FUNDAMENTAL CYCLE BASIS PROBLEM

LOCAL SEARCH FOR THE MINIMUM FUNDAMENTAL CYCLE BASIS PROBLEM LOCAL SEARCH FOR THE MINIMUM FUNDAMENTAL CYCLE BASIS PROBLEM Abstract E.Amaldi, L.Liberti, N.Maculan, F.Maffioli DEI, Politecnico di Milano, I-20133 Milano amaldi,liberti,maculan,maffioli @elet.polimi.it

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

A Development of Hybrid Cross Entropy-Tabu Search Algorithm for Travelling Repairman Problem

A Development of Hybrid Cross Entropy-Tabu Search Algorithm for Travelling Repairman Problem Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 A Development of Hybrid Cross Entropy-Tabu Search Algorithm for Travelling

More information

A combination of clustering algorithms with Ant Colony Optimization for large clustered Euclidean Travelling Salesman Problem

A combination of clustering algorithms with Ant Colony Optimization for large clustered Euclidean Travelling Salesman Problem A combination of clustering algorithms with Ant Colony Optimization for large clustered Euclidean Travelling Salesman Problem TRUNG HOANG DINH, ABDULLAH AL MAMUN Department of Electrical and Computer Engineering

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 36 CS 473: Algorithms, Spring 2018 LP Duality Lecture 20 April 3, 2018 Some of the

More information

Journal of Global Optimization, 10, 1{40 (1997) A Discrete Lagrangian-Based Global-Search. Method for Solving Satisability Problems *

Journal of Global Optimization, 10, 1{40 (1997) A Discrete Lagrangian-Based Global-Search. Method for Solving Satisability Problems * Journal of Global Optimization, 10, 1{40 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. A Discrete Lagrangian-Based Global-Search Method for Solving Satisability Problems

More information

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint

More information

The Size Robust Multiple Knapsack Problem

The Size Robust Multiple Knapsack Problem MASTER THESIS ICA-3251535 The Size Robust Multiple Knapsack Problem Branch and Price for the Separate and Combined Recovery Decomposition Model Author: D.D. Tönissen, Supervisors: dr. ir. J.M. van den

More information

New algorithm for analyzing performance of neighborhood strategies in solving job shop scheduling problems

New algorithm for analyzing performance of neighborhood strategies in solving job shop scheduling problems Journal of Scientific & Industrial Research ESWARAMURTHY: NEW ALGORITHM FOR ANALYZING PERFORMANCE OF NEIGHBORHOOD STRATEGIES 579 Vol. 67, August 2008, pp. 579-588 New algorithm for analyzing performance

More information

A two-level metaheuristic for the All Colors Shortest Path Problem

A two-level metaheuristic for the All Colors Shortest Path Problem Noname manuscript No (will be inserted by the editor) A two-level metaheuristic for the All Colors Shortest Path Problem F Carrabs R Cerulli R Pentangelo A Raiconi Received: date / Accepted: date Abstract

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Cluster Analysis Mu-Chun Su Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Introduction Cluster analysis is the formal study of algorithms and methods

More information

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout Tail Inequalities Wafi AlBalawi and Ashraf Osman Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV fwafi,osman@csee.wvu.edug 1 Routing in a Parallel Computer

More information

Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm. Santos and Mateus (2007)

Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm. Santos and Mateus (2007) In the name of God Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm Spring 2009 Instructor: Dr. Masoud Yaghini Outlines Problem Definition Modeling As A Set Partitioning

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

A SIMULATED ANNEALING ALGORITHM FOR SOME CLASS OF DISCRETE-CONTINUOUS SCHEDULING PROBLEMS. Joanna Józefowska, Marek Mika and Jan Węglarz

A SIMULATED ANNEALING ALGORITHM FOR SOME CLASS OF DISCRETE-CONTINUOUS SCHEDULING PROBLEMS. Joanna Józefowska, Marek Mika and Jan Węglarz A SIMULATED ANNEALING ALGORITHM FOR SOME CLASS OF DISCRETE-CONTINUOUS SCHEDULING PROBLEMS Joanna Józefowska, Marek Mika and Jan Węglarz Poznań University of Technology, Institute of Computing Science,

More information

Computational Complexity CSC Professor: Tom Altman. Capacitated Problem

Computational Complexity CSC Professor: Tom Altman. Capacitated Problem Computational Complexity CSC 5802 Professor: Tom Altman Capacitated Problem Agenda: Definition Example Solution Techniques Implementation Capacitated VRP (CPRV) CVRP is a Vehicle Routing Problem (VRP)

More information

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec. Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming

More information

Complete Local Search with Memory

Complete Local Search with Memory Complete Local Search with Memory Diptesh Ghosh Gerard Sierksma SOM-theme A Primary Processes within Firms Abstract Neighborhood search heuristics like local search and its variants are some of the most

More information

Reload Cost Trees and Network Design

Reload Cost Trees and Network Design Reload Cost Trees and Network Design Ioannis Gamvros, ILOG, Inc., 1080 Linda Vista Avenue, Mountain View, CA 94043, USA Luis Gouveia, Faculdade de Ciencias da Universidade de Lisboa, Portugal S. Raghavan,

More information

Randomized algorithms have several advantages over deterministic ones. We discuss them here:

Randomized algorithms have several advantages over deterministic ones. We discuss them here: CS787: Advanced Algorithms Lecture 6: Randomized Algorithms In this lecture we introduce randomized algorithms. We will begin by motivating the use of randomized algorithms through a few examples. Then

More information

Analysis and Experimental Study of Heuristics for Job Scheduling Reoptimization Problems

Analysis and Experimental Study of Heuristics for Job Scheduling Reoptimization Problems Analysis and Experimental Study of Heuristics for Job Scheduling Reoptimization Problems Elad Iwanir and Tami Tamir Abstract Many real-life applications involve systems that change dynamically over time.

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Hardware-Software Codesign

Hardware-Software Codesign Hardware-Software Codesign 4. System Partitioning Lothar Thiele 4-1 System Design specification system synthesis estimation SW-compilation intellectual prop. code instruction set HW-synthesis intellectual

More information

CS 512, Spring 2017: Take-Home End-of-Term Examination

CS 512, Spring 2017: Take-Home End-of-Term Examination CS 512, Spring 2017: Take-Home End-of-Term Examination Out: Tuesday, 9 May 2017, 12:00 noon Due: Wednesday, 10 May 2017, by 11:59 am Turn in your solutions electronically, as a single PDF file, by placing

More information

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction Rearrangement of DNA fragments: a branch-and-cut algorithm 1 C. E. Ferreira 1 C. C. de Souza 2 Y. Wakabayashi 1 1 Instituto de Mat. e Estatstica 2 Instituto de Computac~ao Universidade de S~ao Paulo e-mail:

More information

Applied Algorithm Design Lecture 3

Applied Algorithm Design Lecture 3 Applied Algorithm Design Lecture 3 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 3 1 / 75 PART I : GREEDY ALGORITHMS Pietro Michiardi (Eurecom) Applied Algorithm

More information

NOTATION AND TERMINOLOGY

NOTATION AND TERMINOLOGY 15.053x, Optimization Methods in Business Analytics Fall, 2016 October 4, 2016 A glossary of notation and terms used in 15.053x Weeks 1, 2, 3, 4 and 5. (The most recent week's terms are in blue). NOTATION

More information

MA651 Topology. Lecture 4. Topological spaces 2

MA651 Topology. Lecture 4. Topological spaces 2 MA651 Topology. Lecture 4. Topological spaces 2 This text is based on the following books: Linear Algebra and Analysis by Marc Zamansky Topology by James Dugundgji Fundamental concepts of topology by Peter

More information

David G. Luenberger Yinyu Ye. Linear and Nonlinear. Programming. Fourth Edition. ö Springer

David G. Luenberger Yinyu Ye. Linear and Nonlinear. Programming. Fourth Edition. ö Springer David G. Luenberger Yinyu Ye Linear and Nonlinear Programming Fourth Edition ö Springer Contents 1 Introduction 1 1.1 Optimization 1 1.2 Types of Problems 2 1.3 Size of Problems 5 1.4 Iterative Algorithms

More information

CELLULAR automata (CA) are mathematical models for

CELLULAR automata (CA) are mathematical models for 1 Cellular Learning Automata with Multiple Learning Automata in Each Cell and its Applications Hamid Beigy and M R Meybodi Abstract The cellular learning automata, which is a combination of cellular automata

More information

Integer Programming ISE 418. Lecture 1. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 1. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 1 Dr. Ted Ralphs ISE 418 Lecture 1 1 Reading for This Lecture N&W Sections I.1.1-I.1.4 Wolsey Chapter 1 CCZ Chapter 2 ISE 418 Lecture 1 2 Mathematical Optimization Problems

More information