# Exact Solution of the Robust Knapsack Problem

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 1 Exact Solution of the Robust Knapsack Problem Michele Monaci 1 and Ulrich Pferschy 2 and Paolo Serafini 3 1 DEI, University of Padova, Via Gradenigo 6/A, I Padova, Italy. 2 Department of Statistics and Operations Research, University of Graz, Universitaetsstrasse 15, A-8010 Graz, Austria. 3 DIMI, University of Udine, Via delle Scienze 206, I Udine, Italy. Abstract. We consider an uncertain variant of the knapsack problem in which the weight of the items is not exactly known in advance, but belongs to a given interval, and an upper bound is imposed on the number of items whose weight differs from the expected one. For this problem, we provide a dynamic programming algorithm and present techniques aimed at reducing its space and time complexities. Finally, we computationally compare the performances of the proposed algorithm with those of different exact algorithms presented so far in the literature for robust optimization problems. keywords: knapsack problem, robust optimization, dynamic programming. 1 Introduction The classical Knapsack Problem (KP) can be described as follows. We are given a set N = {1,..., n} of items, each of them with positive profit p j and positive weight w j, and a knapsack capacity c. The problem asks for a subset of items whose total weight does not exceed the knapsack capacity, and whose profit is a maximum. It can be formulated as the following Integer Linear Program (ILP): (KP ) max p j x j (1) j N w j x j c (2) j N x j {0, 1}, j N. (3) Each variable x j takes value 1 if and only if item j is inserted in the knapsack. This problem is NP-hard, although in practice fairly large instances can be solved to optimality within reasonable running time. Furthermore, dynamic programming algorithms with pseudopolynomial running time are available. A comprehensive survey on all aspects of (KP) was given by Kellerer, Pferschy and Pisinger [11]. In this paper we consider the following variant of (KP), aimed at modeling uncertainties in the data, in particular in the weights: for each item j the weight may deviate from its given nominal value w j and attain an arbitrary value in some known interval [w j w j, w j + w j ]. A feasible solution must obey the

2 2 capacity constraint (2) no matter what the actual weight of each item turns out to be. However, uncertainty is bounded by an integer parameter Γ indicating that at most Γ items in the solution can change from their nominal value w j to an arbitrary value in the interval. Clearly a diminution of a weight below the nominal value does not affect feasibility and in the worst case all changed weights reach their upper limit. Hence a feasible solution consists of a subset of items J N such that w j c Ĵ J, Ĵ Γ. (4) j J w j + j Ĵ We call this problem the Robust Knapsack Problem (RKP). It was recently considered by Monaci and Pferschy [16] who studied the worst-case ratio between the optimal solution value of (KP) and that of (RKP), as well as the ratio between the associated fractional relaxations. A similar setting with the restriction that w j = δ w j for all j for some given constant δ > 0 was introduced by Bertsimas and Sim [4]. Clearly this is a particular case of the model considered in this paper. In the following we assume, without loss of generality, that all input data are integer and items are sorted according to non-increasing w j values. For notational simplicity we define the increased weights by ŵ j = w j + w j for all j. In addition, for any given set S of items, we will denote by p(s) = j S p j and w(s) = j S w j the total profit and weight, respectively, of the items in S. In this paper we review exact solution algorithms for (RKP). Although it is an NP-hard problem, exact solutions can be found in reasonable time even for large instances (see in Section 6 the computing times for instances up to 5,000 items). Hence it is adequate to look for exact methods in solving (RKP) and it is interesting to compare the behavior of different algorithms. The algorithms proposed in the literature up-to-date present quite distinct features, although two of them can be shown to be very tightly intertwined. In Section 2 we present a dynamic programming algorithm. The algorithm mimics the well known algorithm for the standard knapsack problem, but is able to take care of the upper weights once the items are sorted according to non-increasing w j values. This algorithm, developed by the authors, is investigated in detail. In Section 2 we show its correctness, and, as in the usual knapsack algorithm, we show that a similar version obtained by exchanging the roles of weights and values can be also formulated thus paving the way to approximation schemes. In Section 3 we address the delicate issue of implementing the algorithm with a reduced amount of memory, since, with a large number of items and large data coefficients, space requirements can constitute a problem. Other exact approaches are presented in Section 4. In particular we review the integer programming model by Bertsimas and Sim [4] (Section 4.1), an improvement on the iterative approach by Bertsimas and Sim [3] which requires solving O(n) knapsack instances (Section 4.2) and the Branch-and-Cut algorithm by Fischetti and Monaci [8] in which the robustness requirements is modeled by cutting inequalities (Section 4.3). The problem we investigate is a special combinatorial optimization problem that has been motivated by a particular modeling of the problem uncertainties. By and large this is the model which has received most attention in the literature, although a lot of research has been done to face problems with uncertain data (see, e.g., the recent survey by Bertsimas, Brown and Caramanis [2]). As to uncertainty in knapsack problems, few contributions were proposed. (RKP) was first introduced by Bertsimas and Sim [3], while Klopfenstein and Nace [12] defined a robust chance-constrained variant of the knapsack problem and studied the relation between feasible solutions of this problem and those of (RKP). A polyhedral study of (RKP) was conducted by the same authors in [13], where some computational experiments with small instances (up to 20 items) were given. Recently, Büsing, Koster and Kutschka [5,?] addressed the robust knapsack

3 3 problem within the so-called recoverable robustness context in which one is required to produce a solution that is not necessarily feasible under uncertainty, but whose feasibility can be recovered by means of some legal moves. In [5,?], legal moves correspond to the removal of at most K items from the solution, so as to model a telecommunication network problem. For this problem, the authors gave different ILP formulations, cut separation procedures and computational experiments. 2 A dynamic programming algorithm In this section we present an exact dynamic programming algorithm for (RKP). Note that the same problem was considered by Klopfenstein and Nace [12] who sketched a related dynamic programming recursion in their Theorem 3. While the brief description of the algorithm in [12] relies on a modification of a dynamic program for the nominal knapsack problem, we present a detailed algorithm explicitly designed for (RKP) which allows for an improvement of the complexities. In Section 3 we will analyze time and space complexities of our algorithm, and propose possible methods for reducing both of them; finally, the algorithm will be used in Section 5 to derive a fully polynomial approximation scheme for (RKP). Our approach is based on the following two dynamic programming arrays: Let z(d, s, j) be the highest profit for a feasible solution with total weight d in which only items in {1,..., j} N are considered and exactly s of them are included, all with their upper weight bound ŵ j. Let z(d, j) be the highest profit for a feasible solution with total weight d in which only items in {1,..., j} N are considered and Γ of them change from their nominal weight to their upper bound. Clearly, d = 0, 1,..., c, s = 0, 1,..., Γ, and j = 0, 1,..., n. A crucial property for the correctness of our approach is the assumption that items are sorted by nonincreasing weight increases w j. This implies the following lemma. For a subset of items J N denote by j Γ the index of the Γ -th item in J if J Γ, otherwise j Γ is the index of the last item in J. Lemma 1 A subset J N is feasible if and only if j J,j j Γ ŵ j + j J,j>j Γ w j c Proof. The largest increase of w(j) caused by items attaining their upper weight is due to the subset of Γ items for which the increase w j is largest. If J is feasible with respect to this subset, it is feasible for any other subset of J. Now we can compute all array entries by the following dynamic programming recursions: z(d, s, j) = max{z(d, s, j 1), z(d ŵ j, s 1, j 1) + p j } for d = 0,..., c, s = 1,..., Γ, j = 1,..., n, z(d, j) = max{z(d, j 1), z(d w j, j 1) + p j } for d = 0,..., c, j = Γ + 1,..., n The initialization values are z(d, s, 0) = for d = 0,..., c and s = 0,..., Γ. Then we set z(0, 0, 0) = 0. The two arrays are linked together by initializing z(d, Γ ) = z(d, Γ, Γ ) for all d. Obviously, all entries with d < ŵ j (resp. d < w j ) are not used in definition of z (resp. z) in recursion (5). The optimal solution value of the robust knapsack problem can be found as { max{z(d, n) d = 1,..., c} z = max max{z(d, s, n) d = 1,..., c, s = 1,..., Γ 1} (5)

4 4 d j s=0 s=1 s=2= t Fig. 1. Directed graph model for the dynamic programming recursion. and consumes a total capacity c c. Intuitively, the dynamic programming algorithm operates in two phases: first, it determines the best solution consisting of (at most) Γ items with increased weight. Then, this solution is possibly extended with additional items at their nominal weight. This separation into two phases is possible because the sorting by non-increasing w j guarantees that in any solution the items with smallest indices, i.e. those that were packed into the knapsack earlier, are those that will attain their increased weight (see Lemma 1). Theorem 2 The dynamic programming recursion (5) yields an optimal solution of (RKP). Proof. We build an acyclic directed graph and show that the recursion corresponds to a longest path in the graph. The nodes are labeled as (d, s, j), with d = 0,..., c, j = 0,..., n, s = 0,..., Γ. The node (0, 0, 0) is the source and an additional node, labeled t, is the destination. The arcs are defined as follows: within each group of nodes with the same label s (let us denote them as a stage ) there are arcs (d, s, j 1) (d, s, j) with value 0. Let us denote these arcs as empty. Using an empty arc corresponds to never inserting item j. Moreover, there are other empty arcs with value 0 from each node (d, s, n) to the destination t to model situations in which the solution includes less than Γ items. From stage s 1 to stage s there are arcs (d ŵ j, s 1, j 1) (d, s, j), if d ŵ j, with value p j. Let us denote these arcs as heavy. Using a heavy arc corresponds to inserting item j and assuming it will take the upper weight ŵ j. Finally, within stage s = Γ there are arcs (d w j, Γ, j 1) (d, Γ, j), if d w j, with value p j. Let us denote these arcs as light. Using a light arc corresponds to inserting item j and assuming it will take its nominal weight. Figure 1 shows an example of the graph associated with an instance with n = 4, w = (1, 1, 3, 1), ŵ = (5, 3, 4, 2), c = 8 and Γ = 2. The source and the destination are the larger white nodes. The nodes in gray are non reachable and their arcs are not shown. We claim that there is a one-to-one correspondence between paths from source to destination and feasible solutions. Consider any path from node (0, 0, 0) to node t. Note that this path moves from a stage to the next one only by heavy arcs. In particular, it will reach the final stage only after using exactly Γ heavy arcs. Note also that each path visits the nodes in increasing order of indices j. By construction, the indices of the light arcs (if any) are greater than the indices of the heavy arcs. Hence, by Lemma 1, the solution given by the path

5 5 Solve RKP(N, Γ, c) begin initialization 1. for d := 0 to c do 2. for s = 1 to Γ do 3. z(d, s) = 4. z(0, 0) = 0; 5. for j := 1 to N do possibly pack item j with nominal weight (if Γ items have already been inserted) 6. for d := c down to w j do 7. if z(d w j, Γ ) + p j > z(d, Γ ) then 8. z(d, Γ ) = z(d w j, Γ ) + p j; possibly pack item j with robust weight 9. for s := Γ down to 1 do 10. for d := c down to ŵ j do 11. if z(d ŵ j, s 1) + p j > z(d, s) then 12. z(d, s) = z(d ŵ j, s 1) + p j; 13. z = max{z(d, s) d = 1,..., c; s = 1,..., Γ } end Fig. 2. Dynamic programming algorithm for (RKP). is feasible. Of course, this is true also in case a light arc is used to go from a node (d, s, n) to the destination t; indeed, in this case, only s Γ are inserted in the solution, all of them with increased weight ŵ j. As to the reverse, take any feasible solution J, and let Ĵ be its first Γ items if J > Γ, otherwise Ĵ = J. As before j Γ is the last index in Ĵ. We build the path as follows: for each index j j Γ we choose an empty arc if j / J and a heavy arc if j J, until we reach the node ( j Ĵ ŵj, Ĵ, j Γ ). If J Γ we use an empty arc from this node till the destination node t. If J > Γ, then the node ( j Ĵ ŵj, Ĵ, j Γ ) is actually ( j Ĵ ŵj, Γ, j Γ ), i.e., from this node we use arcs within stage Γ for all j > j Γ, in particular empty arcs if j / J and light arcs if j J, until we reach the node ( j Ĵ ŵj + j J\Ĵ w j, Γ, n) and from this node we go to the destination. Now the recursions (5) are exactly the optimality conditions for a longest path in the graph. 3 Time and space complexity In this section we analyze the time and space complexity of the dynamic programming algorithm resulting from (5). In many practical applications the space requirements are the main obstacle for using a dynamic programming algorithm. Hence, we will pay special attention to this issue. A straightforward evaluation of the recursion (5) starts with array z. In principle, we go through all items j from 1 to n in an outer loop. For each j, all cardinalities s Γ of a solution are considered, and in the inner-most loop all capacity values d from 0 to c are evaluated. Then array z is initialized with the outcome of z for s = Γ. Again, an outer loop goes over all items and an inner loop over all capacities. This would yield a pseudopolynomial running time of O(Γ n c) for computing the optimal solution value.

6 6 For the above recursion, at each iteration j only values from the previous iteration j 1 are required. Thus we can construct a more refined implementation for computing z as given by procedure Solve RKP in Figure 2. The above procedure applies a better utilization of the dynamic programming array and avoids copying array entries from one iteration to the next, yielding a space requirement O(n + Γ c) and a time complexity O(Γ n c). However, in this case it would not be possible to reconstruct the optimal solution set, but only the optimal solution value. To obtain also the optimal solution set there are two straightforward possibilities. On one hand, one could store the dynamic programming arrays for all values of j, which allows a reconstruction of the solution set by backtracking; however, this procedure increases the space requirement by a factor n. On the other hand, one could store the current solution set for each entry of the dynamic programming array. An efficient approach would use a bit representation of the at most n items of each solution which yields a total space requirement of O(n + Γ c log n). But in this case it should be noted that the computation of a new entry of the dynamic programming array requires copying a solution set from a previous entry. Such a transfer of n bits cannot be done in constant time but induces an increased running time of O(Γ n c log n). We will now present a more involved approach based on a recursive partitioning scheme. It is related to the general framework given in Pferschy [17] (see also Kellerer, Pferschy and Pisinger [11, Sec. 3.3]) but requires special considerations since the conditions for directly applying the framework of [17] are not met by (RKP). The main idea is a bipartitioning of the item set N = N 1 N 2 with N 1 = {1,..., n/2} and N 2 = {n/2 + 1,..., n} (assuming n to be even). After computing the optimal solution value for the whole set N we reconstruct the optimal solution set recursively for each set N i. We use the above recursion in a dynamic programming procedure Solve RKP(c, Γ, N) which returns the optimal solution value of the robust knapsack problem for every capacity value d = 1,..., c. In addition we also store for each array entry a counter k(d, Γ ) which indicates how many items in the corresponding solution set were taken from the first half of items, i.e. from N 1. It is trivial to update this counter whenever an item from N 1 is inserted during the dynamic programming recursion. Note that items are never removed from a solution set. The counter value associated to the optimal solution value z will be denoted by k. In the recursion we will also use two non-robust variants of the knapsack problem. On one hand we will use the standard knapsack problem (KP) introduced above. It is well known that the optimal solution set of (KP) can be computed in O(n c) time and O(n + c) space by dynamic programming (see e.g. Kellerer, Pferschy and Pisinger [11]). On the other hand we will use a cardinality constrained knapsack problem (E-kKP), where a strict cardinality bound k is added to (KP) such that x j = k. (6) j N It was shown by Caprara et al. [7] that the optimal solution set of (E-kKP) can be computed in O(k n c) time and O(n + k c) space by dynamic programming. Note that both of these algorithms also makes use of the recursive partitioning scheme from Pferschy [17]. Moreover, they both compute the respective optimal solution values for all capacity values d = 1,..., c. Our partitioning argument is based on the following observation. Lemma 3 If k Γ, then the optimal solution consists of the solutions of a robust knapsack problem with parameter Γ for N 1 and of an instance of (KP) for N 2 with nominal weights. Otherwise, if k < Γ, then the optimal solution consists of the solutions of an instance of (E-kKP) with parameter k and increased weights ŵ j for N 1 and a robust knapsack problem with parameter Γ k for N 2.

7 7 Proof. It was pointed out in Lemma 1 that in any feasible solution, and thus also in an optimal solution, the Γ items with lowest index, i.e. indices up to j Γ, are those which contribute an increased weight to the capacity; all remaining items with higher indices contribute their nominal weight. If k Γ, then j Γ N 1 and all items in the optimal solution belonging to N 2 (if any) contribute only their nominal weight. If k < Γ, then j Γ N 2 and all k items in the optimal solution belonging to N 1 contribute their increased weight. The remaining at most Γ k weight increases are contributed by items in N 2. Note that this second case includes the possibility that the optimal solution contains less than Γ items. Based on Lemma 3 an algorithm for the robust knapsack problem is presented in Figure 3. begin 1. call Solve RKP(c, Γ, N) and determine z, c and k ; 2. call recursion(z, k, c, Γ, N); end recursion(z, k, c, Γ, N) begin 0. if N = 1 then output trivial solution. 1. partition N into N 1 = {1,..., N /2 } and N 2 = { N /2 + 1,..., N }; 2. if k Γ then 3. call Solve RKP(c, Γ, N 1) returning z 1(c ); 4. solve (KP) with N 2, c and weights w j returning z 2(c ); 5. find a combination c 1 + c 2 = c such that z 1(c 1) + z 2(c 2) = z ; 6. output the solution set of (KP) for z 2(c 2); 7. let k1 be the counter associated to z 1(c 1); 8. recursion(z 1(c 1), k1, c 1, Γ, N 1) 9. else 10. solve (E-kKP) with parameter k, N 1, c and weights ŵ j returning z 1(c ); 11. call Solve RKP(c, Γ k, N 2) returning z 2(c ); 12. find a combination c 1 + c 2 = c such that z 1(c 1) + z 2(c 2) = z ; 13. output the solution set of (E-kKP) for z 1(c 1); 14. let k2 be the counter associated to z 2(c 2); 15. recursion(z 2(c 2), k2, c 2, Γ k, N 2) 16. endif end. Fig. 3. Recursive partitioning algorithm to find the optimal solution set of (RKP). Theorem 4 The recursive partitioning algorithm of Figure 3 to compute an optimal solution of (RKP) can be performed in O(Γ n c) time and O(n + Γ c) space. Proof. Using the dynamic programming scheme described above each call to Solve RKP(c, Γ, N) requires O(Γ n c) time and O(n + Γ c) space. Moreover, summarizing the above discussion we can also perform each

8 8 call to recursion(z, k, c, Γ, N) in O(Γ N c ) time: Indeed, the main effort in the recursion for k Γ is the execution of Solve RKP(c, Γ, N 1 ) requiring O(Γ N 2 c ) time and the solution of an instance of (KP) with item set N 2 which requires only O( N 2 c ) time. For k < Γ we have to solve an instance of (E-kKP) in O(Γ N 2 c ) time and execute Solve RKP(c, Γ k, N 2 ) also in O(Γ N 2 c ) time. To report the solutions sets for (KP) resp. (E-kKP) we have to rerun the respective algorithms with capacity c 1 resp. c 2 since they compute the optimal solution sets only for the given capacity value c but not for all capacity values. For both cases finding the combination c 1 + c 2 = c can be done by a simple pass through the dynamic programming arrays. Summing up the running time over all recursion levels we get a total running time of log n Γ n c + Γ n/2 i c 3 Γ n c i=0 which proves the claimed time complexity. The space requirements are trivially bounded by O( N + Γ c). Note that before each call to recursion all previously used space can be set free and thus reused in the next recursion level. Note that the results by Bertsimas and Sim [3] ensure that (RKP) can also be solved to optimality by solving n + 1 nominal knapsack problems (KP), see also Section 4.2. Since (KP) can be solved in O(n c) time and O(n+c) space this approach would require only O(n+c) space, but O(n 2 c) time. An improvement over [3] has recently been proved by Lee et al. [14]; according to this result, the number of executions of nominal (KP) can be reduced to n Γ + 1, although this does not change the worst-case complexity of the approach. 4 Other exact approaches to (RKP) In this section we review some other algorithms for the optimal solution of (RKP). 4.1 A compact MILP-formulation The robust counterpart of an uncertain ILP was formulated by Bertsimas and Sim [4] as a Mixed ILP (MILP) by adding a polynomial number of variables and constraints. For the special case of (KP), the associated robust counterpart looks as follows: max p j x j j N w j x j + j N j N w j x j + π j + ρ 0 π j + Γ ρ 1 j N x j {0, 1}, π j 0, ρ 0 j N. The resulting model, referred to as BS MILP in the following, involves n binary and n + 1 continuous variables, and n + 1 constraints. Hence, from a theoretical point of view, enforcing robustness does not increase the computational complexity of the problem. (7)

9 9 4.2 Iterative solution of the nominal problem A different approach for a special class of ILPs was presented again by Bertsimas and Sim [3] who considered optimization problems problems in which all variables are binary and only the coefficients in the objective function are subject to uncertainty. In this case, it is enough to observe that an optimal solution exists in which variable ρ takes a value from a set of at most n + 1 candidates; once ρ is fixed, the resulting problem is a nominal problem in which some coefficients are changed. Hence, one can guess the correct value of ρ, solve n + 1 nominal problems and take the best of the associated solutions as the optimal robust solution. It is easy to see that, if one swaps the role of the objective function with that of the uncertain constraint, (RKP) immediately fits within these settings, which allows to adopt the scheme above. By solving n + 1 nominal (KP) instances, obtained by suitably changing the items weights, one yields the optimal solution of a given (RKP) instance. The algorithm above requires O(n T ) time, where O(T ) denotes the computing time for solving the nominal (KP). As already mentioned, this approach has been recently improved by Lee et al. [14], who proved that the optimal solution of (RKP) can be obtained by solving n Γ + 1 nominal (KP) instances. In addition, this latter result was generalized by Álvarez-Miranda, Ljubic and Toth [1] for binary problems in which uncertainty affects Γ coefficients of a linear objective function to be optimized on a polyhedral region. 4.3 Branch-and-cut algorithm Fischetti and Monaci [8] noted that robustness, defined according to the definition of Bertsimas and Sim [3], can be enforced with no need of introducing additional variables, by working on the space of the original x j variables. To do this, one has to separate some robustness cuts, that, for the knapsack problem, have the following structure w j x j c, S N : S Γ. (8) w j x j + j N j S For a general MILP, given the current solution x, the separation of robustness cuts associated with a given row requires O(n) if the x is integer; otherwise separation can be carried out in O(n log n) time. Note that the formulation of Section 4.1 and this Branch-and-Cut model have the same lower bounds given by the LP relaxations as can be seen from [4]. 5 FPTAS and Robust Knapsack Approximation algorithms are an obvious alternative to the computation of exact solutions. In particular, the construction of a fully polynomial approximation scheme (FPTAS) for (RKP) is an interesting issue. Note that the recursion (5) could be alternatively stated by exchanging the roles of profit and weights. Without lengthy explanations we briefly state the resulting recursion. Let y(p, s, j) be the smallest weight for a feasible solution with total profit p in which only items in {1,..., j} N are considered and exactly s of them are included, all with their upper weight bound ŵ j. Let y(p, j) be the smallest weight for a feasible solution with total profit p in which only items in {1,..., j} N are considered and Γ of them change from their nominal weight to their upper bound. The entries of the dynamic programming array can be computed in analogy to (5). y(p, s, j) = min{y(p, s, j 1), y(p p j, s 1, j 1) + ŵ j } for p = 0,..., p(n), s = 1,..., Γ, j = 1,..., n, y(p, j) = min{y(p, j 1), y(p p j, j 1) + w j } for p = 0,..., p(n), j = Γ + 1,..., n (9)

10 10 with the obvious initializations. Then the optimal solution value is given by max{p y(p, n) c}. The straightforward running time of this approach would be O(Γ n j N p j). Since the running time is now pseudopolynomial in the sum of profits, one can apply a standard scaling argument (cf. [11, Sec. 2.6]) to obtain an FPTAS from our dynamic programming scheme. Indeed, using scaled profits p j := p j n/ (ε p max ), where p max is the largest profit of an item, one obtains an FPTAS for (RKP) with running time O(Γ n 3 /ε) (neglecting the details of retrieving the corresponding solution set, cf. Section 3). However, one could also use the iterative method from Section 4.2 to reach an FPTAS. Indeed, the iterative method can be applied also with any approximation algorithm for (KP). Again, n + 1 iterations yield a feasible solution for (RKP) and preserve the approximation ratio of the algorithm for the nominal problem. Therefore, one can take advantage of the highly tuned FPTAS for (KP) (see Kellerer and Pferschy [9, 10]) with a running time complexity of O(n log n + 1/ε 3 log 2 (1/ε)) and obtain an FPTAS for (RKP) with O(n 2 log n + n 1/ε 3 log 2 (1/ε)) running time. This will dominate the above approach for most reasonable parameter settings. Of course, it would be possible to apply some of the technical features of [9, 10] to speed up the FPTAS arising directly from the dynamic program for (RKP). However, it seems that this is a futile exercise with little hope for an overall improved running time complexity. 6 Computational experiments In this section we computationally evaluate, on a large set of instances, the dynamic programming algorithm of Section 2 and the other exact algorithms for (RKP) described in Section 4. To the best of our knowledge, no (RKP) instances were proposed so far in the literature, but those used by Klopfenstein and Nace [13]; as already mentioned, these are however quite small instances (up to 20 items) that cannot be used to compare dynamic programming with the algorithms of Section 4. Thus, we randomly generated the problems in our testbed in the following way. Test instances In order to produce hard (RKP) instances, we first generated hard (KP) instances and then defined the robust weight of each item accordingly. According to Pisinger [18], hard (KP) instances were obtained by taking profits and weights as independent uniformly distributed values in a given interval; in particular, the following 5 classes of (KP) instances were generated: UN, uncorrelated instances: p j and w j are integer values randomly chosen in [1, c]; WC, weakly correlated instances: w j values are integer values randomly generated in [1, c], and each p j is chosen among the integers in [max{1, w j c/10}, w j + c/10]; SC, strongly correlated instances: each weight w j is an integer value randomly chosen in [1, c] and the associated profit is p j = w j + c/10; IC, inverse strongly correlated instances: each profit p j is an integer value randomly chosen in [1, c] and the associated weight is w j = min{c, p j + c/10}; SS, subset sum instances: weights w j are integer values randomly generated in [1, c] and p j = w j. To test the performances of the algorithms with problems of different sizes, we generated instances with c = 100 and n {100, 500, 1000, 5000}, and instances with n = 5000 and c {1000, 5000}. For each combination of the parameters, 10 instances were generated; thus our testbed includes 300 (KP) instances. As to uncertainty, in all the instances the robust weight w j of each item j was randomly generated in [w j, c]. Finally, we considered different values of Γ, namely Γ {1, 10, 50}.

11 11 All instances (and the corresponding solutions) are available at Algorithms We compared the following exact approaches for (RKP): BS MILP, i.e., the compact formulation (7) for (RKP) as proposed by Bertsimas and Sim [4]. LLP P, i.e., the approach proposed by Lee et al. [14] as an improvement on Bertsimas and Sim [3], consisting in the iterative solution of nominal (KP) instances. To solve nominal (KP) instances, we run as a black box the publicly available routine combo by Martello, Pisinger and Toth [15], which is actually considered the state-of-the-art for the exact solution of (KP) problems. BC, i.e., the branch-and-cut algorithm to robust optimization recently proposed by Fischetti and Monaci [8]; in our implementation, separation is carried out at each node of the enumerative tree. DP, i.e., the dynamic programming algorithm Solve RKP presented in Section 3, but without the recursive scheme for space reduction. All algorithms were coded in C language and run on an Intel 2.67GHz in single-thread mode. For solving both MILP (7) and all LPs during enumerative algorithm BC, the commercial solver IBM-ILOG Cplex 11.2 was used. For each instance, a time limit of 300 CPU seconds was given to each algorithm. For some classes of instances the CPU times are very small; thus, in order to obtain a reliable estimate, it was necessary to compute, for each instance, the CPU time spent while solving it 100 times and correspondingly divide the total time. Results Table 1 reports the outcome of our experiments on the 300 instances of our testbed for the 3 different values of Γ. In particular, each line in the table refers to a set of 10 instances, characterized by number of items n, capacity c and type t {UN, W C, SC, IC, SS}, and reports, for each value of Γ, the average computing time (arithmetic mean, in seconds) required by each algorithm (for unsolved instances, we counted a computing time equal to the time limit). Computational results show that our dynamic programming algorithm is very effective in solving (RKP) instances where a small number of coefficients change, as its complexity grows linearly with Γ. For larger values of Γ the iterative solution of (KP) instances, as proposed by Bertsimas and Sim [3], turns out to be the best algorithmic approach. However, the computing time of LLP P may vary in a substantial way when solving instances of different type although of the same size which is not the case for algorithm DP, whose computing time is more stable. This is particularly evident when instances with c = 5000 are considered. The two algorithms above outperform the remaining two algorithms, BS MILP and BC. This is not surprising, as the latter are based on the use of a general purpose ILP solver, which is usually less efficient than ad hoc algorithms for knapsack problems. In addition, cutting planes are not the best suitable way to enforce robustness when problems with integer variables are considered, as noted by Fischetti and Monaci [8], which leads to a number of unsolved instances in our testbed. 7 Conclusions In this paper we considered the robust knapsack problem, i.e., the uncertain variant of the well-known knapsack problem in which robustness is enforced according to the Bertsimas-Sim definition (see, [4]). For

12 12 instances Γ = 1 Γ = 10 Γ = 50 n c type BSMILP BS2 BC DP BSMILP BS2 BC DP BSMILP BS2 BC DP UN WC SC IC SS UN WC SC IC SS UN WC SC IC SS UN WC SC IC SS UN WC SC IC SS UN WC SC IC SS avg Table 1. Computational experiments on random (RKP) instances

13 13 this problem we presented a dynamic programming algorithm and studied its time and space complexities, as well as techniques aimed at reducing the space complexity. We then computationally tested this algorithm on a large set of randomly generated instances, and compared the performances of the algorithm with those of other exact approaches proposed in the literature for (RKP). Computational results showed that dynamic programming is a viable way for solving (RKP) even for large-sized instances. Acknowledgments We would to thank an anonymous referee for helpful remarks and suggestions to improve the presentation of the paper. Ulrich Pferschy was supported by the Austrian Science Fund (FWF): [P N13] Graph Problems with Knapsack Constraints. References 1. E. Álvarez-Miranda and I. Ljubic and P. Toth: A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems, 4OR, in press. 2. D. Bertsimas and D.B. Brown and C. Caramanis: Theory and Applications of Robust Optimization. SIAM Review, 53, , (2011). 3. D. Bertsimas and M. Sim: Robust Discrete Optimization and Network Flows. Mathematical Programming, 98, 49 71, (2003). 4. D. Bertsimas and M. Sim: The Price of Robustness. Operations Research, 52, 35 53, (2004). 5. C. Büsing and A.M.C.A. Koster and M. Kutschka: Recoverable Robust Knapsacks: Γ -Scenarios, in: Proceedings of INOC 2011, International Network Optimization Conference, J. Pahl and T. Reiners and S. Voß (eds), Lecture Notes in Computer Science 6701, Springer, Berlin Heidelberg, (2011). 6. C. Büsing and A.M.C.A. Koster and M. Kutschka: Recoverable Robust Knapsacks: the Discrete Scenario Case. Optimization Letters, 5, , (2011). 7. A. Caprara and H. Kellerer and U. Pferschy and D. Pisinger: Approximation Algorithms for Knapsack Problems with Cardinality Constraints. European Journal of Operational Research, 123, , (2000). 8. M. Fischetti and M. Monaci: Cutting plane versus compact formulations for uncertain (integer) linear programs. Mathematical Programming Computation, 4, , (2012). 9. H. Kellerer and U. Pferschy: A new fully polynomial approximation scheme for the knapsack problem. Journal of Combinatorial Optimization, 3, 59 71, (1999). 10. H. Kellerer and U. Pferschy: Improved dynamic programming in connection with an FPTAS for the knapsack problem. Journal of Combinatorial Optimization, 8, 5 12, (2004). 11. H. Kellerer and U. Pferschy and D. Pisinger: Knapsack Problems. Springer (2004). 12. O. Klopfenstein and D. Nace: A Robust Approach to the Chance-Constrained Knapsack Problem. Operations Research Letters, 36, , (2008). 13. O. Klopfenstein and D. Nace: Cover inequalities for robust knapsack sets - application to the robust bandwidth packing problem. Networks, 59, 59 72, (2012). 14. C. Lee and K. Lee and K. Park and S. Park: Technical Note Branch-and-Price-and-Cut Approach to the Robust Network Design Problem Without Flow Bifurcations. Operations Research, 60, , (2012). 15. S. Martello and D. Pisinger and P. Toth: Dynamic Programming and Strong Bounds for the 0-1 Knapsack Problem. Management Science, 3, , (1999).

14 M. Monaci and U. Pferschy: On the Robust Knapsack Problem. submitted manuscript, available as Optimization Online (2012). 17. U. Pferschy: Dynamic programming revisited: Improving knapsack algorithms. Computing, 63, , (1999). 18. D. Pisinger: Where are the hard knapsack problems?. Computers and Operations Research, 32, , (2005).

### The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

### 3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

### On the Max Coloring Problem

On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

### The complement of PATH is in NL

340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:

### 6. Lecture notes on matroid intersection

Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

### Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406 Lecture 20 Dr. Ted Ralphs IE406 Lecture 20 1 Reading for This Lecture Bertsimas Sections 10.1, 11.4 IE406 Lecture 20 2 Integer Linear Programming An integer

### Approximate Linear Programming for Average-Cost Dynamic Programming

Approximate Linear Programming for Average-Cost Dynamic Programming Daniela Pucci de Farias IBM Almaden Research Center 65 Harry Road, San Jose, CA 51 pucci@mitedu Benjamin Van Roy Department of Management

### Optimality certificates for convex minimization and Helly numbers

Optimality certificates for convex minimization and Helly numbers Amitabh Basu Michele Conforti Gérard Cornuéjols Robert Weismantel Stefan Weltge October 20, 2016 Abstract We consider the problem of minimizing

### Linear-time approximation algorithms for minimum subset sum and subset sum

Linear-time approximation algorithms for minimum subset sum and subset sum Liliana Grigoriu 1 1 : Faultät für Wirtschaftswissenschaften, Wirtschaftsinformati und Wirtschaftsrecht Universität Siegen, Kohlbettstr.

### BIN PACKING PROBLEM: A LINEAR CONSTANT- SPACE -APPROXIMATION ALGORITHM

International Journal on Computational Science & Applications (IJCSA) Vol.5,No.6, December 2015 BIN PACKING PROBLEM: A LINEAR CONSTANT- SPACE -APPROXIMATION ALGORITHM Abdolahad Noori Zehmakan Department

### An Efficient Approximation for the Generalized Assignment Problem

An Efficient Approximation for the Generalized Assignment Problem Reuven Cohen Liran Katzir Danny Raz Department of Computer Science Technion Haifa 32000, Israel Abstract We present a simple family of

### Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

### A hard integer program made easy by lexicography

Noname manuscript No. (will be inserted by the editor) A hard integer program made easy by lexicography Egon Balas Matteo Fischetti Arrigo Zanette February 16, 2011 Abstract A small but notoriously hard

### Local search heuristic for multiple knapsack problem

International Journal of Intelligent Information Systems 2015; 4(2): 35-39 Published online February 14, 2015 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20150402.11 ISSN: 2328-7675

### Polynomial-Time Approximation Algorithms

6.854 Advanced Algorithms Lecture 20: 10/27/2006 Lecturer: David Karger Scribes: Matt Doherty, John Nham, Sergiy Sidenko, David Schultz Polynomial-Time Approximation Algorithms NP-hard problems are a vast

### VNS-based heuristic with an exponential neighborhood for the server load balancing problem

Available online at www.sciencedirect.com Electronic Notes in Discrete Mathematics 47 (2015) 53 60 www.elsevier.com/locate/endm VNS-based heuristic with an exponential neighborhood for the server load

### Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

### Parameterized Complexity of Independence and Domination on Geometric Graphs

Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de

### Problem set 2. Problem 1. Problem 2. Problem 3. CS261, Winter Instructor: Ashish Goel.

CS261, Winter 2017. Instructor: Ashish Goel. Problem set 2 Electronic submission to Gradescope due 11:59pm Thursday 2/16. Form a group of 2-3 students that is, submit one homework with all of your names.

### 11.1 Facility Location

CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

### These are not polished as solutions, but ought to give a correct idea of solutions that work. Note that most problems have multiple good solutions.

CSE 591 HW Sketch Sample Solutions These are not polished as solutions, but ought to give a correct idea of solutions that work. Note that most problems have multiple good solutions. Problem 1 (a) Any

### Fast algorithms for max independent set

Fast algorithms for max independent set N. Bourgeois 1 B. Escoffier 1 V. Th. Paschos 1 J.M.M. van Rooij 2 1 LAMSADE, CNRS and Université Paris-Dauphine, France {bourgeois,escoffier,paschos}@lamsade.dauphine.fr

### Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

### Binary decision diagrams for computing the non-dominated set

Binary decision diagrams for computing the non-dominated set July 13, 2015 Antti Toppila and Ahti Salo 27th European Conference on Operational Research, 12-15 July 2015, University of Strathclyde, Glasgow,

### 11. APPROXIMATION ALGORITHMS

Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem

### / Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

### 3 INTEGER LINEAR PROGRAMMING

3 INTEGER LINEAR PROGRAMMING PROBLEM DEFINITION Integer linear programming problem (ILP) of the decision variables x 1,..,x n : (ILP) subject to minimize c x j j n j= 1 a ij x j x j 0 x j integer n j=

### On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

### Leveraging Set Relations in Exact Set Similarity Join

Leveraging Set Relations in Exact Set Similarity Join Xubo Wang, Lu Qin, Xuemin Lin, Ying Zhang, and Lijun Chang University of New South Wales, Australia University of Technology Sydney, Australia {xwang,lxue,ljchang}@cse.unsw.edu.au,

### Greedy algorithms is another useful way for solving optimization problems.

Greedy Algorithms Greedy algorithms is another useful way for solving optimization problems. Optimization Problems For the given input, we are seeking solutions that must satisfy certain conditions. These

### NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

### Finding an optimal seating arrangement for employees traveling to an event

Croatian Operational Research Review 419 CRORR 6(2015), 419 427 Finding an optimal seating arrangement for employees traveling to an event Ninoslav Čerkez 1, Rebeka Čorić 2, Mateja Dumić 2, and Domagoj

### The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

### Lecture 8: The Traveling Salesman Problem

Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes

### 5 MST and Greedy Algorithms

5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

### Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

### A simulated annealing algorithm for the vehicle routing problem with time windows and synchronization constraints

A simulated annealing algorithm for the vehicle routing problem with time windows and synchronization constraints Sohaib Afifi 1, Duc-Cuong Dang 1,2, and Aziz Moukrim 1 1 Université de Technologie de Compiègne

### 1 The range query problem

CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition

### ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY

ALGEBRAIC METHODS IN LOGIC AND IN COMPUTER SCIENCE BANACH CENTER PUBLICATIONS, VOLUME 28 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1993 ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING

### Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

### 5 MST and Greedy Algorithms

5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

### Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

### Construction of Minimum-Weight Spanners Mikkel Sigurd Martin Zachariasen

Construction of Minimum-Weight Spanners Mikkel Sigurd Martin Zachariasen University of Copenhagen Outline Motivation and Background Minimum-Weight Spanner Problem Greedy Spanner Algorithm Exact Algorithm:

### A Row-and-Column Generation Method to a Batch Machine Scheduling Problem

The Ninth International Symposium on Operations Research and Its Applications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 301 308 A Row-and-Column Generation

### Michał Dębski. Uniwersytet Warszawski. On a topological relaxation of a conjecture of Erdős and Nešetřil

Michał Dębski Uniwersytet Warszawski On a topological relaxation of a conjecture of Erdős and Nešetřil Praca semestralna nr 3 (semestr letni 2012/13) Opiekun pracy: Tomasz Łuczak On a topological relaxation

### Approximation Algorithms: The Primal-Dual Method. My T. Thai

Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the

### 11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

### Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

### arxiv: v2 [cs.dm] 3 Dec 2014

The Student/Project Allocation problem with group projects Aswhin Arulselvan, Ágnes Cseh, and Jannik Matuschke arxiv:4.035v [cs.dm] 3 Dec 04 Department of Management Science, University of Strathclyde,

### Cuts and Disjoint Paths in the Valley-Free Path Model

Cuts and Disjoint Paths in the Valley-Free Path Model Thomas Erlebach Alexander Hall Alessandro Panconesi Danica Vukadinović October 30, 2005 Abstract In the valley-free path model, a path in a given directed

### An Eternal Domination Problem in Grids

Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

### Finding Strongly Connected Components

Yufei Tao ITEE University of Queensland We just can t get enough of the beautiful algorithm of DFS! In this lecture, we will use it to solve a problem finding strongly connected components that seems to

### α Coverage to Extend Network Lifetime on Wireless Sensor Networks

Noname manuscript No. (will be inserted by the editor) α Coverage to Extend Network Lifetime on Wireless Sensor Networks Monica Gentili Andrea Raiconi Received: date / Accepted: date Abstract An important

### Points covered an odd number of times by translates

Points covered an odd number of times by translates Rom Pinchasi August 5, 0 Abstract Let T be a fixed triangle and consider an odd number of translated copies of T in the plane. We show that the set of

### 15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015

15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 While we have good algorithms for many optimization problems, the previous lecture showed that many

### Star Forests, Dominating Sets and Ramsey-type Problems

Star Forests, Dominating Sets and Ramsey-type Problems Sheila Ferneyhough a, Ruth Haas b,denis Hanson c,1 and Gary MacGillivray a,1 a Department of Mathematics and Statistics, University of Victoria, P.O.

### Complexity Results on Graphs with Few Cliques

Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

### The incidence game chromatic number

The incidence game chromatic number Stephan Dominique Andres Zentrum für angewandte Informatik Köln, University of Cologne, Weyertal 80, 50931 Köln, Germany Abstract We introduce the incidence game chromatic

### Solution for Homework set 3

TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities

### Dominating Set on Bipartite Graphs

Dominating Set on Bipartite Graphs Mathieu Liedloff Abstract Finding a dominating set of minimum cardinality is an NP-hard graph problem, even when the graph is bipartite. In this paper we are interested

### Hardness of Subgraph and Supergraph Problems in c-tournaments

Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in

### Improved Results on Geometric Hitting Set Problems

Improved Results on Geometric Hitting Set Problems Nabil H. Mustafa nabil@lums.edu.pk Saurabh Ray saurabh@cs.uni-sb.de Abstract We consider the problem of computing minimum geometric hitting sets in which,

### Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars

Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars Samuel Tigistu Feder * Abstract This paper addresses the problem of scheduling

### Superconcentrators of depth 2 and 3; odd levels help (rarely)

Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv

### CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS 3.1. Extension of a Static k-sp Algorithm to the Time-Dependent Case Kaufman and Smith [1993] showed that under the consistency

### On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,

### An Evolutionary Algorithm for the Multi-objective Shortest Path Problem

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem Fangguo He Huan Qi Qiong Fan Institute of Systems Engineering, Huazhong University of Science & Technology, Wuhan 430074, P. R. China

### Bound Consistency for Binary Length-Lex Set Constraints

Bound Consistency for Binary Length-Lex Set Constraints Pascal Van Hentenryck and Justin Yip Brown University, Box 1910 Carmen Gervet Boston University, Providence, RI 02912 808 Commonwealth Av. Boston,

### 1 The Traveling Salesperson Problem (TSP)

CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

### Multiple Vertex Coverings by Cliques

Multiple Vertex Coverings by Cliques Wayne Goddard Department of Computer Science University of Natal Durban, 4041 South Africa Michael A. Henning Department of Mathematics University of Natal Private

### Steiner Trees and Forests

Massachusetts Institute of Technology Lecturer: Adriana Lopez 18.434: Seminar in Theoretical Computer Science March 7, 2006 Steiner Trees and Forests 1 Steiner Tree Problem Given an undirected graph G

### MA4254: Discrete Optimization. Defeng Sun. Department of Mathematics National University of Singapore Office: S Telephone:

MA4254: Discrete Optimization Defeng Sun Department of Mathematics National University of Singapore Office: S14-04-25 Telephone: 6516 3343 Aims/Objectives: Discrete optimization deals with problems of

### Parallel Evaluation of Hopfield Neural Networks

Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE

### (67686) Mathematical Foundations of AI July 30, Lecture 11

(67686) Mathematical Foundations of AI July 30, 2008 Lecturer: Ariel D. Procaccia Lecture 11 Scribe: Michael Zuckerman and Na ama Zohary 1 Cooperative Games N = {1,...,n} is the set of players (agents).

### Line Graphs and Circulants

Line Graphs and Circulants Jason Brown and Richard Hoshino Department of Mathematics and Statistics Dalhousie University Halifax, Nova Scotia, Canada B3H 3J5 Abstract The line graph of G, denoted L(G),

### NON-CENTRALIZED DISTINCT L-DIVERSITY

NON-CENTRALIZED DISTINCT L-DIVERSITY Chi Hong Cheong 1, Dan Wu 2, and Man Hon Wong 3 1,3 Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong {chcheong, mhwong}@cse.cuhk.edu.hk

### 1 Definition of Reduction

1 Definition of Reduction Problem A is reducible, or more technically Turing reducible, to problem B, denoted A B if there a main program M to solve problem A that lacks only a procedure to solve problem

### Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

### Unsplittable Flows. Hoon Cho and Alex Wein Final Project

Unsplittable Flows Hoon Cho (hhcho@mit.edu) and Alex Wein (awein@mit.edu) 6.854 Final Project Abstract An unsplittable flow in a multicommodity network is a flow that routes each commoidty on a single

### Single Machine Scheduling with Interfering Job Sets. Arizona State University PO Box Tempe, AZ

Single Machine Scheduling with Interfering Job Sets Ketan Khowala 1,3, John Fowler 1,3, Ahmet Keha 1* and Hari Balasubramanian 2 1 Department of Industrial Engineering Arizona State University PO Box 875906

### Fast algorithm for generating ascending compositions

manuscript No. (will be inserted by the editor) Fast algorithm for generating ascending compositions Mircea Merca Received: date / Accepted: date Abstract In this paper we give a fast algorithm to generate

### 15.083J Integer Programming and Combinatorial Optimization Fall Enumerative Methods

5.8J Integer Programming and Combinatorial Optimization Fall 9 A knapsack problem Enumerative Methods Let s focus on maximization integer linear programs with only binary variables For example: a knapsack

### Topology and Topological Spaces

Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

### CS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri

CS 598CSC: Approximation Algorithms Lecture date: March, 011 Instructor: Chandra Chekuri Scribe: CC Local search is a powerful and widely used heuristic method (with various extensions). In this lecture

### Sources for this lecture. 3. Matching in bipartite and general graphs. Symmetric difference

S-72.2420 / T-79.5203 Matching in bipartite and general graphs 1 3. Matching in bipartite and general graphs Let G be a graph. A matching M in G is a set of nonloop edges with no shared endpoints. Let

### A Fast Algorithm for Optimal Alignment between Similar Ordered Trees

Fundamenta Informaticae 56 (2003) 105 120 105 IOS Press A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Jesper Jansson Department of Computer Science Lund University, Box 118 SE-221

### Decreasing the Diameter of Bounded Degree Graphs

Decreasing the Diameter of Bounded Degree Graphs Noga Alon András Gyárfás Miklós Ruszinkó February, 00 To the memory of Paul Erdős Abstract Let f d (G) denote the minimum number of edges that have to be

### Lecture 4: Primal Dual Matching Algorithm and Non-Bipartite Matching. 1 Primal/Dual Algorithm for weighted matchings in Bipartite Graphs

CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 009) Lecture 4: Primal Dual Matching Algorithm and Non-Bipartite Matching Lecturer: Mohammad R. Salavatipour Date: Sept 15 and 17, 009

### Computing optimal total vertex covers for trees

Computing optimal total vertex covers for trees Pak Ching Li Department of Computer Science University of Manitoba Winnipeg, Manitoba Canada R3T 2N2 Abstract. Let G = (V, E) be a simple, undirected, connected

### Solving Two-stage Robust Optimization Problems by A Constraint-and-Column Generation Method

Solving Two-stage Robust Optimization Problems by A Constraint-and-Column Generation Method Bo Zeng Department of Industrial and Management Systems Engineering University of South Florida, Email: bzeng@usf.edu

### arxiv: v1 [cs.dm] 22 Jul 2011

Bottom-Left Placement Theorem for Rectangle Packing Wenqi Huang, Tao Ye arxiv:1107.6v1 [cs.dm] Jul 011 School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 007,

### THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES

THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES Ali Mansouri 1 and Mohamed Salim bouhlel 2 1 Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia 2 Department of Electronic

### Design and Analysis of Algorithms

CSE 101, Winter 018 D/Q Greed SP s DP LP, Flow B&B, Backtrack Metaheuristics P, NP Design and Analysis of Algorithms Lecture 8: Greed Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Optimization

### On Clarkson s Las Vegas Algorithms for Linear and Integer Programming When the Dimension is Small

On Clarkson s Las Vegas Algorithms for Linear and Integer Programming When the Dimension is Small Robert Bassett March 10, 2014 2 Question/Why Do We Care Motivating Question: Given a linear or integer

### CMSC Theory of Algorithms Second Midterm

NAME (please PRINT in large letters): SECTION: 01 02 (circle one) CMSC 27200 Theory of Algorithms Second Midterm 02-26-2015 The exam is closed book. Do not use notes. The use of ELECTRONIC DEVICES is strictly

### Heuristics in MILP. Group 1 D. Assouline, N. Molyneaux, B. Morén. Supervisors: Michel Bierlaire, Andrea Lodi. Zinal 2017 Winter School

Heuristics in MILP Group 1 D. Assouline, N. Molyneaux, B. Morén Supervisors: Michel Bierlaire, Andrea Lodi Zinal 2017 Winter School 0 / 23 Primal heuristics Original paper: Fischetti, M. and Lodi, A. (2011).

### FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

### Basic Graph Theory with Applications to Economics

Basic Graph Theory with Applications to Economics Debasis Mishra February, 0 What is a Graph? Let N = {,..., n} be a finite set. Let E be a collection of ordered or unordered pairs of distinct elements