What is the Worst Case Behavior of the Simplex Algorithm?

Similar documents
uniil/mili/l -Ellllllllll hhh'o

CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi

The simplex method and the diameter of a 0-1 polytope

LECTURE 6: INTERIOR POINT METHOD. 1. Motivation 2. Basic concepts 3. Primal affine scaling algorithm 4. Dual affine scaling algorithm

Discrete Optimization. Lecture Notes 2

Lecture 4: Linear Programming

A Subexponential Randomized Simplex Algorithm

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Subexponential lower bounds for randomized pivoting rules for the simplex algorithm

The Simplex Algorithm

Integer Programming Theory

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

Artificial Intelligence

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [math.co] 25 Sep 2015

Integrated Math I. IM1.1.3 Understand and use the distributive, associative, and commutative properties.

MATH 890 HOMEWORK 2 DAVID MEREDITH

Algorithmic Game Theory and Applications. Lecture 6: The Simplex Algorithm

Linear Programming and its Applications

MA4254: Discrete Optimization. Defeng Sun. Department of Mathematics National University of Singapore Office: S Telephone:

Linear programming and the efficiency of the simplex algorithm for transportation polytopes

CMPSCI611: The Simplex Algorithm Lecture 24

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Monotone Paths in Geometric Triangulations

Modeling and Analysis of Hybrid Systems

Modeling and Analysis of Hybrid Systems

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

A Simplex-Cosine Method for Solving Hard Linear Problems

Graphs that have the feasible bases of a given linear

THEORY OF LINEAR AND INTEGER PROGRAMMING

MATH 310 : Degeneracy and Geometry in the Simplex Method

ACTUALLY DOING IT : an Introduction to Polyhedral Computation

Chapter 15 Introduction to Linear Programming

J Linear Programming Algorithms

CSE 460. Today we will look at" Classes of Optimization Problems" Linear Programming" The Simplex Algorithm"

The Global Standard for Mobility (GSM) (see, e.g., [6], [4], [5]) yields a

A Comparative study on Algorithms for Shortest-Route Problem and Some Extensions

Lecture Notes 2: The Simplex Algorithm

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini

Acyclic Edge Colorings of Graphs

CSC 8301 Design & Analysis of Algorithms: Linear Programming

VARIANTS OF THE SIMPLEX METHOD

Notes taken by Mea Wang. February 11, 2005

16.410/413 Principles of Autonomy and Decision Making

All 0-1 Polytopes are. Abstract. We study the facial structure of two important permutation polytopes

Some Advanced Topics in Linear Programming

POLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if

Linear programming II João Carlos Lourenço

An iteration of the simplex method (a pivot )

Integer Programming ISE 418. Lecture 1. Dr. Ted Ralphs

Outreach Lecture: Polytopes

PITSCO Math Individualized Prescriptive Lessons (IPLs)

Polytopes, their diameter, and randomized simplex

Lecture 16 October 23, 2014

Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 50

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

AMATH 383 Lecture Notes Linear Programming

Design and Analysis of Algorithms (V)

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29

Convex Optimization CMU-10725

NATCOR Convex Optimization Linear Programming 1

Linear Programming Duality and Algorithms

IE 5531: Engineering Optimization I

CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension

3 INTEGER LINEAR PROGRAMMING

Polyhedral Computation Today s Topic: The Double Description Algorithm. Komei Fukuda Swiss Federal Institute of Technology Zurich October 29, 2010

A Feasible Region Contraction Algorithm (Frca) for Solving Linear Programming Problems

Linear Programming. them such that they

Acyclic Edge Colorings of Graphs

Simulation. Lecture O1 Optimization: Linear Programming. Saeed Bastani April 2016

Section Notes 5. Review of Linear Programming. Applied Math / Engineering Sciences 121. Week of October 15, 2017

BCN Decision and Risk Analysis. Syed M. Ahmed, Ph.D.

However, m pq is just an approximation of M pq. As it was pointed out by Lin [2], more precise approximation can be obtained by exact integration of t

Linear Programming. Readings: Read text section 11.6, and sections 1 and 2 of Tom Ferguson s notes (see course homepage).

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.

An example of LP problem: Political Elections

Programming, numerics and optimization

arxiv: v1 [math.co] 15 Dec 2009

Introduction to Linear Programming

Lecture 9: Linear Programming

Outline. CS38 Introduction to Algorithms. Linear programming 5/21/2014. Linear programming. Lecture 15 May 20, 2014

Linear and Integer Programming :Algorithms in the Real World. Related Optimization Problems. How important is optimization?

George B. Dantzig Mukund N. Thapa. Linear Programming. 1: Introduction. With 87 Illustrations. Springer

Chapter II. Linear Programming

Linear Programming and Clustering

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA

Complementary Graph Coloring

Linear Programming in Small Dimensions

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS

Open problems in convex optimisation

Ahigh school curriculum in Algebra 2 contains both solving systems of linear equations,

The Simplex Algorithm with a New. Primal and Dual Pivot Rule. Hsin-Der CHEN 3, Panos M. PARDALOS 3 and Michael A. SAUNDERS y. June 14, 1993.

Circuit Walks in Integral Polyhedra

LP-Modelling. dr.ir. C.A.J. Hurkens Technische Universiteit Eindhoven. January 30, 2008

Stable sets, corner polyhedra and the Chvátal closure

REGULAR GRAPHS OF GIVEN GIRTH. Contents

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

reasonable to store in a software implementation, it is likely to be a signicant burden in a low-cost hardware implementation. We describe in this pap

Transcription:

Centre de Recherches Mathématiques CRM Proceedings and Lecture Notes Volume, 28 What is the Worst Case Behavior of the Simplex Algorithm? Norman Zadeh Abstract. The examples published by Klee and Minty in 72 do not preclude the existence of a pivot rule which will make the simplex method, at worst, polynomial. In fact, the continuing success of Dantzig's method suggests that such a rule does exist. A study of known examples shows that (a) those which use selective pivot rules require exponentially large coecients, and (b) none of the examples' pivot rules are typically used in practice, either because of computational requirements or due to a lack of even-handed movement through the column set. In all bad problems, certain improving columns are entered 2 m 2 times before other improving columns are entered once. This is done by making the unused columns appear to yield small objective function improvement. The purpose of this paper is to explain the KleeMinty and Jeroslow constructions, show how they can be modied to be pathological with small integral coecients, and then suggest a least entered pivot rule which forces an improving column to be entered before any other column is entered for the second time. This rule seems immune to the deformed product construction which is the essence of all known exponential counterexamples.. Introduction The simplex method has been solving linear programs with m constraints in m to 3m pivots for over twenty years. In 72, Klee and Minty demonstrated the existence of linear programs with m inequality constraints in m non-negative variables which require 2 m pivots when any improving column may enter and when the standard max c j z j rule is followed. Applying their construction for the standard rule leads to coecients in excess of 3 m. In 73, Jeroslow published a modication of a second Klee and Minty construction. His modication is pathological for the maximum increase rule. An unrened application of this construction also yields exponential coecients. 2 Mathematics Subject Classication. Primary: ; Secondary:. Prepared under National Science Foundation Grant ENG 762266 and also partially supported by the Oce of Naval Research Contract N475C43. The author would like to thank George B. Dantzig for numerous enlightening conversations and Arthur F. Veinott, Jr. for suggesting a study of alternative pivot rules which ultimately led to the least entered rule. This is the nal form of the paper. c 28 American Mathematical Society

WHAT IS THE WORST CASE BEHAVIOR OF THE SIMPLEX ALGORITHM? Other examples involving large coecients were subsequently published by Zadeh [6] for minimum cost network ow problems, AvisChvátal [] for Bland's rule (rst positive), Murty [4] and Fathi [6] for complementary pivot algorithms, and GoldfarbSit [7] for a gradient selection rule. An example due to Edmonds for shortest path computations is also known [6]. The above examples may be viewed as deformed product constructions. Given a polytope P m requiring 2 m pivots with a polynomial number of dimensions, a new polytope P m+ is constructed by deforming a product P m V, where V is some polytope usually of low dimension. In the rst KleeMinty construction P m+ diered from P m by one dimension and two facets (V has one dimension and two facets). In the KleeMintyJeroslow construction, P m+ diered from P m by two dimensions and roughly 4k facets, where k is some positive integer. In the network constructions [6], P m+ diered from P m by 2m dimensions and 2m + 4 facets. We show that any linear program with rational coecients may be expressed with coecients,,, and 2. Modications of the KleeMinty and Jeroslow constructions are given with integral coecients no greater than four. The Klee Minty examples are shown to be equivalent to resource allocation problems with non-negative coecients in which all bases have determinants of ±. In all bad examples, the coecients are chosen so that the best columns price out moderately, and are not entered until other columns have been entered exponentially many times. Roughly speaking, for a deformed product P m+ P m V m, this means that the simplex method performs a 2 m step pivot sequence for P m before entering any of the new variables associated with V m. The pivot sequence for P m is then performed again in the reverse order. Geometrically, the simplex method stays on a lower P m face of P m V m for 2 m pivots, then moves through the added V m dimensions to an upper P m face where it spends another 2 m pivots undoing pivots performed on the lower face. Entering variables from V m early causes a permanent move away from the lower face, killing the exponential growth. The following rule forces movements away from faces irrespective of the level or rate of improvement. It was considered primarily for theoretical purposes after a thought provoking conversation with Arthur F. Veinott, Jr. 2. Least Entered Rule Enter the improving variable which has been entered least often. The above rule is easy to implement, and when used in conjunction with the standard or max increase rules speeds up both. It is unlikely to cycle (the cycle must contain all improving columns). It is our hope that the rule will prove to have a worst case bound proportional to m n, where m is the number of rows and n is the number of columns. Examples of maximum ow problems requiring m n pivots using this rule will be given in a forthcoming paper. Other rules similar to the least entered rule which have been suggested [4] are the Least Recently Considered (LRC) rule of Cunningham and the Least Recently Basic (LRB) rule of E. L. Johnson. Both methods were apparently designed for shortest path computations in networks but have obvious extensions to general This is similar to the old conjecture Ξ(d, n) (d ) + of Klee [] which was proven false by Klee and Minty for the standard rule.

2 N. ZADEH linear programming which would kill the exponential growth of known counterexamples. Unfortunately, polynomial proofs for the above rules, if they exist, might be extremely hard, as they would reduce the current best bound for the diameters of polytopes from 3 2d 2( n d + 5 2) to a polynomials in n and d, where n is the number of facets and d, the dimension. 3. The KleeMinty Construction The rst KleeMinty construction creates from an n-dimensional polytope P n with 2n faces requiring 2 n pivots when any improving column may enter a polytope P n+ with two more faces requiring 2 n+ pivots. The construction is illustrated in Fig.. The path of vertices visited in P n is denoted p, p,..., P 2 n. The rst polytope P has two faces (x, x ) and requires one pivot. The second polytope P 2 is obtained from P by adding two additional constraints x /3 + x 2 and x /3 + x 2, involving one additional variable. It is convenient to think of the pivot sequence for P 2 in terms of the slack variables associated with the various faces. The initial point p = (, ) is determined by s 2, s 4 basic, s, s 3 non-basic. The sequence p, p, p 2, p 3 corresponds to entering s then s 3, and then s 2. The variables s 2, s 4 and s are respectively deleted. Pivot sequence: No. 2 S S 3 S 2 No. 3 S S 3 S 2 S 5 S S 4 S 2 No. 4 S S 3 S 2 S 5 S S 4 S 2 S 7 S S 3 S 2 S 6 S S 4 S 2 Figure. An example of the KleeMinty construction.

WHAT IS THE WORST CASE BEHAVIOR OF THE SIMPLEX ALGORITHM? 3 Table. Example of the original KleeMinty construction (upper left), a scaling of the slacks to fool the standard rule (upper right), and the addition of m(m ) variables and constraints to yield integral coecients 4 (below). Any improving column Standard rule max x 4 x s = replace x + s 2 = slacks by x /3 + x 2 s 3 = s 3 /4 x /3 + x 2 + s 4 = s 4 /4 x 2 /3 + x 3 s 5 = s 5 /6 x 2 /3 + x 3 + s 6 = s 6 /6 x 3 /3 + x 4 s 7 = s 7 /64 x 3 /3 + x 4 + s 8 = s 8 /64 Small Coecients Replace a quantity like s 8 /64 by a variable s 8, along with the constraints 4s 8 s 8 =, 4s 8 s 8 =, 4s 8 s 8 =, all variables. P 3 is obtained from P 2 by adding two more constraints involving one additional variable. Note in Fig. that the pivot sequence for P 3 is essentially the pivot sequence for P 2, plus a movement form the lower face, followed by the sequence for P 2 in the reverse order. We express this phenomenon in general by writing P n+ = P n, s 2n+, P n. In terms of entering slack variables, P 3 = s s 3 s 2 s 5 s s 4 s 2. 4. Fooling the Standard Rule The examples in Fig. take one pivot to solve when the standard max c j z j rule is employed. To fool this rule, Klee and Minty scale the variables so that a much larger change in the entering slack variable is required to achieve the same objective function change, or equivalently, to move to the same adjacent vertex. As an illustration, let c(s i ) denote the relative cost factor for s i. If f i denotes the change in the objective when s i is entered, then c(s i ) = f i / s i. At p = (,, ) in Fig., c(s ) =, c(s 2) =, and 3 c(s 5) =. The standard rule would enter s 5, moving from (,, ) to (,, ), the optimum, in one pivot. However, if s 5 were replaced by s 5 /6, it would take a 6 unit change in s 5 to move from (,, ) to (,, ), and c(s 5 ) would be. A similar replacement of 6 s 2 by s 2 /4 would case the standard rule to enter s and follow the same sequence as before. The right hand side of Table gives a scaling which will make the standard rule exponential. Note that the coecients grow at a rate of 4 m. 5. Examples with Small Integer Coecients The large coecients in expression like s 8 /64, or more generally, s 2n /4 n, may be eliminated adding n additional variables and constraints. For the case s 8 /64, we replace s 8 by s 8 with the additional constraints 4s 8 s 8 =, 4s 8 s 8 =,

4 N. ZADEH 4s 8 s 8 =, s 8, s 8, s 8, as done in Table. To construct P m in this fashion using coecients no greater than 4, m(m ) constraints and non-negative variables must be added. It should be noted that such a coecient reduction can always be performed, but the reduction is cleanest when the large coecients in each column are multiples of a xed power of two, for example, 3 274 2 74 2 2 74 Theorem 5.. Let L be a linear program with rational coecients whose representation requires a polynomial number of digits. Then L may be expressed using integral coecients of 2,,, and with a polynomial number of variables and constraints. Proof. The b i may be made to be or by suitably multiplying each row. With this change, let d j denote the least common multiple of the divisors of elements in column j. Then column j may be written as c j x j a j d j., a mj where d j, c j, a j,..., a mj are integers. Let k d(k) j 2 k denote the binary representation of d j and let q j = max { log 2 d j, log 2 a ij }. =,...,m Note that d (k) j = or for every k, j. Dene a new variable x j = x j /d j by adding new variables x (k) j, k =,, 2,..., q j, ( x (k) ) ( j = 2 k x j and constraints k d(k) j x (k) ) j x j = and x (k) j + 2x (k ) j =, k =,..., q j. Let k d(k) j 2 k be the binary representation of a ij. Now the term x j a ij /d j may be expressed as k a(k) ij x(k) j. All coecients are, ±, or 2. The above construction requires j (q j + ) additional variables and constraints. When applying the simplex method to the above problems, care must be taken to ensure that initial pivots eliminate x (k) j variables and retain x j. If x j is eliminated and replaced by x (l) j, a rescaling of variables has occurred which will change relative cost factors and may aect the pivot sequence. The following theorem notes some similarities between the KleeMinty construction and the bad complementary pivot example due to Murty, and explains how the AvisChvátal examples was obtained. Theorem 5.2. Let L n denote the nth problem constructed on the left side of Table, with s 2i, respectively, s 2i replaced by s 2i /3 i, respectively, s 2i /3 i. Then L n is equivalent to a resource allocation problem with non-negative integral coecients, equal objective coecients, and basis matrices whose determinants are or.

WHAT IS THE WORST CASE BEHAVIOR OF THE SIMPLEX ALGORITHM? 5 Proof. Solving the triangular system x s = for x,..., x n yields x 3 + x 2 s 3 3 = x 2 3 + x 3 s 5 = x 3 3 + x 4 s 7 27 =..................... x = s, x 2 = s + s 3, 3 x 3 = s + s 3 + s 5, x 4 = s + s 3 + s 5 + s 7, 27..................... Substituting for x i in the remaining equations produces the equivalent problem ( ) maximize s 3 n + s 3 + s 5 + s 7 + + s 2n = subject to s + s 2 = 2s + s 3 + s 4 = 3 2s + 2s 3 + s 5 + s 6 = 2s + 2s 3 + 2s 5 + s 7 + s 8 = 27. 2s + 2s 3 + 2s 5 + 2s 7 + + s 2n + s 2n = 3 n,... s i. The constraint matrix is of the form (L I) where L is a lower triangular matrix with ones on the diagonal. This gives the result. The above problem can yield the same pivot sequence as the nth scaled problem in Table because all relative cost factors will be or ± 3 n at every vertex (there will be many ties). To insure that the same sequence is followed s 2i, respectively, s 2i must be replaced by s 2i k i, respectively, s 2i with k i k > 3, in which case the constraint matrix would change but would remain lower triangular maximize 2 s + s 3 + s 5 subject to s + s 2 = 2 2s + s 3 + s 4 = 4 2s + 2s 3 + s 5 + s 6 = 6,

6 N. ZADEH Table 2. Relative cost factors associated. s s 2 s 3 s 4 s 5 s 6 2 6 2 6 2 2 3 2 6 6 4 2 6 5 2 6 6 2 6 7 2 6 may be obtained from Table by replacing the 3's by 's and taking k = 2. The following assertion notes that a bounded pathological example can always be transformed into one with all a ij, b i, and c j. Assertion. Let L be a linear program with a nite optimal solution. Then L may be transformed to an equivalent program L in which all coecients are positive (non-negative). Proof. Ax the constraint Σx i + s m+ = M for suciently large M. Then add suitable multiples of this constraint to each row until all coecients are positive. The objective function will have a constant term involving M which may be disregarded. 6. Bland's Rule (rst improving column) Table 6 lists the sequence of relative cost factors c(s i ) associated with the vertices p,..., p 7 of P 3. Notice that the variables s 2i and s 2i are complementary, i.e., s 2i s 2i = i, as are their relative cost factors c(s 2i ) c(s 2i ) = i. Theorem 6.. The examples in Table follow the same pivot sequence with Bland's rule. Outline of Proof. It suces to show that the rst improving column prices out best. Let φ denote the objective function. For every n, φ(p ) =, φ(p 2 n =, and the jump in φ between lower and upper case is 3. Let p i = (p i, φ(p i )/3) and p 2 i = (p, φ(p i )/3) for i 2 n. Then the vertex sequence of P n+ is p, p,..., p 2 n, p 2 2,..., p 2, p 2 }{{} n }{{} lower case uppers case For each increase in n, the objective change between successive points on lower (upper) faces decreases by a factor of three. Because the vertices for P n+ are obtained from the vertices for P n by adding an extra dimension (the objective value), the change in the entering slack required to move from p i to p i+ on the lower (upper) face remains the same. This implies that

WHAT IS THE WORST CASE BEHAVIOR OF THE SIMPLEX ALGORITHM? 7 relative cost factors for old slacks are decreased in absolute value by a factor of three for each increase in n. The new slack variables (with the highest indices) are scaled to price out worse than the other variables. This observation and its predecessor imply that the lowest indexed variables, when protable, price out n( best. The exact formula, for c(s 2i ) >, is c(s 2i ) = 4 3 ) i 3 4, which decreases by a factor of three for each increase in n. 7. The Maximum Increase Rule This rule enters the column yielding the maximum objective increase. A sequence of bad polytopes, P,..., P n, will be constructed recursively. P is shown at the top of Fig. 2. It has two dimensions, four faces, and requires two pivots starting from (, ) when the objective is maximize x. The two lower faces are dotted for the purposes of identication. The second polytope P 2, is four dimensional and appears below P. P 2 is a deformed product of P with V, the two dimensional polytope shown in the upper right. P 2 is best appreciated by imagining that one is looking down at the top of a mountain. The shaded edges of P 2 correspond to the upper faces of P crossed with V. The dotted edges of P 2 correspond to the bottom faces of P crossed with V and are not all shown. P corresponds to the two dimensional polytope determined by (, ) and points a and b. Figure 2 is essentially an approximate projection of P 2 onto the V coordinates, which are denoted x 3 and x 4. P 2 was designed so that, starting at (, ), and maximizing the x 3 or x coordinate, one rst performs the pivot sequence for P ; executes several pivots involving V variables; reverses the sequence for P ; and ends at (, ). In terms of entering slack variables, the forward pivot sequence p to p 8 shown in Fig. 2 may be expressed as s s 2 s 5 s 6 s 7 s 3 s 4 s 8 P V P V P 2 is a reversible polytope, in the sense that eight pivots are also required if one starts at (, ) and minimizes x 3. The reverse pivot sequence from (, ) to (, ) is shown at the bottom of Fig. 2. To insure that the pivot sequence for P is performed before variables in V are entered, the dierence in x coordinates between v = (, ) and v = (, ) is chosen smaller than the dierence in x coordinates between (, ) and vertex a. This ensures that pivots involving variables of P are formed rst as long as such pivots are protable. 8. Construction of P 3 P 3 is constructed as a deformed product of P 2 V 2. V 2 is the same as V except that the slopes of the lines through ( 3, ), ( 2, ) ( 5 24 and 2, ( 24) 5, 4 3, ) are decreased in absolute value by a factor of 4. This eectively squashes the top half of P 3 so that the dierence in x coordinates between v and v is 2 45 Variables of P 2 are now more protable than variables of V 2, so the whole pivot sequence for P 2 is performed before variables of V 2 are entered. 2 v is determined by the intersection of lines y = x and y = x/6 + /48.

8 N. ZADEH Figure 2. A modication of the KleeMintyJeroslow construction. Denoting the relevant slacks of V 2 corresponding to s 5, s 6, s 7, s 8, s, s, in V by s, s 2, s 3, s 4, s 5, s 6, the forward pivot sequence for P 3 in terms of entering slacks is s s 2s 3 s 2 s 8 s 3 s 4 s 4 s s 2 s 5 s 6 s 7 s 3 s 4 s }{{} 8 s } s s {{ s } 7 P 2 P 2 In general, P n is constructed as a deformed product of P n and V n, where V n is the same as V except the lines through ( 3, ), ( 2, ( 24) 5 and ( 2, 24) 5, 4 3, ).. Examples with Small Coecients Constraints with small integral coecients dening P, P 2, and P 3 are shown in Table 3. The system for P n is generated by taking the system for P n and adding the constraints determining V n, with x 2n replaced by x 2n (x 2n 3 /3) for facets on the left of the line x 2n = and 2 x 2n replaced by x 2n +(x 2n 3 /3) for facets on the right of x 2n = 2. This yields the deformation, or tilting of the product. Note that, aside from a translation of subscripts, the set of constraints for V 2 diers from that for V only in the rst two inequalities, where a variable x 6

WHAT IS THE WORST CASE BEHAVIOR OF THE SIMPLEX ALGORITHM? Table 3. x 4, x 4, x 6, x 6, x 6, x 8, x 8, x 8, x 8 unrestricted. max x + x 2 x x + x 2 2 pivots x x 2 x x 2 max x 3 x + 3x 3 + 3x 4 4 x 3x 3 + 3x 4 4x 4 x 4 = x 3x 3 + 3x 4 x + 3x 3 + 3x 4 3 x 3x 3 x + 3x 3 3 x 3x 3 3x 4 x + 3x 3 3x 4 4 max x 5 x 3 + 3x 5 3x 6 4 x 3 3x 5 + 3x 6 4x 6 x 6 = 4x 6 x 6 = x 3 3x 5 + 3x 6 x 3 + 3x 5 + 3x 6 3 x 3 3x 5 x 3 + 3x 5 3 x 3 3x 5 3x 6 x 3 + 3x 5 3x 6 4 2 2 + 4 = 8 pivots 2 pivots max x 7 x 5 + 3x 7 + 3x 7 4 x 5 3x 7 + 3x 7............ (representing 6x 6 ) has replaced a variable x 4 (representing 4x 4 ). This corresponds to reducing the slope of the top two facets by a factor of four.. Testing the Problems To run the problems it is recommended that the x variables be eliminated and replaced by slacks. The starting basis then consists of those slacks which are positive at the point (,,,..., ). For P 2 the starting basis would be s 3, s 4, s 7, s 8, s, s, and the slacks for the bottom two faces of V.

N. ZADEH References. D. Avis and V. Chvátal, Notes on Bland's pivoting rule, Math. Programming Stud. 8 (78), 2434. 2. R. G. Bland, New nite pivoting rules for the simplex method, Math. Oper. Res. 2 (77), 37. 3. R. W. Cottle, Observations on a class of nasty linear complementarity problems, Discrete Appl. Math. 2 (8), no. 2, 8 (Russian). 4. W. H. Cunningham, Theoretical properties of the network simplex method, Math. Oper. Res. 4 (7), no. 2, 628. 5. G. B. Dantzig, Linear programming and extensions, Princeton Univ. Press, Princeton, NJ, 63. 6. Y. Fathi, Computational complexity of LCPs associated with positive denite symmetric matrices, Math. Programming 7 (7), no. 3, 335344. 7. D. Goldfarb and W. Sit, Worst case behavior of the steepest edge simplex method, Discrete Appl. Math. (7), 277285. 8. B. Grünbaum, Convex polytopes, Pure Appl. Math., vol. 6 Interscience Publ. John Wiley & Sons, Inc., New York 67 (with the cooperation of V. Klee, M. A. Perles, and G. C. Shephard).. R. Jeroslow, The simplex algorithm with the pivot rule of maximizing criterion improvement, Discrete Math. 4 (73), 367377.. V. Klee, A class of linear programs requiring a large number of iterations, Numer. Math. 7 (65), 3332.. V. Klee and G. J. Minty, How good is the simplex algorithm?, Inequalities, III, Proc. Third Sympos. (Univ. California, CA, 6), Academic Press, New York, 72, pp. 575 (dedicated to the memory of Theodore S. Motzkin). 2. V. Klee and D. W. Walkup, The d-step conjecture for polyhedra of dimension d < 6, Acta Math. 7 (67), 5378. 3. T. M. Liebling, On the number of iterations of the simplex method, Methods Oper. Res. 7 (72), 248264. 4. K. G. Murty, Computational complexity of complementary pivot methods. Complementarity and xed point problems, Math. Programming Stud. 7 (78), 673. 5. W. P. Niedringhaus and K. Steiglitz, Some experiments with the pathological linear programs of N. Zadeh, Math. Programming 5 (78), no. 3, 352354. 6. N. Zadeh, A bad network problem for the simplex method and other minimum cost ow algorithms, Math. Programming 5 (73), 255266.????????? E-mail address: normanz@earthlink.net