Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions

Size: px
Start display at page:

Download "Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions"

Transcription

1 Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF support under CCF and CCF / 9

2 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 2 / 9

3 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm / 9

4 Problems of Interest MSNC Multisource Network Coding Described by tuple (G, S, T, β) Sources Network Sinks β : T 2 S \ allows arbitrary subset demands 4 / 9

5 Problems of Interest MSNC Multisource Network Coding Described by tuple (G, S, T, β) Sources Network Sinks X n RVs associated with a MSNC instance n S + E h : 2 Xn \ R 0 is the entropy function ω s, s S and R e, e E are the source and edge rates β : T 2 S \ allows arbitrary subset demands 4 / 9

6 Problems of Interest MSNC Multisource Network Coding Described by tuple (G, S, T, β) Sources Network Destinations. Paths.. In(i) i Out(i).. Y. s s. t β(t) ω. Ue e Re. s.. S T S T Entropy function must satisfy: (L ) s S h s = h S (L 2 ) a h In(i) = h In(i) Out(i)), i V (L ) h e R e, h s ω s a L 2 can be partitioned into L 2, L 2 2.L 2 (constraints associated with sources, intermmediate nodes and sinks resp.) 5 / 9

7 Implicit characterization Yan, Yeung and Zhang s Characterization The set of all source rate- edge rate tuples (ω, r) is given as R = proj ω,r (con(γ n L ) L ) () Notation L = L L 2 L 2, L = L L 2 proj ω,r ( ) stands for linear projection onto rate variables con( ) stands for conic hull, ( ) stands for closure Γ n stands for the unknown entropy function region: set of all 2 n dimensional vectors arising from entropy function 6 / 9

8 Explicit Characterization? Shannon entropy subspaces matroids class of polymatroids bound comment polymatroidal set functions necessary but not sufficient more restrictive polymatroidal set functions arising from random variables Arising from a column partition of matrices over finite field of size q necessary and sufficient every possible code sufficient but not necessary, vector linear codes Arising from matrices over finite field of size q sufficient but not necessary, scalar linear codes R k = proj ω,r (Γ k n L 2), k {in,out} 7 / 9

9 Explicit Characterization? Shannon entropy subspaces matroids class of polymatroids bound comment polymatroidal set functions necessary but not sufficient more restrictive polymatroidal set functions arising from random variables Arising from a column partition of matrices over finite field of size q necessary and sufficient every possible code sufficient but not necessary, vector linear codes Arising from matrices over finite field of size q sufficient but not necessary, scalar linear codes R k = proj ω,r (Γ k n L 2), k {in,out} Polyhedral Projection 7 / 9

10 Leave no stone unturned We developed a C software library for polyhedral projection called chm Accepts arbitrary polyhedra as input, uses rational arithmetic, rational LP solver QSopt ex, and gives exact answers The underlying algorithm Convex Hull Method was first used by Xu, Wang and Sun* for computing non-shannon information inequalities We have used it for computing non-shannon information inequalities and LP/Shannon outer bounds on rate regions Can also be used for solving interesting problems related to quantum information called marginal problems chm currently turns a blind eye to symmetries of input polyhedra *W. Xu, J. Wang, J. Sun, A projection method for derivation of non-shannon-type information inequalities, The proceedings of IEEE International Symposium on Information Theory (ISIT), pages , / 9

11 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 9 / 9

12 Symmetry and Polyhedral Computation Symmetry can be exploited in polyhedral representation conversion (given extreme points compute inequalities or vice versa) Symmetry can be exploited in linear programming 2 D. Bremner and M. Sikiric and A. Schürmann. Polyhedral representation conversion up to symmetries, Proceedings of the 2006 CRM workshop on polyhedral computation, AMS/CRM Lecture Notes 48 (2009), R. Bödi and K. Herr, Symmetries in linear and integer programs, arxiv: [math.co] 0 / 9

13 Symmetry and Polyhedral Computation Symmetry can be exploited in polyhedral representation conversion (given extreme points compute inequalities or vice versa) Symmetry can be exploited in linear programming 2 What about polyhedral projection (esp. CHM)? D. Bremner and M. Sikiric and A. Schürmann. Polyhedral representation conversion up to symmetries, Proceedings of the 2006 CRM workshop on polyhedral computation, AMS/CRM Lecture Notes 48 (2009), R. Bödi and K. Herr, Symmetries in linear and integer programs, arxiv: [math.co] 0 / 9

14 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm / 9

15 Network Symmetry Group* Those permutations of {,..., n} that keep network constraints L 2 invariant Form a group called Network Symmetry Group (NSG) Can be computed using algorithms for computing automorphism groups of graphs *Jayant Apte, and John MacLaren Walsh, Symmetry in Network Coding, extended version, 2 / 9

16 Example: Butterfly Network source independence h +h 2 =h {,2} (,2)()(4,5)(6,7)(8,9) h +h 2 =h {,2} h =h {,4,6} h 2 =h {2,5,7} 2 node constraints h 2 =h {2,5,7} h {4,5} =h {,4,5} h =h {,8,9} h {6,8} =h {2,6,8} h =h {,4,6} h {4,5} =h {,4,5} h =h {,8,9} h {7,9} =h {,7,9} h {7,9} =h {,7,9} h {6,8} =h {2,6,8} rate constraints / 9

17 Example: M-Network Example An MSNC instance The Network Symmetry group is generated by: g =(, )(2, 4)(5, 7)(6, 8) (9, 2)(0, )(, 2) (4, 2)(5, 22)(6, 24)(8, 9) g 2 =(, 4)(7, 8)(, 4)(5, 6) (7, 8)(9, 20)(2, 22)(2, 24) g =(, 2)(5, 6)(, 5)(4, 6) (7, 9)(8, 20)(2, 2)(22, 24) A group of order 8 4 / 9

18 Example: Independent Distributed Source Coding 2 2 a a 2 2 b 2 b 2 c c <(a,b),(b,c)> <(2,)(b,c),(,2)(a,b)> 4 a,2 5 6 a,2 2 b, 2 b, 2 c 2, c 2, <(2,)(a,b),(,2)(b,c)> 2 2 <(2,)(b,c),(,2)(a,b)> 2 a b c a b c 2 2 <(2,)(a,b),(,2)(b,c)> <(2,)(b,c),(,2)(a,b)> 5 / 9

19 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 6 / 9

20 Combinatorial Symmetries combinatorial symmetries 7 / 9

21 Combinatorial Symmetries combinatorial symmetries Very difficult to compute (require representation conversion*): *Volker Kaibel and Alexander Schwartz. On the complexity of polytope isomorphism problems. Graphs and Combinatorics, 9(2):25 20, 2007 / 9

22 Restricted Symmetries A subgroup of combinatorial symmetry group: combinatorial symmetries restricted symmetries (0,2) (0,) is a restricted symmetry of the triangle below (0,0) (,0) 8 / 9

23 Restricted Symmetries A subgroup of combinatorial symmetry group: combinatorial symmetries restricted symmetries (0,2) (0,) is a restricted symmetry of the triangle below (0,0) (,0) Can be obtained by computing automorphism group of an edge colored graph*: *Computing symmetry groups of polyhedra. David Bremner, Mathieu Dutour Sikiric, Dmitrii V. Pasechnik, Thomas Rehn, Achill Schrmann. arxiv: v [math.co], / 9

24 Permutational Symmetries A subgroup of restricted symmetry group: combinatorial symmetries restricted symmetries All! permutations of standard basis vectors of are permutational symmetries of the cube permutational symmetries Can be thought of as restricted symmetry arising from permutation matrices 9 / 9

25 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 20 / 9

26 Symmetries of Rate Regions NSG can be interpreted as permutational symmetry group of rate region is achievable rate tuple iff is achievable rate tuple (bpnu), (bpnu), 0,0 (bpnu) (bpnu) (bpnu: bits per network use) 2 / 9

27 Symmetries of Rate Regions Let L 2 be the intersection of halfspaces and hyperplanes associated with network constraints NSG can be interpreted as permutational symmetry group of rate region R NSG can be interpreted as permutational symmetry group of Γ in n L 2, Γout n L 2 provided that Γ in n and Γ out n are setwise invariant under random variable permutations (which is indeed the case with most known bounds on entropy) 22 / 9

28 Symmetries of Rate Regions NSG can be interpreted as permutational symmetry group of proj ω,r (Γ in n L 2 ), proj ω,r(γ out n L 2 ) (,2) is a permutational symmetry (,2) is still a permutational symmetry after projection 2 / 9

29 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 24 / 9

30 Key Idea ) Solve LP over with 0 in non-projection cost vector entries 2) Project extreme point of attaining the optimum ) Obtain an extreme point of projection 25 / 9

31 Key Idea 2 full-dimensional inner bound facet of inner bound that is not a facet of projection can be identified by solving an LP over facet Not a facet else is not a facet of projection is a facet of projection gives previously unknown vertex 26 / 9

32 Key Idea previously known full-dimensional inner bound new and improved improved fulldimensional inner bound Update the inner bound using an iteration of double description method* previously unknown vertex 27 / 9

33 Iterations of CHM 28 / 9

34 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 29 / 9

35 Three uses of symmetry symmetric improvements symmetry exploitation symmetric linear programs symmetric updates 0 / 9

36 Exploitation : Symmetric Improvements symmetric improvements CHM iterations symmetric linear programs symmetry exploitation symmetric updates symchm iterations,0,,,0 If we know 0,, one of these then we know all of these! projection of a hypercube to -d / 9

37 Exploitation 2: Symmetric Updates symmetric improvements,0, 0,, facets incident to (0,,) symmetry exploitation,0,,,0 0,, facets incident to (,0,) symmetric linear programs symmetric updates (,2),,0 0,,,0, 2 / 9

38 Exploitation : Symmetric LPs symmetric improvements symmetry exploitation permutation of standard bases is a restricted symmetry of this polytope it also leaves cost invariant maximize symmetric linear programs symmetric updates there exists a solution of this LP in fixed space: the subspace of points mapping to themselves under the basis vector permutation / 9

39 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 4 / 9

40 Comparison of CHM (top) and symchm (bottom) Initial Hull New vertex Old vertex Initial Hull 5 / 9

41 Complexity Comparison (No. and dimension of linear programs) 2 a b c <(a,b),(b,c)> No. of LPs solved CHM symchm CHM symchm CHM symchm CHM symchm CHM symchm CHM symchm d=64 d=2 d=28 d=24 d=20 d=6 2 2 a b c 2 2 <(2,)(b,c),(,2)(a,b)> a 25 4 a,2 2 2 b, b 2 20 c 2, c <(2,)(a,b),(,2)(b,c)> 5 <(2,)(a,b),(,2)(b,c)> a a,2 2 b 2 2 b, 5 c c 2, 0 <(2,)(b,c),(,2)(a,b)> <(2,)(b,c),(,2)(a,b)> I-DSC instance 6 / 9

42 Conclusion In this paper, We related network symmetries to symmetries of polyhedral bounds Developed a symmetry exploiting variant of Convex Hull Method Future work: A Python implementation of symchm in SageMath A C implementation of symchm to go with the Entropic Vectors Computation Package Extensive computational experimemnts with arbitrary symmetric polyhedra 7 / 9

43 Selected References I D. Bremner and M. Sikiric and A. Schürmann. Polyhedral representation conversion up to symmetries, Proceedings of the 2006 CRM workshop on polyhedral computation, AMS/CRM Lecture Notes 48 (2009), R. Bödi and K. Herr, Symmetries in linear and integer programs, [Online]. Available: 8 / 9

44 Questions 9 / 9

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,

More information

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between

More information

Network Combination Operations Preserving the Sufficiency of Linear Network Codes

Network Combination Operations Preserving the Sufficiency of Linear Network Codes Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations

More information

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis

More information

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

Matroid Bounds on the Region of Entropic Vectors

Matroid Bounds on the Region of Entropic Vectors Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu

More information

Symmetries in the Entropy Space

Symmetries in the Entropy Space Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy

More information

Characterizing the Region of Entropic Vectors via Information Geometry

Characterizing the Region of Entropic Vectors via Information Geometry Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks

More information

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables . Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,

More information

Symmetries in Entropy Space

Symmetries in Entropy Space 1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828

More information

Non-isomorphic Distribution Supports for Calculating Entropic Vectors

Non-isomorphic Distribution Supports for Calculating Entropic Vectors Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer

More information

Partition Symmetrical Entropy Functions*

Partition Symmetrical Entropy Functions* Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts

More information

Entropic Vectors: Polyhedral Computation & Information Geometry

Entropic Vectors: Polyhedral Computation & Information Geometry Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to

More information

Network Coding on Directed Acyclic Graphs

Network Coding on Directed Acyclic Graphs Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information

More information

Bounding the Entropic Region via Information Geometry

Bounding the Entropic Region via Information Geometry Bounding the ntropic Region via Information Geometry Yunshu Liu John MacLaren Walsh Dept. of C, Drexel University, Philadelphia, PA 19104, USA yunshu.liu@drexel.edu jwalsh@coe.drexel.edu Abstract This

More information

A computational approach for determining rate regions and codes using entropic vector bounds

A computational approach for determining rate regions and codes using entropic vector bounds 1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Part a: You are given a graph G = (V,E) with edge weights w(e) > 0 for e E. You are also given a minimum cost spanning tree (MST) T. For one particular edge

More information

Entropy Vectors and Network Information Theory

Entropy Vectors and Network Information Theory Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy

More information

A new computational approach for determining rate regions and optimal codes for coded networks

A new computational approach for determining rate regions and optimal codes for coded networks A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology 18.433: Combinatorial Optimization Michel X. Goemans February 28th, 2013 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory

More information

Fundamental Domains for Integer Programs with Symmetries

Fundamental Domains for Integer Programs with Symmetries Fundamental Domains for Integer Programs with Symmetries Eric J. Friedman Cornell University, Ithaca, NY 14850, ejf27@cornell.edu, WWW home page: http://www.people.cornell.edu/pages/ejf27/ Abstract. We

More information

Optimization WS 13/14:, by Y. Goldstein/K. Reinert, 9. Dezember 2013, 16: Linear programming. Optimization Problems

Optimization WS 13/14:, by Y. Goldstein/K. Reinert, 9. Dezember 2013, 16: Linear programming. Optimization Problems Optimization WS 13/14:, by Y. Goldstein/K. Reinert, 9. Dezember 2013, 16:38 2001 Linear programming Optimization Problems General optimization problem max{z(x) f j (x) 0,x D} or min{z(x) f j (x) 0,x D}

More information

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

A Parametric Simplex Algorithm for Linear Vector Optimization Problems

A Parametric Simplex Algorithm for Linear Vector Optimization Problems A Parametric Simplex Algorithm for Linear Vector Optimization Problems Birgit Rudloff Firdevs Ulus Robert Vanderbei July 9, 2015 Abstract In this paper, a parametric simplex algorithm for solving linear

More information

Dual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes. Satoru FUJISHIGE and Jens MASSBERG.

Dual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes. Satoru FUJISHIGE and Jens MASSBERG. RIMS-1734 Dual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes By Satoru FUJISHIGE and Jens MASSBERG December 2011 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES KYOTO UNIVERSITY,

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

Sherali-Adams Relaxations of Graph Isomorphism Polytopes. Peter N. Malkin* and Mohammed Omar + UC Davis

Sherali-Adams Relaxations of Graph Isomorphism Polytopes. Peter N. Malkin* and Mohammed Omar + UC Davis Sherali-Adams Relaxations of Graph Isomorphism Polytopes Peter N. Malkin* and Mohammed Omar + UC Davis University of Washington May 18th 2010 *Partly funded by an IBM OCR grant and the NSF. + Partly funded

More information

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions 2009 IEEE Information Theory Workshop Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions Asaf Cohen, Michelle Effros, Salman Avestimehr and Ralf Koetter Abstract In this

More information

A Geometric Approach to Graph Isomorphism

A Geometric Approach to Graph Isomorphism A Geometric Approach to Graph Isomorphism Pawan Aurora and Shashank K Mehta Indian Institute of Technology, Kanpur - 208016, India {paurora,skmehta}@cse.iitk.ac.in Abstract. We present an integer linear

More information

Generalized Network Sharing Outer Bound and the Two-Unicast Problem

Generalized Network Sharing Outer Bound and the Two-Unicast Problem Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,

More information

The Capacity Region for Multi-source Multi-sink Network Coding

The Capacity Region for Multi-source Multi-sink Network Coding The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans April 5, 2017 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory

More information

Nonlinear Discrete Optimization

Nonlinear Discrete Optimization Nonlinear Discrete Optimization Technion Israel Institute of Technology http://ie.technion.ac.il/~onn Billerafest 2008 - conference in honor of Lou Billera's 65th birthday (Update on Lecture Series given

More information

Learning with Submodular Functions: A Convex Optimization Perspective

Learning with Submodular Functions: A Convex Optimization Perspective Foundations and Trends R in Machine Learning Vol. 6, No. 2-3 (2013) 145 373 c 2013 F. Bach DOI: 10.1561/2200000039 Learning with Submodular Functions: A Convex Optimization Perspective Francis Bach INRIA

More information

Rate region for a class of delay mitigating codes and P2P networks

Rate region for a class of delay mitigating codes and P2P networks Rate region for a class of delay mitigating codes and P2P networks Steven Weber, Congduan Li, John MacLaren Walsh Drexel University, Dept of ECE, Philadelphia, PA 19104 Abstract This paper identifies the

More information

Linear Algebra Review: Linear Independence. IE418 Integer Programming. Linear Algebra Review: Subspaces. Linear Algebra Review: Affine Independence

Linear Algebra Review: Linear Independence. IE418 Integer Programming. Linear Algebra Review: Subspaces. Linear Algebra Review: Affine Independence Linear Algebra Review: Linear Independence IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 21st March 2005 A finite collection of vectors x 1,..., x k R n

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

Integer Programming ISE 418. Lecture 12. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 12. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 12 Dr. Ted Ralphs ISE 418 Lecture 12 1 Reading for This Lecture Nemhauser and Wolsey Sections II.2.1 Wolsey Chapter 9 ISE 418 Lecture 12 2 Generating Stronger Valid

More information

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences.

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences. Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences A Thesis Submitted to the Faculty of Drexel University by Yunshu

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

1 Matroid intersection

1 Matroid intersection CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and

More information

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements

More information

On mixed-integer sets with two integer variables

On mixed-integer sets with two integer variables On mixed-integer sets with two integer variables Sanjeeb Dash IBM Research sanjeebd@us.ibm.com Santanu S. Dey Georgia Inst. Tech. santanu.dey@isye.gatech.edu September 8, 2010 Oktay Günlük IBM Research

More information

A notion of Total Dual Integrality for Convex, Semidefinite and Extended Formulations

A notion of Total Dual Integrality for Convex, Semidefinite and Extended Formulations A notion of for Convex, Semidefinite and Extended Formulations Marcel de Carli Silva Levent Tunçel April 26, 2018 A vector in R n is integral if each of its components is an integer, A vector in R n is

More information

Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes

Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes Michael M. Sørensen July 2016 Abstract Path-block-cycle inequalities are valid, and sometimes facet-defining,

More information

Tropical decomposition of symmetric tensors

Tropical decomposition of symmetric tensors Tropical decomposition of symmetric tensors Melody Chan University of California, Berkeley mtchan@math.berkeley.edu December 11, 008 1 Introduction In [], Comon et al. give an algorithm for decomposing

More information

The Ellipsoid Algorithm

The Ellipsoid Algorithm The Ellipsoid Algorithm John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA 9 February 2018 Mitchell The Ellipsoid Algorithm 1 / 28 Introduction Outline 1 Introduction 2 Assumptions

More information

Networks and Matroids

Networks and Matroids Adaptive Signal Processing and Information Theory Research Group ECE Department, Drexel University June 1, 2012 Outline 1 Mappings and Definitions Source Mapping: S : V 2 µ, µ is message set. Message Assignment:

More information

A thesis presented to the faculty of San Francisco State University In partial fulfilment of The Requirements for The Degree

A thesis presented to the faculty of San Francisco State University In partial fulfilment of The Requirements for The Degree ON THE POLYHEDRAL GEOMETRY OF t DESIGNS A thesis presented to the faculty of San Francisco State University In partial fulfilment of The Requirements for The Degree Master of Arts In Mathematics by Steven

More information

1 Integer Decomposition Property

1 Integer Decomposition Property CS 598CSC: Combinatorial Optimization Lecture date: Feb 2, 2010 Instructor: Chandra Chekuri Scribe: Siva Theja Maguluri Material taken mostly from [1] (Chapter 19). 1 Integer Decomposition Property A polyhedron

More information

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute

More information

Chapter 1. Preliminaries

Chapter 1. Preliminaries Introduction This dissertation is a reading of chapter 4 in part I of the book : Integer and Combinatorial Optimization by George L. Nemhauser & Laurence A. Wolsey. The chapter elaborates links between

More information

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code

More information

MAT-INF4110/MAT-INF9110 Mathematical optimization

MAT-INF4110/MAT-INF9110 Mathematical optimization MAT-INF4110/MAT-INF9110 Mathematical optimization Geir Dahl August 20, 2013 Convexity Part IV Chapter 4 Representation of convex sets different representations of convex sets, boundary polyhedra and polytopes:

More information

RESEARCH ARTICLE. An extension of the polytope of doubly stochastic matrices

RESEARCH ARTICLE. An extension of the polytope of doubly stochastic matrices Linear and Multilinear Algebra Vol. 00, No. 00, Month 200x, 1 15 RESEARCH ARTICLE An extension of the polytope of doubly stochastic matrices Richard A. Brualdi a and Geir Dahl b a Department of Mathematics,

More information

On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy

On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy On Multi-ource Multi-ink Hyperedge Network: Enumeration, Rate Region Computation, & Hierarchy Ph D Diertation Defene Congduan Li ASPITRG & MANL Drexel Univerity congduanli@gmailcom May 9, 05 C Li (ASPITRG

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded

More information

Key Things We Learned Last Time. IE418 Integer Programming. Proving Facets Way #2 Indirect. A More Abstract Example

Key Things We Learned Last Time. IE418 Integer Programming. Proving Facets Way #2 Indirect. A More Abstract Example Key Things We Learned Last Time IE48: Integer Programming Department of Industrial and Systems Engineering Lehigh University 8th March 5 A face F is said to be a facet of P if dim(f ) = dim(p ). All facets

More information

Characterising Probability Distributions via Entropies

Characterising Probability Distributions via Entropies 1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2

More information

EE595A Submodular functions, their optimization and applications Spring 2011

EE595A Submodular functions, their optimization and applications Spring 2011 EE595A Submodular functions, their optimization and applications Spring 2011 Prof. Jeff Bilmes University of Washington, Seattle Department of Electrical Engineering Winter Quarter, 2011 http://ee.washington.edu/class/235/2011wtr/index.html

More information

A COMPUTATIONAL COMPARISON OF SYMMETRY HANDLING METHODS FOR MIXED INTEGER PROGRAMS

A COMPUTATIONAL COMPARISON OF SYMMETRY HANDLING METHODS FOR MIXED INTEGER PROGRAMS A COMPUTATIONAL COMPARISON OF SYMMETRY HANDLING METHODS FOR MIXED INTEGER PROGRAMS MARC E. PFETSCH AND THOMAS REHN Abstract. The handling of symmetries in mixed integer programs in order to speed up the

More information

Chain Independence and Common Information

Chain Independence and Common Information 1 Chain Independence and Common Information Konstantin Makarychev and Yury Makarychev Abstract We present a new proof of a celebrated result of Gács and Körner that the common information is far less than

More information

Solving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:

Solving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles

More information

Parity Polytopes and Binarization

Parity Polytopes and Binarization Parity Polytopes and Binarization Dominik Ermel 1 and Matthias Walter 1 Otto-von-Guericke-Universität Magdeburg, dominik.ermel@st.ovgu.de RWTH Aachen University, walter@or.rwth-aachen.de March 8, 018 Abstract

More information

A compositional approach to the max-flow problem

A compositional approach to the max-flow problem Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 2014-06-09 A compositional approach to the max-flow problem Kfoury, Assaf Computer Science Department,

More information

Not Every GTSP Facet Induces an STSP Facet

Not Every GTSP Facet Induces an STSP Facet Not Every GTSP Facet Induces an STSP Facet Marcus Oswald, Gerhard Reinelt, and Dirk Oliver Theis Institute of Computer Science University of Heidelberg Im Neuenheimer Feld 38, 9120 Heidelberg, Germany

More information

arxiv:math/ v1 [math.ac] 11 Nov 2005

arxiv:math/ v1 [math.ac] 11 Nov 2005 A note on Rees algebras and the MFMC property arxiv:math/0511307v1 [math.ac] 11 Nov 2005 Isidoro Gitler, Carlos E. Valencia and Rafael H. Villarreal 1 Departamento de Matemáticas Centro de Investigación

More information

The Geometry of Root Systems. Brian C. Hall

The Geometry of Root Systems. Brian C. Hall The Geometry of Root Systems A E Z S Brian C. Hall T G R S T G R S 1 1. I Root systems arise in the theory of Lie groups and Lie algebras, but can also be studied as mathematical objects in their own right.

More information

Discrete Optimization 2010 Lecture 7 Introduction to Integer Programming

Discrete Optimization 2010 Lecture 7 Introduction to Integer Programming Discrete Optimization 2010 Lecture 7 Introduction to Integer Programming Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Intro: The Matching

More information

Equivariant semidefinite lifts and sum of squares hierarchies

Equivariant semidefinite lifts and sum of squares hierarchies Equivariant semidefinite lifts and sum of squares hierarchies Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology

More information

Integer Programming, Part 1

Integer Programming, Part 1 Integer Programming, Part 1 Rudi Pendavingh Technische Universiteit Eindhoven May 18, 2016 Rudi Pendavingh (TU/e) Integer Programming, Part 1 May 18, 2016 1 / 37 Linear Inequalities and Polyhedra Farkas

More information

From the Zonotope Construction to the Minkowski Addition of Convex Polytopes

From the Zonotope Construction to the Minkowski Addition of Convex Polytopes From the Zonotope Construction to the Minkowski Addition of Convex Polytopes Komei Fukuda School of Computer Science, McGill University, Montreal, Canada Abstract A zonotope is the Minkowski addition of

More information

Lattice closures of polyhedra

Lattice closures of polyhedra Lattice closures of polyhedra Sanjeeb Dash IBM Research sanjeebd@us.ibm.com Oktay Günlük IBM Research gunluk@us.ibm.com April 10, 2017 Diego A. Morán R. Universidad Adolfo Ibañez diego.moran@uai.cl Abstract

More information

47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010

47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010 47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture Date: 03/18/010 We saw in the previous lecture that a lattice Λ can have many bases. In fact, if Λ is a lattice of a subspace L with

More information

Lecture notes on the ellipsoid algorithm

Lecture notes on the ellipsoid algorithm Massachusetts Institute of Technology Handout 1 18.433: Combinatorial Optimization May 14th, 007 Michel X. Goemans Lecture notes on the ellipsoid algorithm The simplex algorithm was the first algorithm

More information

Linear equations in linear algebra

Linear equations in linear algebra Linear equations in linear algebra Samy Tindel Purdue University Differential equations and linear algebra - MA 262 Taken from Differential equations and linear algebra Pearson Collections Samy T. Linear

More information

Hamiltonian Tournaments and Gorenstein Rings

Hamiltonian Tournaments and Gorenstein Rings Europ. J. Combinatorics (2002) 23, 463 470 doi:10.1006/eujc.2002.0572 Available online at http://www.idealibrary.com on Hamiltonian Tournaments and Gorenstein Rings HIDEFUMI OHSUGI AND TAKAYUKI HIBI Let

More information

The Witt designs, Golay codes and Mathieu groups

The Witt designs, Golay codes and Mathieu groups The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector

More information

Optimization methods NOPT048

Optimization methods NOPT048 Optimization methods NOPT048 Jirka Fink https://ktiml.mff.cuni.cz/ fink/ Department of Theoretical Computer Science and Mathematical Logic Faculty of Mathematics and Physics Charles University in Prague

More information

The Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs

The Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs The Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs Santanu S. Dey 1, Andres Iroume 1, and Guanyi Wang 1 1 School of Industrial and Systems Engineering, Georgia Institute of Technology

More information

LECTURE 25: REVIEW/EPILOGUE LECTURE OUTLINE

LECTURE 25: REVIEW/EPILOGUE LECTURE OUTLINE LECTURE 25: REVIEW/EPILOGUE LECTURE OUTLINE CONVEX ANALYSIS AND DUALITY Basic concepts of convex analysis Basic concepts of convex optimization Geometric duality framework - MC/MC Constrained optimization

More information

Integer Programming ISE 418. Lecture 13. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 13. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 13 Dr. Ted Ralphs ISE 418 Lecture 13 1 Reading for This Lecture Nemhauser and Wolsey Sections II.1.1-II.1.3, II.1.6 Wolsey Chapter 8 CCZ Chapters 5 and 6 Valid Inequalities

More information

arxiv: v3 [math.co] 1 Oct 2018

arxiv: v3 [math.co] 1 Oct 2018 NON-SPANNING LATTICE 3-POLYTOPES arxiv:7.07603v3 [math.co] Oct 208 Abstract. We completely classify non-spanning 3-polytopes, by which we mean lattice 3-polytopes whose lattice points do not affinely span

More information

Vertex subsets with minimal width and dual width

Vertex subsets with minimal width and dual width Vertex subsets with minimal width and dual width in Q-polynomial distance-regular graphs University of Wisconsin & Tohoku University February 2, 2011 Every face (or facet) of a hypercube is a hypercube...

More information

Introduction to Semidefinite Programming I: Basic properties a

Introduction to Semidefinite Programming I: Basic properties a Introduction to Semidefinite Programming I: Basic properties and variations on the Goemans-Williamson approximation algorithm for max-cut MFO seminar on Semidefinite Programming May 30, 2010 Semidefinite

More information

An enumeration of equilateral triangle dissections

An enumeration of equilateral triangle dissections arxiv:090.599v [math.co] Apr 00 An enumeration of equilateral triangle dissections Aleš Drápal Department of Mathematics Charles University Sokolovská 83 86 75 Praha 8 Czech Republic Carlo Hämäläinen Department

More information

Ehrhart Positivity. Federico Castillo. December 15, University of California, Davis. Joint work with Fu Liu. Ehrhart Positivity

Ehrhart Positivity. Federico Castillo. December 15, University of California, Davis. Joint work with Fu Liu. Ehrhart Positivity University of California, Davis Joint work with Fu Liu December 15, 2016 Lattice points of a polytope A (convex) polytope is a bounded solution set of a finite system of linear inequalities, or is the

More information

COUNTING INTEGER POINTS IN POLYHEDRA. Alexander Barvinok

COUNTING INTEGER POINTS IN POLYHEDRA. Alexander Barvinok COUNTING INTEGER POINTS IN POLYHEDRA Alexander Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html Let P R d be a polytope. We want to compute (exactly or approximately)

More information

LIFTS OF CONVEX SETS AND CONE FACTORIZATIONS JOÃO GOUVEIA, PABLO A. PARRILO, AND REKHA THOMAS

LIFTS OF CONVEX SETS AND CONE FACTORIZATIONS JOÃO GOUVEIA, PABLO A. PARRILO, AND REKHA THOMAS LIFTS OF CONVEX SETS AND CONE FACTORIZATIONS Abstract. In this paper we address the basic geometric question of when a given convex set is the image under a linear map of an affine slice of a given closed

More information

arxiv: v1 [math.co] 10 Aug 2016

arxiv: v1 [math.co] 10 Aug 2016 POLYTOPES OF STOCHASTIC TENSORS HAIXIA CHANG 1, VEHBI E. PAKSOY 2 AND FUZHEN ZHANG 2 arxiv:1608.03203v1 [math.co] 10 Aug 2016 Abstract. Considering n n n stochastic tensors (a ijk ) (i.e., nonnegative

More information

A combinatorial algorithm minimizing submodular functions in strongly polynomial time

A combinatorial algorithm minimizing submodular functions in strongly polynomial time A combinatorial algorithm minimizing submodular functions in strongly polynomial time Alexander Schrijver 1 Abstract We give a strongly polynomial-time algorithm minimizing a submodular function f given

More information

Integer programming: an introduction. Alessandro Astolfi

Integer programming: an introduction. Alessandro Astolfi Integer programming: an introduction Alessandro Astolfi Outline Introduction Examples Methods for solving ILP Optimization on graphs LP problems with integer solutions Summary Introduction Integer programming

More information

Lecture 1 Introduction

Lecture 1 Introduction L. Vandenberghe EE236A (Fall 2013-14) Lecture 1 Introduction course overview linear optimization examples history approximate syllabus basic definitions linear optimization in vector and matrix notation

More information

Resource Constrained Project Scheduling Linear and Integer Programming (1)

Resource Constrained Project Scheduling Linear and Integer Programming (1) DM204, 2010 SCHEDULING, TIMETABLING AND ROUTING Lecture 3 Resource Constrained Project Linear and Integer Programming (1) Marco Chiarandini Department of Mathematics & Computer Science University of Southern

More information

DETECTION OF FXM ARBITRAGE AND ITS SENSITIVITY

DETECTION OF FXM ARBITRAGE AND ITS SENSITIVITY DETECTION OF FXM ARBITRAGE AND ITS SENSITIVITY SFI FINANCIAL ALGEBRA PROJECT AT UCC: BH, AM & EO S 1. Definitions and basics In this working paper we have n currencies, labeled 1 through n inclusive and

More information

Cutting planes from extended LP formulations

Cutting planes from extended LP formulations Cutting planes from extended LP formulations Merve Bodur University of Wisconsin-Madison mbodur@wisc.edu Sanjeeb Dash IBM Research sanjeebd@us.ibm.com March 7, 2016 Oktay Günlük IBM Research gunluk@us.ibm.com

More information

Lecture Notes Introduction to Cluster Algebra

Lecture Notes Introduction to Cluster Algebra Lecture Notes Introduction to Cluster Algebra Ivan C.H. Ip Updated: April 14, 017 Total Positivity The final and historically the original motivation is from the study of total positive matrices, which

More information

Introduction to Linear and Combinatorial Optimization (ADM I)

Introduction to Linear and Combinatorial Optimization (ADM I) Introduction to Linear and Combinatorial Optimization (ADM I) Rolf Möhring based on the 20011/12 course by Martin Skutella TU Berlin WS 2013/14 1 General Remarks new flavor of ADM I introduce linear and

More information

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,

More information