Online Supplement: Managing Hospital Inpatient Bed Capacity through Partitioning Care into Focused Wings

Size: px
Start display at page:

Download "Online Supplement: Managing Hospital Inpatient Bed Capacity through Partitioning Care into Focused Wings"

Transcription

1 Online Supplement: Managing Hospital Inpatient Bed Capacity through Partitioning Care into Focused Wings Thomas J. Best, Burhaneddin Sandıkçı, Donald D. Eisenstein University of Chicago Booth School of Business, David O. Meltzer University of Chicago Medical Center, Appendix A: Proofs of Propositions 1 and 2 Let N j denote the expected number of occupied beds in wing j. Using Little s law N j = d j (1 p j ) for wing j, where d j = i T j λ i s i is the bed-demand and p j is the abandonment probability as noted earlier in the paper. Proposition 1 (restated). Consider an instance with C = {1, 2} under the queueing system of 4.3. If v1 = v2, q m 1 m 2 max{m 1, m 2 }, and there are no focus effects, then U 1,2 U 1 + U 2, where U i is the expected utility from a wing for type i C with b i beds, and U 1,2 is the expected utility from a pooled wing with b 1 + b 2 beds. Proof of Proposition 1. Under the queueing system of 4.3, the total expected utility from the pooled wing is U 1,2 = λ 1 (1 p 1,2 )u 1 + λ 2 (1 p 1,2 )u 2. Substituting for u i using equation (4), and noting that γ i = 0 for all i C when there are no focus effects, we find U 1,2 = (λ 1 v 1 + λ 2 v 2 )(1 p 1,2 ) = v1 m 1 (λ1 m 1 + λ 2 m 2 )(1 p 1,2 ), where the last equality follows from the assumption v1 m 1 = v2 m 2. Since α i = 0 for all i C when there are no focus effects, equation (4) implies that m i = s i, and therefore λ 1 m 1 + λ 2 m 2 = d 1,2, from which we conclude U 1,2 = v1 m 1 N 1,2. Similarly, U 1 = v1 N 1 and U 2 = v2 N 2. Since v1 = v2 m 1 m 2 m 1 m 2 N 1,2 N 1 + N 2, which is shown to hold in the proof of Proposition 2. is assumed, we write U 1 + U 2 = v1 m 1 (N 1 + N 2 ). Thus, U 1,2 U 1 + U 2 if In the rest of this section, for clarity, we explicitly write out the arguments of some functions (e.g., we write p j as p ( d j, Λ j, q j, b j ) ). We also indicate a one-wing formation with the subscript 0 (e.g., q0 denotes the average willingnessto-wait under the one-wing formation). Before proving Proposition 2, we recall two technical results from the literature. Lemma 1. [Armony et al. (2009, Proposition 2)] If q 0 max i C {m i }, then p is convex in the number of servers. ( ) d Lemma 2. [Smith and Whitt (1981, pg. 53)] E d 0, b 0 j > E ( ) i T j λ i m i T i j λ i m i, b j. 1

2 2 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings Proposition 2 (restated). Consider an instance of (P) under the queueing system of 4.3, and the one-wing solution (denoted O ) and a multi-wing solution (denoted M ). If the mean willingness-to-wait in O is not smaller than the mean willingness-to-wait in any wing in M or the nominal mean length-of-stay of any care type, and the focusadjusted mean length-of-stay of each care type in O is not smaller than that for M, then the bed occupancy of O is higher than the weighted average bed occupancy of M. Proof of Proposition 2. The bed occupancy of the one-wing solution is N 0 B, where N 0 is the expected number of occupied beds. Consider a multi-wing solution with w wings and b j beds in wing j = 1,..., w such that w j=1 b j = B. The weighted average bed occupancy in M is N j ( b j ) wj=1 N j j:b j>0 b j B =. Thus the proof will be complete if N B 0 > w j=1 N j. N 0 = d 0 [1 p (d 0, Λ 0, q 0, b 0 ) ] w i T d 0 1 j λ i (1 α i 0 )mi d 0 p d 0, Λ 0, q 0, b j i T j λ i (1 α i, (1) 0 )mi j=1 where last inequality follows from Lemma 1. Since p 0 as shown in the proof of Theorem 1, we replace Λ Λ 0 in the right hand-side of inequality (1) with the smaller terms Λ j and find w N 0 d 0 λ i (1 α i 0 )mi p d 0 d 0, Λ j, q 0, b j. (2) j=1 i T j i T j λ i (1 α i 0 )mi Recall now equation (3) for the abandonment probability p. Note that substituting i T j λ i (1 α i 0 )mi for d 0 and b j for b j d 0 i T j λ i (1 α i 0 )mi in the abandonment probability in the right hand-side of inequality (2) only impacts the E term. Lemma 2 implies that the E term decreases, and therefore p increases, after this substitution. So, we find w N 0 > d 0 λ i (1 α i 0 )mi p λ i (1 α i 0 )mi, Λ j, q 0, b j (3) j=1 i T j i T j w = λ i (1 α i 0 )mi 1 p λ i (1 α i 0 )mi, Λ j, q 0, b j, (4) j=1 i T j i T j where equality (4) follows because d 0 = i C λ i (1 α i 0 )mi = w j=1 i T j λ i (1 α i 0 )mi. Direct differentiation shows that p 0, and therefore substituting the smaller q q j terms for q 0 in the right hand-side of (4), we find w N 0 λ i (1 α i 0 )mi 1 p λ i (1 α i 0 )mi, Λ j, q j, b j. (5) j=1 i T j i T j For j = 1,..., w, the terms i T j λ i (1 α i 0 )mi and p ( ) i T j λ i (1 α i 0 )mi, Λ j, q j, b j can be thought of as the bed-demand and abandonment probability of wing j under the length-of-stay scaling factors of the one-wing solution. Therefore, the right hand-side of inequality (5) equals the total expected number of occupied beds w j=1 N j under the one-wing scaling factors. Direct differentiation shows that N 0. Thus, replacing (1 α αi ) with (1 0 αi ) for each i C yields w w N 0 λ i (1 α i )m i 1 p λ i (1 α i )m i, Λ j, q j, b j = d j [1 ] w p j = N j, (6) j=1 i T j i T j j=1 j=1 which completes the proof. d 0 Appendix B: An upper bound on Z In B.1, we transform an instance of (P) into a new instance yielding an upper bound for the original instance. In B.2, we develop a method to efficiently compute this bound and, in B.3, we further tighten the bound. We use this upper bound to evaluate the accuracy of the heuristic presented in , and report the resulting optimality gaps in 7.

3 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings 3 B.1. Constructing an upper bound on Z Let Θ := { B, C, {λ i } i C, {m i } i C, {v i } i C } denote an instance of problem (P) to be evaluated under the queueing system of 4.3. Figure S.1 presents pseudocode for transforming Θ into a new instance ˆΘ which returns an upper bound Z( ˆΘ) on the optimal objective value Z(Θ) of Θ. The main idea of our transformation is to disaggregate the original types in C into a total of ˆT T sub-types, so that every new sub-type has the same arrival rate λ and the same mean length-of-stay g. The term n i 1 in step (T-1) denotes the number of sub-types created by original type i C, and f ( ) in step (T-6) is a mapping that keeps track of the origin of each sub-type k. In order to prevent unnecessarily inflating the total utility of the hospital, step (T-7) sets the nominal utility of sub-type k to a fraction of the nominal utility of its original type. Finally, Ĉ in step (T-8) is the index set of all sub-types created during the transformation. To generate a valid upper bound for Z(Θ), the effects of focus on utility and length-of-stay must also be transformed appropriately before solving ˆΘ. Let Ψ(Θ) and Ψ( ˆΘ) denote the feasible regions, as defined in 3, for instances Θ and ˆΘ, respectively. We say that a solution ˆψ = (ŵ, ˆb, T ) Ψ( ˆΘ) is equivalent to a solution ψ = (w, b, T ) Ψ(Θ) if (i) ŵ = w, and, for j = 1,..., w, (ii) ˆb j = b j and (iii) T j T j, where the relationship holds if substituting T j for C in the MAIN STEP of Figure S.1 yields Ĉ = T j. Using this definition of equivalence, Figure S.2 provides an appropriate transformation of the scaling factors that model the effects of focused care. Step (F-1) assigns the focus-adjusted utility u i (ψ) to û k ( ˆψ) and length-of-stay s i (ψ) to ŝ k ( ˆψ) for all sub-types k Ĉ that have emanated from the original type i C, when ψ is equivalent to ˆψ, which occurs only if the set of sub-types T j for each wing j is entirely composed of the subtypes that are created from the original types in T j. The intuition behind this step is the need to maintain the integrity of the effects of focused care. In other words, the effects of focus should be immune to giving any (dis)advantage to a wing considered in the transformed instance ˆΘ that is essentially equivalent to a wing in the original instance Θ. Lemma 3 provides a number of technical results regarding our transformation. These results indicate that, for two equivalent wings, one of which is considered for Θ and the other for ˆΘ, the transformations presented in Figures S.1- S.2 keep the overall bed-demand (Lemma 3.a. 3.b.), hence the overall load (Lemma 3.c.), for each wing the same. INPUT. An instance Θ = { } B, C, {λ i } i C, {m i } i C, {v i } i C of problem (P). INITIALIZE. ˆT 0; k 0 (I-1) { g min } i C m i ( ) (I-2) λ GCD λ i m i i C g, where GCD stands for the greatest common divisor (I-3) MAIN STEP. For each original type i C n i λi m i (T-1) λg ˆT ˆT + n i (T-2) For each sub-type in { 1,..., n i} k k + 1 (T-3) ˆλ k λ (T-4) ˆm k g (T-5) f (k) i (T-6) ˆv k v f (k) g (T-7) m f (k) Ĉ {1,..., ˆT} (T-8) OUTPUT. A new instance ˆΘ { } B, Ĉ, {ˆλ k } k Ĉ, { ˆm k } k Ĉ, {ˆv k } k Ĉ of problem (P). Figure S.1 Pseudocode for transforming an instance Θ of problem (P) into a new instance ˆΘ.

4 4 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings INPUT. Focus-adjusted utility u i (ψ) and length-of-stay s i (ψ) for i C and ψ Ψ(Θ) MAIN. For each solution ˆψ Ψ( ˆΘ) If ψ Ψ(Θ) such that ψ ˆψ û k ( ˆψ) u i (ψ) and ŝ k ( ˆψ) s i (ψ) for all k such that f (k) = i Else û k ( ˆψ) and ŝ k ( ˆψ) can be set arbitrarily for all k End-If OUTPUT. Focus-adjusted utility û k ( ˆψ) and length-of-stay ŝ k ( ˆψ) for k Ĉ and ˆψ Ψ( ˆΘ) Figure S.2 Transforming the effects of focused care for use in ˆΘ. (F-1) (F-2) However, the wing considered for ˆΘ experiences a higher arrival rate than for Θ (Lemma 3.d.), a shorter average length-of-stay (since g m i for all i C), and a lower utility per patient (Lemma 3.e.), although the total uncapacitated utility of the wing is unchanged (Lemma 3.f.). Lemma 3. Given a pair of instances (Θ, ˆΘ) of the problem (P) and a pair of solutions (ψ, ˆψ) ( Ψ(Θ), Ψ( ˆΘ) ) such that ψ ˆψ, the following hold for wing j = 1,..., w: a. i T j λ i m i = k T j ˆλ k ˆm k. b. d j = ˆd j. c. ρ j = ˆρ j. d. Λ j ˆΛ j. e. u i û k. f. i T j λ i u i = k T j ˆλ k û k. Proof of Lemma 3. a. k T j ˆλ k ˆm k = i T j k: f (k)=i ˆλ k ˆm k = i T j λg k: f (k)=i 1 = i T j λgn i = i T j λ i m i, where the last equality follows from step (T-1) in Figure S.1. b. f. Similar to the proof of Lemma 3.a. Theorem 1 (restated). Z ( ˆΘ ) Z(Θ). Proof of Theorem 1. For any feasible solution ψ Ψ(Θ), consider the construction in Figure S.3 that produces a feasible solution ˆψ Ψ( ˆΘ). We proceed to show that the objective function w j=1 U j of problem (P) evaluated at ˆψ is not smaller than at ψ. First note that the set of sub-types assigned to wing j of ˆψ is simply the collection of sub-types obtained by disaggregating the original types assigned to wing j of ψ, hence ψ ˆψ. Rewriting equation (1) under the queueing system of 4.3, we have U j = (1 p j ) i T j λ i u i for j = 1,..., w. Lemma 3.f. implies that we only need to check the abandonment probability p j, as λ u is the same under both solutions ψ and ˆψ, because ψ ˆψ. Pick an arbitrary wing j. By construction, the set of care types in the wing under ψ and ˆψ are equivalent (i.e., T j T j ), and the willingness-to-wait parameter q j and the number of beds b j allocated to the wing remain the same. Furthermore, Lemma 3.b. implies that the bed-demand d j to the wing is the same under both ψ and ˆψ. Therefore, E j in equation (3) is the same for ψ and ˆψ. On the other hand, Lemma 3.d. implies that the overall arrival rate Λ j increases from ψ to ˆψ. Differentiating p j with respect to Λ j, we find p j Λ j = p j X j X j Λ j. Lemma 5 below shows that p j X j < 0 and direct differentiation shows that X j Λ j 0. As a result, p j Λ j 0. Combining this result with the result of Lemma 3.d., we find that p j ( ˆψ) p j (ψ). Therefore, the wing utility U j evaluated at ˆψ is not smaller than that evaluated at ψ.

5 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings 5 INPUT. CONSTRUCTION. OUTPUT. A feasible solution ψ = (w, b, T ) = ( ) w, {b j } j=1,...,w, {T j } j=1,...,w Ψ(Θ). ŵ w For j = 1,..., w T j ˆb j b j For each original type i T j T j T j {k : f (k) = i} ˆb {ˆb j } j=1,...,w T { T j } j=1,...,w A feasible solution ˆψ ( ŵ, ˆb, T ) Ψ( ˆΘ). Figure S.3 Constructing a feasible solution for ˆΘ from a feasible solution of Θ. B.2. Efficiently computing an upper bound The linchpin of our upper bound computations is Proposition 1, which specifies conditions under which a problem instance can be solved to optimality by applying the DP from 4.2 along with the sequence S from 5.2. While these conditions are not expected to be satisfied naturally, they are satisfied by the instance ˆΘ from Figure S.1 and a modified version of the problem (P). We construct this modified problem after presenting Proposition 1 and its proof. Consider instances that satisfy the following conditions: (i) care types are indistinguishable except for their utility v i, (ii) the scaling factors have the same value for all care types within the same wing, and (iii) if care types from two separate wings are swapped then the incoming type inherits the scaling factor of the host wing. More formally, let ψ = (w, b, T ) and ψ = (w, b, T ) denote two feasible wing formations in Ψ, where T is constructed from T by swapping two types in two different wings, and consider the following conditions: (C1) λ i = λ and m i = g for i = 1,..., T. (C2) γ i (ψ) = γ i ( ψ) for care types i T j and i T j, for each wing j = 1,..., w. (C3) α i (ψ) = α i ( ψ) for care types i T j and i T j, for each wing j = 1,..., w. Proposition 1. Consider an instance of (P) under the queueing system of 4.3. If conditions (C1-C3) hold, then there exists an optimal solution (w, b, T ) such that T = {T 1,..., T w } is formed by making cuts in the sequence S. Proof of Proposition 1. Let ψ = (w, b, T ) be an optimal solution to (P). If T is formed by cuts into the sequence S (after trivial resequencing of the wings, or the care types within a wing, if necessary), then the result holds. Otherwise, we show that T can be transformed into a new partition T such that T is formed by making cuts in S and the resulting solution (w, b, T ) has no loss of utility. Condition (C2) implies that all of the care types in a wing have the same utility scaling factor, hence, for notational clarity, we denote the utility scaling factor for wing j as γ j (ψ ) := γ i (ψ ) for i T j and j = 1,..., w. Similarly, by condition (C3), we denote the length-of-stay scaling factor for wing j as α j (ψ ) := α i (ψ ) for i T j and j = 1,..., w. Furthermore, since λ i = λ for all i by condition (C1), equation (1) for wing j under solution ψ simplifies to U j = (1 p j ) (1 + γ j (ψ)) λ v i. (7) i T j

6 6 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings Without loss of generality, we re-index the wings of ψ so that (1 p 1 ) (1 + γ 1 (ψ)) (1 p 2 ) (1 + γ 2 (ψ)) (1 p w ) (1 + γ w (ψ)). Since T is not cut from S, there must exist at least two care types i 1 T j 1 and i 2 T j 2 where v i 1 < v i 2 for wing indices j 1 < j 2. Consider swapping these care types, and let ψ denote the resulting wing formation. Conditions (C2) and (C3), respectively, imply that such a swap does not change the utility scaling factors, γ j1 or γ j2, and the length-of-stay scaling factors, α j1 or α j2. Combining this result with condition (C1) implies that the abandonment probabilities p j1 and p j2 are also not affected by a swap. Therefore, only the term i T j 1 v i from U j1 and i T j 2 v i from U j2 are affected by the swap. The net change in U j1 + U j2 is λ (v i 2 v i 1) [ (1 p j1 )(1 + γ j1 (ψ)) (1 p j2 )(1 + γ j2 (ψ)) ] 0, (8) where the inequality holds since λ 0, (1 p j1 ) (1 + γ j1 (ψ)) (1 p j2 ) (1 + γ j2 (ψ)), and v i 2 > v i 1. We repeat such swaps until the T largest nominal utility care types are assigned to wing 1, the next T largest to wing 2, and so 1 forth forming a new care partition T which cuts S. The resulting solution (w, b, T ) has no loss of utility, because of inequality (8). One can readily confirm that the instance ˆΘ satisfies condition (C1). However, the scaling factors (5) and (6) may violate conditions (C2) and (C3) under instance ˆΘ. So we construct a modified problem ( ˆP) that augments the set of decision variables of the problem (P) in such a way that conditions (C2) and (C3) are satisfied. Let t = {t 1,..., t w }, where t j ( j = 1,..., w) is a new decision variable. Denote the vector of decision variables for problem ( ˆP) by (w, b, T, t). Furthermore, for any Θ, we create ˆΘ as in Figure S.1. However, we do not use Figure S.2 to adjust the scaling factors. Rather, we determine the scaling factors for ˆΘ inside problem ( ˆP) using a set of constraints similar to equations (5) and (6). The modified problem is ( ˆP) Ẑ( ˆΘ) = Max where Ψ is as given in 3, and { Υ = t Z w : t j 0 for j = 1,..., w, (w,b,t,t) w t j = T, j=1 w U j : (w, b, T ) Ψ( ˆΘ), t Υ, j=1 α j = ( ) 1 t j ( T and γ 1 + e β(ρ j ζ) j = η 1 t ) j T 2 } for j = 1,..., w, where T is the number of care types in the original instance Θ. Note that for any fixed t, ( ˆP) reduces to (P), therefore one can apply Proposition 1. We are now ready to prove Theorems 2 and 3 Theorem 2 (restated). An instance of problem ( ˆP) can be solved to optimality using the DP of 4.2 by making cuts in the utility-sorted sequence S. Proof of Theorem 2. As in the proof of Proposition 1, let (w, b, T, t ) be any claimed optimal solution to ( ˆP) such that T = {T 1, T 2,..., T w} is not cut from S. It is clear that swapping sub-types between wings does not change the values of b j and t j for any wing j = 1,..., w. Therefore, the scaling factors α j and γ j enforced by the constraints of Υ satisfy conditions (C2-C3). Furthermore, condition (C1) is satisfied by the data of ˆΘ. As a result, we can swap types as in the proof of Proposition 1 to show the existence of an optimal partition T that is formed by cuts into S. Theorem 3 (restated). Ẑ ( ˆΘ ) Z(Θ).

7 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings 7 Proof of Theorem 3. For any solution ψ Ψ(Θ), we construct ˆψ Ψ( ˆΘ) as in Figure S.3. And, for j = 1,..., w, we set t j equal to the number of original types in wing j under the ψ solution, which is feasible to w j=1 t j = T in Υ. This implies that the scaling factors (5) and (6) evaluated under ψ are, respectively, equal to the scaling factor equations α j and γ j in Υ evaluated under ( ˆψ, t). Therefore, ˆψ is feasible to Ψ( ˆΘ) and t is feasible to Υ. Showing that w j=1 U j evaluated under ( ˆψ, t) is at least as much as that under ψ is similar to the proof of Theorem 1. B.3. Tightening the upper bound Ẑ ( ˆΘ ) To tighten Ẑ ( ˆΘ ), we further restrict the values t j for j = 1,..., w by adding the following constraints to Υ: T j n i : I C for j = 1,..., w, (9) i I t j I : I C and n i = T j for j = 1,..., w. (10) i I Recall that n i is set in Figure S.1 (step (T-1)) as the number of sub-types that originated from type i. Adding these constraints shrinks Υ, hence we obtain a tighter objective value Ẑ( ˆΘ). To check that this value is still a valid upper bound for Z(Θ), consider any feasible solution ψ Ψ(Θ). Clearly, ψ has a feasible completion t that satisfies (10). Therefore, we can construct a solution ( ˆψ, t) as in the proof of Theorem 3 that is feasible to Ψ, Υ, (9), and (10). Showing that w j=1 U j evaluated under ( ˆψ, t) is no worse than under ψ proceeds similarly to the proof of Theorem 1. After adding these constraints, the scaling factors α j and γ j enforced by the constraints of Υ do not violate conditions (C2-C3). Hence, as in Theorem 2, we can find the optimal wing formation by making cuts into the sequence S. Appendix C: Computing the abandonment probability This section describes how to compute the abandonment probability given in equation (3). For notational convenience, we drop the wing index j throughout this section. First, estimate X recursively as illustrated in Figure S.4. The R n term in step (X-2) is the nth ratio inside the infinite summation needed to compute X in equation (3). Note that the recursion stops in a finite number of steps, because R n < 1 for some finite n and, beyond this step, R n is strictly decreasing in n, therefore R n ɛ (0, 1) for some finite n. Furthermore, it can be shown that X n monotonically converges to X from below; and it may have an initial convex piece, but for large enough n, it becomes concave. INPUT. Problem parameters Λ, q, d, b, and tolerance parameter ɛ (0, 1). INITIALIZE. n 0 φ d ; A Λq b X 0 0 R 0 1 MAIN STEP. While R n > ɛ n n + 1 X n X n 1 + R n 1 A R n R n 1 A φ +n End-While-loop OUTPUT. ˆX X n. Figure S.4 Pseudocode for estimating X. (X-1) (X-2)

8 8 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings Lemma 4 shows that our estimate ˆX recovers at least 100(1 ɛ)% of the actual X, so one can get arbitrarily close to X by a sufficiently small tolerance ɛ. Lemma 4. ˆX (1 ɛ)x. Proof of Lemma 4. Let n denote the iterate in Figure S.4 upon termination of the procedure, so R n ɛ. The error in our estimate is given by n X ˆX = R n = R n 1 + A n A + k R n 1 + A A + k = R n X ɛx, n=n n=n +1 k=n +1 φ n=1 k=1 φ where the second equality follows from step (X-2) in Figure S.4, the first inequality results from adding the nonnegative terms for n = 1, 2,..., n, and last inequality follows from R n ɛ. Lemma 5 presents a technical result, which is used in proving the main result of this section in Theorem 1. Lemma 5. p X < 0. Proof of Lemma 5. Differentiating equation (3) with respect to X, we obtain d p X = (E 1) E b (E + d X)(E + (11) d X), b b which is negative if and only if the numerator is negative. For clarity, in the rest of this proof, we write E as E(b) to be explicit about its dependence on b and note that E(b + 1) = 1 + E(b) d/b for b = 1, 2,.... Since E(1) = 1, the numerator of equation (11) is negative for b = 1. Assume that d b [E(b) 1] E(b) < 0 for b = 2, 3,..., b. For b = b + 1, d b + 1 [E(b + 1) 1] E(b + 1) = b b + 1 E(b ) E(b ) d/b 1 < b b + 1 E(b ) [E(b ) 1] 1 = E(b ) b + 1 where the first equation follows from substituting 1 + E(b +1) d/(b +1) for E(b + 1), and the strict inequality follows from the induction hypothesis that implies E(b ) d/b > E(b ) 1. Let ˆp denote the estimated abandonment probability obtained from substituting ˆX for X in equation (3). Theorem 1 establishes that ˆp overestimates the actual abandonment probability p by at most ɛ. Theorem 1. ˆp p [0, ɛ]. Proof of Theorem 1. The nonnegativity of ˆp p follows from Lemma 5 along with the fact that ˆX X. To show that ˆp p ɛ, first note that Lemmas 4 and 5 together imply from which we find ˆp p ˆp = 1 + (φ 1) ˆX E + φ ˆX 1 + (φ 1)(1 ɛ)x 1 + (φ 1)X E + φ(1 ɛ)x E + φx Since E 1, X 1, φ 0, and ɛ (0, 1), we find If φ 1, then 0, 1 + (φ 1)(1 ɛ)x E + φ(1 ɛ)x, (12) = ( ) ( E φ (E 1) ɛ E + φ(1 ɛ)x X E + φx ). (13) E φ (E 1) 1. (14) E + φ(1 ɛ)x X 1 1. If, on the other hand, φ < 1, then p 0 implies X, which leads to X 1. So, we find E+φX 1 φ E+φX X 1. (15) E + φx Substituting inequalities (14)-(15) into (13), we conclude that ˆp p ɛ.

9 Best et al.: Online Supplement: Managing hospital inpatient bed capacity through partitioning care into focused wings 9 References Armony, M., E. Plambeck, S. Seshadri Sensitivity of optimal capacity to customer impatience in an unobservable M/M/s queue (Why you shouldn t shout at the DMV). Manufacturing & Service Operations Management 11(1) Smith, D. R., W. Whitt Resource sharing for efficiency in traffic systems. The Bell System Technical Journal 60(1)

Designing Optimal Pre-Announced Markdowns in the Presence of Rational Customers with Multi-unit Demands - Online Appendix

Designing Optimal Pre-Announced Markdowns in the Presence of Rational Customers with Multi-unit Demands - Online Appendix 087/msom070057 Designing Optimal Pre-Announced Markdowns in the Presence of Rational Customers with Multi-unit Demands - Online Appendix Wedad Elmaghraby Altan Gülcü Pınar Keskinocak RH mith chool of Business,

More information

Technical Note: Capacitated Assortment Optimization under the Multinomial Logit Model with Nested Consideration Sets

Technical Note: Capacitated Assortment Optimization under the Multinomial Logit Model with Nested Consideration Sets Technical Note: Capacitated Assortment Optimization under the Multinomial Logit Model with Nested Consideration Sets Jacob Feldman Olin Business School, Washington University, St. Louis, MO 63130, USA

More information

A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL

A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL by Rodney B. Wallace IBM and The George Washington University rodney.wallace@us.ibm.com Ward Whitt Columbia University

More information

On the Partitioning of Servers in Queueing Systems during Rush Hour

On the Partitioning of Servers in Queueing Systems during Rush Hour On the Partitioning of Servers in Queueing Systems during Rush Hour Bin Hu Saif Benjaafar Department of Operations and Management Science, Ross School of Business, University of Michigan at Ann Arbor,

More information

IS 709/809: Computational Methods in IS Research Fall Exam Review

IS 709/809: Computational Methods in IS Research Fall Exam Review IS 709/809: Computational Methods in IS Research Fall 2017 Exam Review Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Exam When: Tuesday (11/28) 7:10pm

More information

The common-line problem in congested transit networks

The common-line problem in congested transit networks The common-line problem in congested transit networks R. Cominetti, J. Correa Abstract We analyze a general (Wardrop) equilibrium model for the common-line problem in transit networks under congestion

More information

Assortment Optimization under the Multinomial Logit Model with Nested Consideration Sets

Assortment Optimization under the Multinomial Logit Model with Nested Consideration Sets Assortment Optimization under the Multinomial Logit Model with Nested Consideration Sets Jacob Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853,

More information

Linear Programming Redux

Linear Programming Redux Linear Programming Redux Jim Bremer May 12, 2008 The purpose of these notes is to review the basics of linear programming and the simplex method in a clear, concise, and comprehensive way. The book contains

More information

Appendix - E-Companion

Appendix - E-Companion Article submitted to Operations Research; manuscript no. Please, provide the manuscript number! 1 Appendix - E-Companion Appendix A: Derivation of optimal supply volume The supply volume x 1 was treated

More information

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers ALGEBRA CHRISTIAN REMLING 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers by Z = {..., 2, 1, 0, 1,...}. Given a, b Z, we write a b if b = ac for some

More information

3.10 Lagrangian relaxation

3.10 Lagrangian relaxation 3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the

More information

Dynamic Control of Parallel-Server Systems

Dynamic Control of Parallel-Server Systems Dynamic Control of Parallel-Server Systems Jim Dai Georgia Institute of Technology Tolga Tezcan University of Illinois at Urbana-Champaign May 13, 2009 Jim Dai (Georgia Tech) Many-Server Asymptotic Optimality

More information

Unbounded Regions of Infinitely Logconcave Sequences

Unbounded Regions of Infinitely Logconcave Sequences The University of San Francisco USF Scholarship: a digital repository @ Gleeson Library Geschke Center Mathematics College of Arts and Sciences 007 Unbounded Regions of Infinitely Logconcave Sequences

More information

Routing and Staffing in Large-Scale Service Systems: The Case of Homogeneous Impatient Customers and Heterogeneous Servers 1

Routing and Staffing in Large-Scale Service Systems: The Case of Homogeneous Impatient Customers and Heterogeneous Servers 1 Routing and Staffing in Large-Scale Service Systems: The Case of Homogeneous Impatient Customers and Heterogeneous Servers 1 Mor Armony 2 Avishai Mandelbaum 3 June 25, 2008 Abstract Motivated by call centers,

More information

On a Bicriterion Server Allocation Problem in a Multidimensional Erlang Loss System

On a Bicriterion Server Allocation Problem in a Multidimensional Erlang Loss System On a icriterion Server Allocation Problem in a Multidimensional Erlang Loss System Jorge Sá Esteves José Craveirinha December 05, 2010 Abstract. In this work an optimization problem on a classical elementary

More information

(a) Write a greedy O(n log n) algorithm that, on input S, returns a covering subset C of minimum size.

(a) Write a greedy O(n log n) algorithm that, on input S, returns a covering subset C of minimum size. Esercizi su Greedy Exercise 1.1 Let S = {[a 1, b 1 ], [a 2, b 2 ],..., [a n, b n ]} be a set of closed intervals on the real line. We say that C S is a covering subset for S if, for any interval [a, b]

More information

47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010

47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010 47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture Date: 03/18/010 We saw in the previous lecture that a lattice Λ can have many bases. In fact, if Λ is a lattice of a subspace L with

More information

On the Partitioning of Servers in Queueing Systems during Rush Hour

On the Partitioning of Servers in Queueing Systems during Rush Hour On the Partitioning of Servers in Queueing Systems during Rush Hour This paper is motivated by two phenomena observed in many queueing systems in practice. The first is the partitioning of server capacity

More information

Design, staffing and control of large service systems: The case of a single customer class and multiple server types. April 2, 2004 DRAFT.

Design, staffing and control of large service systems: The case of a single customer class and multiple server types. April 2, 2004 DRAFT. Design, staffing and control of large service systems: The case of a single customer class and multiple server types. Mor Armony 1 Avishai Mandelbaum 2 April 2, 2004 DRAFT Abstract Motivated by modern

More information

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse Yongjia Song, James Luedtke Virginia Commonwealth University, Richmond, VA, ysong3@vcu.edu University

More information

Monotonicity Properties for Multiserver Queues with Reneging and Finite Waiting Lines

Monotonicity Properties for Multiserver Queues with Reneging and Finite Waiting Lines Monotonicity Properties for Multiserver Queues with Reneging and Finite Waiting Lines Oualid Jouini & Yves Dallery Laboratoire Génie Industriel, Ecole Centrale Paris Grande Voie des Vignes, 92295 Châtenay-Malabry

More information

Online Appendix: An Economic Approach to Generalizing Findings from Regression-Discontinuity Designs

Online Appendix: An Economic Approach to Generalizing Findings from Regression-Discontinuity Designs Online Appendix: An Economic Approach to Generalizing Findings from Regression-Discontinuity Designs Nirav Mehta July 11, 2018 Online Appendix 1 Allow the Probability of Enrollment to Vary by x If the

More information

The G/GI/N Queue in the Halfin-Whitt Regime I: Infinite Server Queue System Equations

The G/GI/N Queue in the Halfin-Whitt Regime I: Infinite Server Queue System Equations The G/GI/ Queue in the Halfin-Whitt Regime I: Infinite Server Queue System Equations J. E Reed School of Industrial and Systems Engineering Georgia Institute of Technology October 17, 27 Abstract In this

More information

Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement

Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Submitted to imanufacturing & Service Operations Management manuscript MSOM-11-370.R3 Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement (Authors names blinded

More information

MAS114: Solutions to Exercises

MAS114: Solutions to Exercises MAS114: s to Exercises Up to week 8 Note that the challenge problems are intended to be difficult! Doing any of them is an achievement. Please hand them in on a separate piece of paper if you attempt them.

More information

Queues with Many Servers and Impatient Customers

Queues with Many Servers and Impatient Customers MATHEMATICS OF OPERATIOS RESEARCH Vol. 37, o. 1, February 212, pp. 41 65 ISS 364-765X (print) ISS 1526-5471 (online) http://dx.doi.org/1.1287/moor.111.53 212 IFORMS Queues with Many Servers and Impatient

More information

A simplex method for uncapacitated pure-supply and pure-demand infinite network flow problems

A simplex method for uncapacitated pure-supply and pure-demand infinite network flow problems A simplex method for uncapacitated pure-supply and pure-demand infinite network flow problems Christopher Thomas Ryan Robert L Smith Marina Epelman July 6, 2017 Abstract We provide a simplex algorithm

More information

Appendix. A. Simulation study on the effect of aggregate data

Appendix. A. Simulation study on the effect of aggregate data 36 Article submitted to Operations Research; manuscript no. Appendix A. Simulation study on the effect of aggregate data One of the main limitations of our data are that they are aggregate at the annual

More information

Machine Learning. Support Vector Machines. Fabio Vandin November 20, 2017

Machine Learning. Support Vector Machines. Fabio Vandin November 20, 2017 Machine Learning Support Vector Machines Fabio Vandin November 20, 2017 1 Classification and Margin Consider a classification problem with two classes: instance set X = R d label set Y = { 1, 1}. Training

More information

COMPLEXITY OF A QUADRATIC PENALTY ACCELERATED INEXACT PROXIMAL POINT METHOD FOR SOLVING LINEARLY CONSTRAINED NONCONVEX COMPOSITE PROGRAMS

COMPLEXITY OF A QUADRATIC PENALTY ACCELERATED INEXACT PROXIMAL POINT METHOD FOR SOLVING LINEARLY CONSTRAINED NONCONVEX COMPOSITE PROGRAMS COMPLEXITY OF A QUADRATIC PENALTY ACCELERATED INEXACT PROXIMAL POINT METHOD FOR SOLVING LINEARLY CONSTRAINED NONCONVEX COMPOSITE PROGRAMS WEIWEI KONG, JEFFERSON G. MELO, AND RENATO D.C. MONTEIRO Abstract.

More information

Online Supplement to Delay-Based Service Differentiation with Many Servers and Time-Varying Arrival Rates

Online Supplement to Delay-Based Service Differentiation with Many Servers and Time-Varying Arrival Rates Online Supplement to Delay-Based Service Differentiation with Many Servers and Time-Varying Arrival Rates Xu Sun and Ward Whitt Department of Industrial Engineering and Operations Research, Columbia University

More information

Network design for a service operation with lost demand and possible disruptions

Network design for a service operation with lost demand and possible disruptions Network design for a service operation with lost demand and possible disruptions Opher Baron, Oded Berman, Yael Deutsch Joseph L. Rotman School of Management, University of Toronto, 105 St. George St.,

More information

Markov Decision Processes

Markov Decision Processes Markov Decision Processes Lecture notes for the course Games on Graphs B. Srivathsan Chennai Mathematical Institute, India 1 Markov Chains We will define Markov chains in a manner that will be useful to

More information

Diagnosis of Repeated/Intermittent Failures in Discrete Event Systems

Diagnosis of Repeated/Intermittent Failures in Discrete Event Systems Diagnosis of Repeated/Intermittent Failures in Discrete Event Systems Shengbing Jiang, Ratnesh Kumar, and Humberto E. Garcia Abstract We introduce the notion of repeated failure diagnosability for diagnosing

More information

CS261: Problem Set #3

CS261: Problem Set #3 CS261: Problem Set #3 Due by 11:59 PM on Tuesday, February 23, 2016 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Submission instructions:

More information

Homework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4

Homework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4 Do the following exercises from the text: Chapter (Section 3):, 1, 17(a)-(b), 3 Prove that 1 3 + 3 + + n 3 n (n + 1) for all n N Proof The proof is by induction on n For n N, let S(n) be the statement

More information

1 Closest Pair of Points on the Plane

1 Closest Pair of Points on the Plane CS 31: Algorithms (Spring 2019): Lecture 5 Date: 4th April, 2019 Topic: Divide and Conquer 3: Closest Pair of Points on a Plane Disclaimer: These notes have not gone through scrutiny and in all probability

More information

Given a sequence a 1, a 2,...of numbers, the finite sum a 1 + a 2 + +a n,wheren is an nonnegative integer, can be written

Given a sequence a 1, a 2,...of numbers, the finite sum a 1 + a 2 + +a n,wheren is an nonnegative integer, can be written A Summations When an algorithm contains an iterative control construct such as a while or for loop, its running time can be expressed as the sum of the times spent on each execution of the body of the

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdlhandlenet/1887/39637 holds various files of this Leiden University dissertation Author: Smit, Laurens Title: Steady-state analysis of large scale systems : the successive

More information

Designing Information Devices and Systems I Spring 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way

Designing Information Devices and Systems I Spring 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way EECS 16A Designing Information Devices and Systems I Spring 018 Lecture Notes Note 1 1.1 Introduction to Linear Algebra the EECS Way In this note, we will teach the basics of linear algebra and relate

More information

Appendix A.0: Approximating other performance measures

Appendix A.0: Approximating other performance measures Appendix A.0: Approximating other performance measures Alternative definition of service level and approximation. The waiting time is defined as the minimum of virtual waiting time and patience. Define

More information

An M/M/1 Queue in Random Environment with Disasters

An M/M/1 Queue in Random Environment with Disasters An M/M/1 Queue in Random Environment with Disasters Noam Paz 1 and Uri Yechiali 1,2 1 Department of Statistics and Operations Research School of Mathematical Sciences Tel Aviv University, Tel Aviv 69978,

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Stationary Probabilities of Markov Chains with Upper Hessenberg Transition Matrices

Stationary Probabilities of Markov Chains with Upper Hessenberg Transition Matrices Stationary Probabilities of Marov Chains with Upper Hessenberg Transition Matrices Y. Quennel ZHAO Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba CANADA R3B 2E9 Susan

More information

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Robust Optimization in a Queueing Context

Robust Optimization in a Queueing Context Robust Optimization in a Queueing Context W. van der Heide September 2015 - February 2016 Publishing date: April 18, 2016 Eindhoven University of Technology Department of Mathematics & Computer Science

More information

Deceptive Advertising with Rational Buyers

Deceptive Advertising with Rational Buyers Deceptive Advertising with Rational Buyers September 6, 016 ONLINE APPENDIX In this Appendix we present in full additional results and extensions which are only mentioned in the paper. In the exposition

More information

The Skorokhod reflection problem for functions with discontinuities (contractive case)

The Skorokhod reflection problem for functions with discontinuities (contractive case) The Skorokhod reflection problem for functions with discontinuities (contractive case) TAKIS KONSTANTOPOULOS Univ. of Texas at Austin Revised March 1999 Abstract Basic properties of the Skorokhod reflection

More information

Supplemental for Spectral Algorithm For Latent Tree Graphical Models

Supplemental for Spectral Algorithm For Latent Tree Graphical Models Supplemental for Spectral Algorithm For Latent Tree Graphical Models Ankur P. Parikh, Le Song, Eric P. Xing The supplemental contains 3 main things. 1. The first is network plots of the latent variable

More information

Online Supplement for Bounded Rationality in Service Systems

Online Supplement for Bounded Rationality in Service Systems Online Supplement for Bounded ationality in Service Systems Tingliang Huang Department of Management Science and Innovation, University ollege London, London W1E 6BT, United Kingdom, t.huang@ucl.ac.uk

More information

On the Pathwise Optimal Bernoulli Routing Policy for Homogeneous Parallel Servers

On the Pathwise Optimal Bernoulli Routing Policy for Homogeneous Parallel Servers On the Pathwise Optimal Bernoulli Routing Policy for Homogeneous Parallel Servers Ger Koole INRIA Sophia Antipolis B.P. 93, 06902 Sophia Antipolis Cedex France Mathematics of Operations Research 21:469

More information

Assortment Optimization under the Multinomial Logit Model with Sequential Offerings

Assortment Optimization under the Multinomial Logit Model with Sequential Offerings Assortment Optimization under the Multinomial Logit Model with Sequential Offerings Nan Liu Carroll School of Management, Boston College, Chestnut Hill, MA 02467, USA nan.liu@bc.edu Yuhang Ma School of

More information

CHAPTER 3. Sequences. 1. Basic Properties

CHAPTER 3. Sequences. 1. Basic Properties CHAPTER 3 Sequences We begin our study of analysis with sequences. There are several reasons for starting here. First, sequences are the simplest way to introduce limits, the central idea of calculus.

More information

Online Supplement to Coarse Competitive Equilibrium and Extreme Prices

Online Supplement to Coarse Competitive Equilibrium and Extreme Prices Online Supplement to Coarse Competitive Equilibrium and Extreme Prices Faruk Gul Wolfgang Pesendorfer Tomasz Strzalecki September 9, 2016 Princeton University. Email: fgul@princeton.edu Princeton University.

More information

On the Approximate Linear Programming Approach for Network Revenue Management Problems

On the Approximate Linear Programming Approach for Network Revenue Management Problems On the Approximate Linear Programming Approach for Network Revenue Management Problems Chaoxu Tong School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853,

More information

Figure 10.1: Recording when the event E occurs

Figure 10.1: Recording when the event E occurs 10 Poisson Processes Let T R be an interval. A family of random variables {X(t) ; t T} is called a continuous time stochastic process. We often consider T = [0, 1] and T = [0, ). As X(t) is a random variable

More information

CHAPTER 3 Further properties of splines and B-splines

CHAPTER 3 Further properties of splines and B-splines CHAPTER 3 Further properties of splines and B-splines In Chapter 2 we established some of the most elementary properties of B-splines. In this chapter our focus is on the question What kind of functions

More information

M/M/3/3 AND M/M/4/4 RETRIAL QUEUES. Tuan Phung-Duc, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi

M/M/3/3 AND M/M/4/4 RETRIAL QUEUES. Tuan Phung-Duc, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi JOURNAL OF INDUSTRIAL AND doi:10.3934/imo.2009.5.431 MANAGEMENT OPTIMIZATION Volume 5, Number 3, August 2009 pp. 431 451 M/M/3/3 AND M/M/4/4 RETRIAL QUEUES Tuan Phung-Duc, Hiroyuki Masuyama, Shoi Kasahara

More information

Solutions to Exercises

Solutions to Exercises 1/13 Solutions to Exercises The exercises referred to as WS 1.1(a), and so forth, are from the course book: Williamson and Shmoys, The Design of Approximation Algorithms, Cambridge University Press, 2011,

More information

Managing Service Systems with an Offline Waiting Option and Customer Abandonment: Companion Note

Managing Service Systems with an Offline Waiting Option and Customer Abandonment: Companion Note Managing Service Systems with an Offline Waiting Option and Customer Abandonment: Companion Note Vasiliki Kostami Amy R. Ward September 25, 28 The Amusement Park Ride Setting An amusement park ride departs

More information

Implications of the Constant Rank Constraint Qualification

Implications of the Constant Rank Constraint Qualification Mathematical Programming manuscript No. (will be inserted by the editor) Implications of the Constant Rank Constraint Qualification Shu Lu Received: date / Accepted: date Abstract This paper investigates

More information

Standard forms for writing numbers

Standard forms for writing numbers Standard forms for writing numbers In order to relate the abstract mathematical descriptions of familiar number systems to the everyday descriptions of numbers by decimal expansions and similar means,

More information

CHAPTER 2. The Simplex Method

CHAPTER 2. The Simplex Method CHAPTER 2 The Simplex Method In this chapter we present the simplex method as it applies to linear programming problems in standard form. 1. An Example We first illustrate how the simplex method works

More information

Competitive Consumer Demand 1

Competitive Consumer Demand 1 John Nachbar Washington University May 7, 2017 1 Introduction. Competitive Consumer Demand 1 These notes sketch out the basic elements of competitive demand theory. The main result is the Slutsky Decomposition

More information

Interior-Point Methods for Linear Optimization

Interior-Point Methods for Linear Optimization Interior-Point Methods for Linear Optimization Robert M. Freund and Jorge Vera March, 204 c 204 Robert M. Freund and Jorge Vera. All rights reserved. Linear Optimization with a Logarithmic Barrier Function

More information

Mini-Course on Limits and Sequences. Peter Kwadwo Asante. B.S., Kwame Nkrumah University of Science and Technology, Ghana, 2014 A REPORT

Mini-Course on Limits and Sequences. Peter Kwadwo Asante. B.S., Kwame Nkrumah University of Science and Technology, Ghana, 2014 A REPORT Mini-Course on Limits and Sequences by Peter Kwadwo Asante B.S., Kwame Nkrumah University of Science and Technology, Ghana, 204 A REPORT submitted in partial fulfillment of the requirements for the degree

More information

VOL. VOL NO. ISSUE NEAR-FEASIBLE STABLE MATCHINGS WITH COUPLES 19. Online Appendix. Near-Feasible Stable Matching with Couples

VOL. VOL NO. ISSUE NEAR-FEASIBLE STABLE MATCHINGS WITH COUPLES 19. Online Appendix. Near-Feasible Stable Matching with Couples VOL. VOL NO. ISSUE NEAR-FEASIBLE STABLE MATCHINGS WITH COUPLES 19 Online Appendix Near-Feasible Stable Matching with Couples Thành Nguyen and Rakesh Vohra Preferences and Stability A1. Preferences Doctor

More information

Online Interval Coloring and Variants

Online Interval Coloring and Variants Online Interval Coloring and Variants Leah Epstein 1, and Meital Levy 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il School of Computer Science, Tel-Aviv

More information

On Finding Optimal Policies for Markovian Decision Processes Using Simulation

On Finding Optimal Policies for Markovian Decision Processes Using Simulation On Finding Optimal Policies for Markovian Decision Processes Using Simulation Apostolos N. Burnetas Case Western Reserve University Michael N. Katehakis Rutgers University February 1995 Abstract A simulation

More information

Expectation Maximization (EM) Algorithm. Each has it s own probability of seeing H on any one flip. Let. p 1 = P ( H on Coin 1 )

Expectation Maximization (EM) Algorithm. Each has it s own probability of seeing H on any one flip. Let. p 1 = P ( H on Coin 1 ) Expectation Maximization (EM Algorithm Motivating Example: Have two coins: Coin 1 and Coin 2 Each has it s own probability of seeing H on any one flip. Let p 1 = P ( H on Coin 1 p 2 = P ( H on Coin 2 Select

More information

Asymptotics for Polling Models with Limited Service Policies

Asymptotics for Polling Models with Limited Service Policies Asymptotics for Polling Models with Limited Service Policies Woojin Chang School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205 USA Douglas G. Down Department

More information

Multiprocessor Scheduling I: Partitioned Scheduling. LS 12, TU Dortmund

Multiprocessor Scheduling I: Partitioned Scheduling. LS 12, TU Dortmund Multiprocessor Scheduling I: Partitioned Scheduling Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 22/23, June, 2015 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 47 Outline Introduction to Multiprocessor

More information

The continuous knapsack set

The continuous knapsack set The continuous knapsack set Sanjeeb Dash IBM Research sanjeebd@us.ibm.com Oktay Günlük IBM Research gunluk@us.ibm.com December 18, 2014 Laurence Wolsey Core laurence.wolsey@uclouvain.be Abstract We study

More information

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.

More information

Three-partition Flow Cover Inequalities for Constant Capacity Fixed-charge Network Flow Problems

Three-partition Flow Cover Inequalities for Constant Capacity Fixed-charge Network Flow Problems Three-partition Flow Cover Inequalities for Constant Capacity Fixed-charge Network Flow Problems Alper Atamtürk, Andrés Gómez Department of Industrial Engineering & Operations Research, University of California,

More information

Santa Claus Schedules Jobs on Unrelated Machines

Santa Claus Schedules Jobs on Unrelated Machines Santa Claus Schedules Jobs on Unrelated Machines Ola Svensson (osven@kth.se) Royal Institute of Technology - KTH Stockholm, Sweden March 22, 2011 arxiv:1011.1168v2 [cs.ds] 21 Mar 2011 Abstract One of the

More information

Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement

Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Wyean Chan DIRO, Université de Montréal, C.P. 6128, Succ. Centre-Ville, Montréal (Québec), H3C 3J7, CANADA,

More information

State Space Collapse in Many-Server Diffusion Limits of Parallel Server Systems. J. G. Dai. Tolga Tezcan

State Space Collapse in Many-Server Diffusion Limits of Parallel Server Systems. J. G. Dai. Tolga Tezcan State Space Collapse in Many-Server Diffusion imits of Parallel Server Systems J. G. Dai H. Milton Stewart School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, Georgia

More information

Combinatorial Optimization Spring Term 2015 Rico Zenklusen. 2 a = ( 3 2 ) 1 E(a, A) = E(( 3 2 ), ( 4 0

Combinatorial Optimization Spring Term 2015 Rico Zenklusen. 2 a = ( 3 2 ) 1 E(a, A) = E(( 3 2 ), ( 4 0 3 2 a = ( 3 2 ) 1 E(a, A) = E(( 3 2 ), ( 4 0 0 1 )) 0 0 1 2 3 4 5 Figure 9: An example of an axis parallel ellipsoid E(a, A) in two dimensions. Notice that the eigenvectors of A correspond to the axes

More information

Solving conic optimization problems via self-dual embedding and facial reduction: a unified approach

Solving conic optimization problems via self-dual embedding and facial reduction: a unified approach Solving conic optimization problems via self-dual embedding and facial reduction: a unified approach Frank Permenter Henrik A. Friberg Erling D. Andersen August 18, 216 Abstract We establish connections

More information

Improved Algorithms for Machine Allocation in Manufacturing Systems

Improved Algorithms for Machine Allocation in Manufacturing Systems Improved Algorithms for Machine Allocation in Manufacturing Systems Hans Frenk Martine Labbé Mario van Vliet Shuzhong Zhang October, 1992 Econometric Institute, Erasmus University Rotterdam, the Netherlands.

More information

Blind Fair Routing in Large-Scale Service Systems with Heterogeneous Customers and Servers

Blind Fair Routing in Large-Scale Service Systems with Heterogeneous Customers and Servers OPERATIONS RESEARCH Vol. 6, No., January February 23, pp. 228 243 ISSN 3-364X (print) ISSN 526-5463 (online) http://dx.doi.org/.287/opre.2.29 23 INFORMS Blind Fair Routing in Large-Scale Service Systems

More information

The min cost flow problem Course notes for Search and Optimization Spring 2004

The min cost flow problem Course notes for Search and Optimization Spring 2004 The min cost flow problem Course notes for Search and Optimization Spring 2004 Peter Bro Miltersen February 20, 2004 Version 1.3 1 Definition of the min cost flow problem We shall consider a generalization

More information

Envy-free cake divisions cannot be found by finite protocols

Envy-free cake divisions cannot be found by finite protocols Envy-free cake divisions cannot be found by finite protocols Walter Stromquist Department of Mathematics and Statistics Swarthmore College, Swarthmore, PA 19081 wstromq1@swarthmore.edu Submitted: Oct 21,

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

Algorithms for a Special Class of State-Dependent Shortest Path Problems with an Application to the Train Routing Problem

Algorithms for a Special Class of State-Dependent Shortest Path Problems with an Application to the Train Routing Problem Algorithms fo Special Class of State-Dependent Shortest Path Problems with an Application to the Train Routing Problem Lunce Fu and Maged Dessouky Daniel J. Epstein Department of Industrial & Systems Engineering

More information

Worst-Case Optimal Redistribution of VCG Payments in Multi-Unit Auctions

Worst-Case Optimal Redistribution of VCG Payments in Multi-Unit Auctions Worst-Case Optimal Redistribution of VCG Payments in Multi-Unit Auctions Mingyu Guo Duke University Dept. of Computer Science Durham, NC, USA mingyu@cs.duke.edu Vincent Conitzer Duke University Dept. of

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Economy of Scale in Multiserver Service Systems: A Retrospective. Ward Whitt. IEOR Department. Columbia University

Economy of Scale in Multiserver Service Systems: A Retrospective. Ward Whitt. IEOR Department. Columbia University Economy of Scale in Multiserver Service Systems: A Retrospective Ward Whitt IEOR Department Columbia University Ancient Relics A. K. Erlang (1924) On the rational determination of the number of circuits.

More information

A LOCALIZATION PROPERTY AT THE BOUNDARY FOR MONGE-AMPERE EQUATION

A LOCALIZATION PROPERTY AT THE BOUNDARY FOR MONGE-AMPERE EQUATION A LOCALIZATION PROPERTY AT THE BOUNDARY FOR MONGE-AMPERE EQUATION O. SAVIN. Introduction In this paper we study the geometry of the sections for solutions to the Monge- Ampere equation det D 2 u = f, u

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH 1998 315 Asymptotic Buffer Overflow Probabilities in Multiclass Multiplexers: An Optimal Control Approach Dimitris Bertsimas, Ioannis Ch. Paschalidis,

More information

Designing Information Devices and Systems I Fall 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way

Designing Information Devices and Systems I Fall 2018 Lecture Notes Note Introduction to Linear Algebra the EECS Way EECS 16A Designing Information Devices and Systems I Fall 018 Lecture Notes Note 1 1.1 Introduction to Linear Algebra the EECS Way In this note, we will teach the basics of linear algebra and relate it

More information

Convexity in R N Supplemental Notes 1

Convexity in R N Supplemental Notes 1 John Nachbar Washington University November 1, 2014 Convexity in R N Supplemental Notes 1 1 Introduction. These notes provide exact characterizations of support and separation in R N. The statement of

More information

Little s result. T = average sojourn time (time spent) in the system N = average number of customers in the system. Little s result says that

Little s result. T = average sojourn time (time spent) in the system N = average number of customers in the system. Little s result says that J. Virtamo 38.143 Queueing Theory / Little s result 1 Little s result The result Little s result or Little s theorem is a very simple (but fundamental) relation between the arrival rate of customers, average

More information

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 1

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 1 CS 70 Discrete Mathematics and Probability Theory Fall 013 Vazirani Note 1 Induction Induction is a basic, powerful and widely used proof technique. It is one of the most common techniques for analyzing

More information

Technical Appendix for: When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance

Technical Appendix for: When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance Technical Appendix for: When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance In this technical appendix we provide proofs for the various results stated in the manuscript

More information

A strongly polynomial algorithm for linear systems having a binary solution

A strongly polynomial algorithm for linear systems having a binary solution A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 11, NOVEMBER On the Performance of Sparse Recovery

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 11, NOVEMBER On the Performance of Sparse Recovery IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 11, NOVEMBER 2011 7255 On the Performance of Sparse Recovery Via `p-minimization (0 p 1) Meng Wang, Student Member, IEEE, Weiyu Xu, and Ao Tang, Senior

More information