A coverage-based Box-Algorithm to compute a representation for optimization problems with three objective functions
|
|
- Jemima Taylor
- 5 years ago
- Views:
Transcription
1 A coverage-based Box-Algorithm to compute a representation for optimization problems with three objective functions Tobias Kuhn (Coauthor: Stefan Ruzika) Department of Mathematics University of Kaiserslautern Recent Advances in Multi-Objective Optimization Lancaster, June 24, 2016 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
2 Thanks to... We gratefully acknowledge support by Federal Ministry of Education and Research, Germany, BMBF, project Robuste Evakuierung und zivile Sicherheitsplanung (RobEZiS), grant number 13N Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
3 Multiple Objective Programming Problem (Multiple Objective Programming Problem) Let f i : X R n R, i {1,..., p} =: [p]. (MOP) min f (x) := (f 1(x),..., f p (x)) x X f 2 (x) f 1 (x) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
4 Optimality Concept Definition x X efficient : x X : f (x) f (x ) : x X i [p] : f i (x) f i (x ) f (x) f (x ) y Y = f (X ) nondominated : y = f (x ), x efficient X E : Set of efficient solutions Y N : Set of nondominated points f 2 (x) y I : Ideal point y N : Nadir point f 1 (x) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
5 Optimality Concept Definition x X efficient : x X : f (x) f (x ) : x X i [p] : f i (x) f i (x ) f (x) f (x ) y Y = f (X ) nondominated : y = f (x ), x efficient X E : Set of efficient solutions Y N : Set of nondominated points f 2 (x) y I : Ideal point y N : Nadir point y N y I f 1 (x) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
6 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
7 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice, Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
8 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice,... consist of infinitely many points, Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
9 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice,... consist of infinitely many points,... grow exponentially in the input size of the problem. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
10 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice,... consist of infinitely many points,... grow exponentially in the input size of the problem. compute representation of Y N, i. e., an appropriate substitute for the nondominated set. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
11 Representative System Definition (Representative System) For some MOP with outcome set Y, we call a finite approximation Rep Y representative system and its elements representative points. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
12 Representative System Definition (Representative System) For some MOP with outcome set Y, we call a finite approximation Rep Y representative system and its elements representative points. What is a good representative system? Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
13 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
14 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep b) Uniformity: min z ẑ. z,ẑ Rep z ẑ Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
15 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep b) Uniformity: min z ẑ. z,ẑ Rep z ẑ c) Cardinality: Rep. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
16 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep b) Uniformity: min z ẑ. z,ẑ Rep z ẑ c) Cardinality: Rep. d) Representation error: max z Rep min y Y N y z. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
17 Some Literature using Boxes for MOPs Boxes / rectangles / cuboids... are frequently used in multiple objective programming: Laumans et al. (2006), Dhaenens et al. (2010), Kirlik and Sayin (2014): exact nondominated set by fixing one objective and projecting the others; grid-based structure; ε-constraint method. Dächert and Klamroth (2013): Improvement of splitting of boxes + generic algorithm; ε-constraint or Tchebycheff method Boland et al. (2014): Partition of projected search space by L-shapes and rectangles; 3-objective integer problems; experimental quality assessment. + several other approaches, e. g. in evolutionary algorithms. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
18 Our Contribution Goal: Simple algorithm for computing a representative system with desired coverage error for MOPs with p = 3 objectives with the capability of relating the run time of the algorithm to the quality of the representative system. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
19 Our Contribution Goal: Simple algorithm for computing a representative system with desired coverage error for MOPs with p = 3 objectives with the capability of relating the run time of the algorithm to the quality of the representative system. Idea: Extending the Box-Algorithm of [Hamacher et al. 2007] to the case of three objective functions Hamacher, Pedersen, Ruzika Finding representative sytems for discrete bicriterion optimization problems Operations Research Letters 35(3): , 2007 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
20 Short Review of the Box-Algorithm (2D) f2 f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
21 Short Review of the Box-Algorithm (2D) f2 f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
22 Short Review of the Box-Algorithm (2D) y N f2 y I f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
23 Short Review of the Box-Algorithm (2D) y N f2 y I ε f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
24 Short Review of the Box-Algorithm (2D) y N f2 y I ε f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
25 Short Review of the Box-Algorithm (2D) f2 f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
26 Box-Algorithm for MOPs with Three Objectives Initialization (MOP) min (f 1 (x), f 2 (x), f 3 (x)) s. t. x X R n Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
27 Box-Algorithm for MOPs with Three Objectives Initialization (MOP) min (f 1 (x), f 2 (x), f 3 (x)) s. t. x X R n Definition Let l, u R 3 with l u. We refer to the cuboid B(l, u) := l + R 3 u R3 = {y R3 l y u} as the box defined by l and u. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
28 Box-Algorithm for MOPs with Three Objectives Initialization (MOP) min (f 1 (x), f 2 (x), f 3 (x)) s. t. x X R n Definition Let l, u R 3 with l u. We refer to the cuboid B(l, u) := l + R 3 u R3 = {y R3 l y u} as the box defined by l and u. Lemma Let l 0 y I R 3 and let u0 y N + R 3. Then Y N B(l 0, u 0 ). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
29 Update Step Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Then, we define the lexicographic ε-constraint scalarizations with lower bounds (P 1 ε 1,ε 2 ), (P 2 ε 1,ε 3 ), and (P 3 ε 2,ε 3 ) as (P 1 ε 1,ε 2 ) lex min (f 3 (x), f 2 (x), f 1 (x)) s. t. x X l 1 f 1 (x) ε 1 l 2 f 2 (x) ε 2 l 3 f 3 (x) ( u 3 ) =: f (x) B(l, u)(ε 1,ε 2,u 3 ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
30 Update Step Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Then, we define the lexicographic ε-constraint scalarizations with lower bounds (P 1 ε 1,ε 2 ), (P 2 ε 1,ε 3 ), and (P 3 ε 2,ε 3 ) as (P 1 ε 1,ε 2 ) lex min (f 3 (x), f 2 (x), f 1 (x)) and, analogously, s. t. x X l 1 f 1 (x) ε 1 l 2 f 2 (x) ε 2 l 3 f 3 (x) ( u 3 ) =: f (x) B(l, u)(ε 1,ε 2,u 3 ) (P 2 ε 1,ε 3 ) lex min (f 2(x), f 1(x), f 3(x)) s. t. x X f (x) B(l, u) (ε 1,u 2,ε 3 ) (P 3 ε 2,ε 3 ) lex min (f 1(x), f 3(x), f 2(x)) s. t. x X f (x) B(l, u) (u 1,ε 2,ε 3 ). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
31 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
32 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Proof. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
33 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Proof. B(z, u) is dominated by z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
34 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Proof. B(z, u) is dominated by z A nondominated point in B ( l, (ε 1, ε 2, z 3 ) ) \ B ( (l 1, z 2, z 3 ), (z 1, ε 2, z 3 ) ) contradicts optimality of z for (P 1 ε 1,ε 2 ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
35 Update Step Example: Consider an initial box with l = 0 and u = (12, 10, 10). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
36 Update Step Example: Solve (P 1 ε 1,ε 2 ) with ε 1 = 6 and ε 2 = 5. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
37 Update Step Example: Optimal solution with image z = (2, 3, 4) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
38 Update Step Example: Optimal solution with image z = (2, 3, 4) Cut-off Regions (see first proposition): B ( (2, 3, 4), (12, 10, 10) ) und B ( 0, (6, 5, 4) ) \ B ( (0, 3, 4), (2, 5, 4) ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
39 Update Step Example: Optimal solution with image z = (2, 3, 4) Cut-off Regions (see first proposition): B ( (2, 3, 4), (12, 10, 10) ) und B ( 0, (6, 5, 4) ) \ B ( (0, 3, 4), (2, 5, 4) ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
40 Update Step Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Suppose (P 1 ε 1,ε 2 ) is solved. Then, the four quarters of the current box B(l, u) are defined as ε 1 Q 1,1 := B l, ε 2, u 3 ε 1 u 1 Q 1,2 := B l 2, ε 2, l 3 u 3 ε 1 Q 1,3 := B ε 2, u, l 3 l 1 ε 1 Q 1,4 := B ε 2, u 2. l 3 u 3 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
41 Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Suppose (Pε 1 1,ε 2 ) is solved and let z R 3 denote the image under f of an optimal solution for (Pε 1 1,ε 2 ). Then, the subdivision of the current box B(l, u) consists of the boxes l 1 z 1 B 1,1 := B z2, ε 2, z3 u 3 ε 1 u 1 B 1,3 := B l 2, ε 2, l 3 z3 ε 1 u 1 B 1,5 := B ε 2, u 2, l 3 z3 l 1 l 1 ε 1 B 1,2 := B l 2, z z3 2 u 3 ε 1 u 1 B 1,4 := B l 2, z z3 2 u 3 B 1,7 := B ε 2, u 2 z3 u 3 l 1 ε 1 B 1,6 := B ε 2, u 2 l 3 z3 z 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
42 Properties of the Subdivision Lemma 7 Y N B(l, u) i=1 B 1,i Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
43 Properties of the Subdivision Lemma 7 Y N B(l, u) i=1 B 1,i Proof. Follows directly from previous proposition. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
44 Properties of the Subdivision Lemma 7 Y N B(l, u) i=1 B 1,i Proof. Follows directly from previous proposition. Observation Vol(B 1,i ) 1 Vol(B(l, u)) 4 Moreover, for each of the quarters Q 1,1, Q 1,2 and Q 1,3, we can find two pairs of boxes for which the combined volume fulfills this formula. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
45 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
46 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
47 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
48 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B lex + (ε 1 l 1, ε 2 l 2, 0) ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
49 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B lex + (ε 1 l 1, ε 2 l 2, 0) ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B ( (ε 1, ε 2, l 3 ), (u 1, u 2, z 3 ) )) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
50 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B lex + (ε 1 l 1, ε 2 l 2, 0) ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B ( (ε 1, ε 2, l 3 ), (u 1, u 2, z 3 ) )) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B ( (ε 1, ε 2, l 3 ), u )) = Vol(Q 1,3 ) = 1 Vol(B(l, u)) 4 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
51 Correctness Algorithm 1 Box-Algorithm for three objectives Require: MOP with three objectives, δ C > 0 Ensure: Rep representative system with coverage error at most δ C 1: S := {InitialBox()} 2: while S do 3: B := B(l, u) := SelectBox(S) 4: if l u δ C then 5: Use (Pu 1 1,u 2 ) to search for a representative point in B 6: else 7: Determine the 2 longest edges of B 8: Solve (P.,.), j j {1, 2, 3}, dividing these 2 edges 9: Add optimal outcome z to Rep 10: for i {1,..., 7} do 11: Add B j,i to S Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
52 Correctness Algorithm 1 Box-Algorithm for three objectives Require: MOP with three objectives, δ C > 0 Ensure: Rep representative system with coverage error at most δ C 1: S := {InitialBox()} 2: while S do 3: B := B(l, u) := SelectBox(S) 4: if l u δ C then 5: Use (Pu 1 1,u 2 ) to search for a representative point in B 6: else 7: Determine the 2 longest edges of B 8: Solve (P.,.), j j {1, 2, 3}, dividing these 2 edges 9: Add optimal outcome z to Rep 10: for i {1,..., 7} do 11: Add B j,i to S Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
53 Correctness Theorem Algorithm 1 terminates in finitely many steps. It outputs a collection of boxes containing all nondominated points. The representative system Rep has a coverage error of at most( δ C (w. r. t. ). More precisely, the ( ) ) L 2 log2 (7) algorithm performs at most O δ C many iterations, where L is the distance of the corner points of the initial box B(l 0, u 0 ), i.e., L := l 0 u 0. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
54 Correctness Theorem Algorithm 1 terminates in finitely many steps. It outputs a collection of boxes containing all nondominated points. The representative system Rep has a coverage error of at most( δ C (w. r. t. ). More precisely, the ( ) ) L 2 log2 (7) algorithm performs at most O δ C many iterations, where L is the distance of the corner points of the initial box B(l 0, u 0 ), i.e., L := l 0 u 0. Proof. see our paper... Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
55 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
56 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Proof. Let y Y N. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
57 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Proof. Let y Y N. Coverage property: z Rep with y z δ C which implies z (δ C, δ C, δ C ) y. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
58 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Proof. Let y Y N. Coverage property: z Rep with y z δ C which implies z (δ C, δ C, δ C ) y. If z Rep N, then there exists ẑ Rep N with ẑ z. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
59 Selection Rule max-dist selection rule Corollary Let SelectBox() always select the box with largest corner point distance. Suppose the algorithm is aborted prematurely after Γ 1 iterations and for all remaining boxes B S, we additionally execute a completion step. Then, the representative system Rep has a coverage error of at most L 2 (log 7 (6Γ+1))/2, where L equals the corner point distance l 0 u 0 of the initial box B(l 0, u 0 ). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
60 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
61 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Idea: Do not select the box with maximal distance, but the box which cannot be dominated in a future iteration. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
62 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Idea: Do not select the box with maximal distance, but the box which cannot be dominated in a future iteration. Store the list of unexplored boxes in analogy to a tree, where we perform a depth first search (DFS). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
63 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Idea: Do not select the box with maximal distance, but the box which cannot be dominated in a future iteration. Store the list of unexplored boxes in analogy to a tree, where we perform a depth first search (DFS). Result: By appropriately cutting off dominated parts of (partial) dominated boxes during the algorithm, we obtain a representative system Rep = Rep N fulfilling the desired accuracy. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
64 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
65 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm The representation error max z Rep min y Y N z y can be positive. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
66 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm The representation error max z Rep min y Y N z y can be positive. Suppose representative system Rep has coverage error at most δ C w. r. t. some norm. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
67 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm The representation error max z Rep min y Y N z y can be positive. Suppose representative system Rep has coverage error at most δ C w. r. t. some norm. Definition Let B be the last subdivision (covering the whole set Y N ) obtained from Algorithm 1. Let z Rep and B(z) B be the set containing either the box for which z was computed or the corresponding child boxes contained in the corresponding quarter of the box for which z was computed. Then, we define B z := { B B : B ( z R 3 ) B B(z) }. If Bz, we call z a critical representative point. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
68 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds (B z = ) = (z Y N ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
69 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds Proposition min max max z Rep B(l,u) B (B z = ) = (z Y N ) max min z y z Rep y Y N z Rep B z z l z, max z ẑ + δ C δ C (z R3 ) max ẑ B Rep where B Rep (z R 3 δ C ) := { y Rep : ỹ z R 3 y ỹ } δc and max l z returns the value 0 if B(l,u) B Bz =. z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
70 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds Proposition min max max z Rep B(l,u) B (B z = ) = (z Y N ) max min z y z Rep y Y N z Rep B z z l z, max z ẑ + δ C δ C (z R3 ) max ẑ B Rep where B Rep (z R 3 δ C ) := { y Rep : ỹ z R 3 y ỹ } δc and max l z returns the value 0 if B(l,u) B Bz =. z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
71 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds Proposition min max max z Rep B(l,u) B (B z = ) = (z Y N ) max min z y z Rep y Y N z Rep B z z l z, max z ẑ + δ C δ C (z R3 ) max ẑ B Rep where B Rep (z R 3 δ C ) := { y Rep : ỹ z R 3 y ỹ } δc and max l z returns the value 0 if B(l,u) B Bz =. z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
72 Conclusion Box algorithm for computing representative sets for MOPs with p = 3 objectives easy to implement with desired coverage error with the capability of relating the run time of the algorithm to the quality of the representative system with different selection rules representative points are not necessarily nondominated but bound on representation error Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
73 Conclusion Box algorithm for computing representative sets for MOPs with p = 3 objectives easy to implement with desired coverage error with the capability of relating the run time of the algorithm to the quality of the representative system with different selection rules representative points are not necessarily nondominated but bound on representation error Thank you for your attention! Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26
Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationGenerating p-extremal graphs
Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum
More informationConnectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization
Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization Jochen Gorski Kathrin Klamroth Stefan Ruzika Abstract Connectedness of efficient solutions is a powerful property in
More informationTechnische Universität Ilmenau Institut für Mathematik
Technische Universität Ilmenau Institut für Mathematik Preprint No. M 18/03 A branch-and-bound based algorithm for nonconvex multiobjective optimization Julia Niebling, Gabriele Eichfelder Februar 018
More informationOnline Computation of Abelian Runs
Online Computation of Abelian Runs Gabriele Fici 1, Thierry Lecroq 2, Arnaud Lefebvre 2, and Élise Prieur-Gaston2 1 Dipartimento di Matematica e Informatica, Università di Palermo, Italy Gabriele.Fici@unipa.it
More informationApproximate Map Labeling. is in (n log n) Frank Wagner* B 93{18. December Abstract
SERIE B INFORMATIK Approximate Map Labeling is in (n log n) Frank Wagner* B 93{18 December 1993 Abstract Given n real numbers, the -CLOSENESS problem consists in deciding whether any two of them are within
More informationUnranked Tree Automata with Sibling Equalities and Disequalities
Unranked Tree Automata with Sibling Equalities and Disequalities Wong Karianto Christof Löding Lehrstuhl für Informatik 7, RWTH Aachen, Germany 34th International Colloquium, ICALP 2007 Xu Gao (NFS) Unranked
More informationA Parametric Simplex Algorithm for Linear Vector Optimization Problems
A Parametric Simplex Algorithm for Linear Vector Optimization Problems Birgit Rudloff Firdevs Ulus Robert Vanderbei July 9, 2015 Abstract In this paper, a parametric simplex algorithm for solving linear
More informationA differential intermediate value theorem
A differential intermediate value theorem by Joris van der Hoeven Dépt. de Mathématiques (Bât. 425) Université Paris-Sud 91405 Orsay Cedex France June 2000 Abstract Let T be the field of grid-based transseries
More informationConnectedness of Efficient Solutions in Multiple. Objective Combinatorial Optimization
Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization Jochen Gorski Kathrin Klamroth Stefan Ruzika Communicated by H. Benson Abstract Connectedness of efficient solutions
More informationMinmax Tree Cover in the Euclidean Space
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 3, pp. 345 371 (2011) Minmax Tree Cover in the Euclidean Space Seigo Karakawa 1 Ehab Morsy 1 Hiroshi Nagamochi 1 1 Department
More informationarxiv: v1 [cs.dm] 26 Apr 2010
A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs George B. Mertzios Derek G. Corneil arxiv:1004.4560v1 [cs.dm] 26 Apr 2010 Abstract Given a graph G, the longest path
More informationTheoretical Computer Science
Theoretical Computer Science 411 (010) 417 44 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: wwwelseviercom/locate/tcs Resource allocation with time intervals
More informationFault-Tolerant Consensus
Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process
More informationarxiv: v1 [math.oc] 23 Jan 2017
Multi-objective minmax robust combinatorial optimization with cardinality-constrained uncertainty Andrea Raith a, Marie Schmidt b, Anita Schöbel c, and Lisa Thom c,* arxiv:1701.06317v1 [math.oc] 23 Jan
More informationMath Models of OR: Branch-and-Bound
Math Models of OR: Branch-and-Bound John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA November 2018 Mitchell Branch-and-Bound 1 / 15 Branch-and-Bound Outline 1 Branch-and-Bound
More informationCommittee Selection with a Weight Constraint Based on Lexicographic Rankings of Individuals
Committee Selection with a Weight Constraint Based on Lexicographic Rankings of Individuals Christian Klamler 1, Ulrich Pferschy 2, and Stefan Ruzika 3 1 University of Graz, Institute of Public Economics,
More informationInteger Programming Duality in Multiple Objective Programming
Integer Programming Duality in Multiple Objective Programming Kathrin Klamroth 1 Jørgen Tind 1 Sibylle Zust 2 03.07.2003 Abstract The weighted sums approach for linear and convex multiple criteria optimization
More informationArtificial Intelligence. Non-deterministic state model. Model for non-deterministic problems. Solutions. Blai Bonet
Artificial Intelligence Blai Bonet Non-deterministic state model Universidad Simón Boĺıvar, Caracas, Venezuela Model for non-deterministic problems Solutions State models with non-deterministic actions
More informationWorst case analysis for a general class of on-line lot-sizing heuristics
Worst case analysis for a general class of on-line lot-sizing heuristics Wilco van den Heuvel a, Albert P.M. Wagelmans a a Econometric Institute and Erasmus Research Institute of Management, Erasmus University
More informationDiskrete Mathematik Solution 6
ETH Zürich, D-INFK HS 2018, 30. October 2018 Prof. Ueli Maurer Marta Mularczyk Diskrete Mathematik Solution 6 6.1 Partial Order Relations a) i) 11 and 12 are incomparable, since 11 12 and 12 11. ii) 4
More informationSome Results Concerning Uniqueness of Triangle Sequences
Some Results Concerning Uniqueness of Triangle Sequences T. Cheslack-Postava A. Diesl M. Lepinski A. Schuyler August 12 1999 Abstract In this paper we will begin by reviewing the triangle iteration. We
More informationUnavoidable subtrees
Unavoidable subtrees Maria Axenovich and Georg Osang July 5, 2012 Abstract Let T k be a family of all k-vertex trees. For T T k and a tree T, we write T T if T contains at least one of the trees from T
More informationFurther discussion of Turing machines
Further discussion of Turing machines In this lecture we will discuss various aspects of decidable and Turing-recognizable languages that were not mentioned in previous lectures. In particular, we will
More informationOn the Existence of Ideal Solutions in Multi-objective 0-1 Integer Programs
On the Existence of Ideal Solutions in Multi-objective -1 Integer Programs Natashia Boland a, Hadi Charkhgard b, and Martin Savelsbergh a a School of Industrial and Systems Engineering, Georgia Institute
More informationA fast algorithm to generate necklaces with xed content
Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,
More informationDistributed Optimization. Song Chong EE, KAIST
Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links
More informationComputing Efficient Solutions of Nonconvex Multi-Objective Problems via Scalarization
Computing Efficient Solutions of Nonconvex Multi-Objective Problems via Scalarization REFAIL KASIMBEYLI Izmir University of Economics Department of Industrial Systems Engineering Sakarya Caddesi 156, 35330
More informationarxiv: v1 [math.co] 25 Apr 2018
Nyldon words arxiv:1804.09735v1 [math.co] 25 Apr 2018 Émilie Charlier Department of Mathematics University of Liège Allée de la Découverte 12 4000 Liège, Belgium echarlier@uliege.be Manon Stipulanti Department
More informationCS 336. We use the principle of inclusion and exclusion. Let B. = {five digit decimal numbers ending with a 5}, and
CS 336 1. The important issue is the logic you used to arrive at your answer. 2. Use extra paper to determine your solutions then neatly transcribe them onto these sheets. 3. Do not submit the scratch
More informationLexicographic Choice under Variable Capacity Constraints
Lexicographic Choice under Variable Capacity Constraints Battal Doğan Serhat Doğan Kemal Yıldız May 14, 2017 Abstract In several matching markets, in order to achieve diversity, agents priorities are allowed
More informationrecent developments of approximation theory and greedy algorithms
recent developments of approximation theory and greedy algorithms Peter Binev Department of Mathematics and Interdisciplinary Mathematics Institute University of South Carolina Reduced Order Modeling in
More informationGame Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano
Game Theory Albert-Ludwigs-Universität Freiburg Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Research Group Foundations of Artificial Intelligence June 17, 2013 June 17, 2013
More informationExtensive Form Games I
Extensive Form Games I Definition of Extensive Form Game a finite game tree X with nodes x X nodes are partially ordered and have a single root (minimal element) terminal nodes are z Z (maximal elements)
More informationCombinatorial Optimization
Combinatorial Optimization 2017-2018 1 Maximum matching on bipartite graphs Given a graph G = (V, E), find a maximum cardinal matching. 1.1 Direct algorithms Theorem 1.1 (Petersen, 1891) A matching M is
More informationTwo-Player Kidney Exchange Game
Two-Player Kidney Exchange Game Margarida Carvalho INESC TEC and Faculdade de Ciências da Universidade do Porto, Portugal margarida.carvalho@dcc.fc.up.pt Andrea Lodi DEI, University of Bologna, Italy andrea.lodi@unibo.it
More informationMaximising the number of induced cycles in a graph
Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,
More informationCodes for Partially Stuck-at Memory Cells
1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationDiscrete Optimization 23
Discrete Optimization 23 2 Total Unimodularity (TU) and Its Applications In this section we will discuss the total unimodularity theory and its applications to flows in networks. 2.1 Total Unimodularity:
More informationAn exponentially graded mesh for singularly perturbed problems
An exponentially graded mesh for singularly perturbed problems Christos Xenophontos Department of Mathematics and Statistics University of Cyprus joint work with P. Constantinou (UCY), S. Franz (TU Dresden)
More informationAdvanced Automata Theory 7 Automatic Functions
Advanced Automata Theory 7 Automatic Functions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory
More informationarxiv: v2 [math.co] 17 Mar 2014
A BIJECTION BETWEEN IRREDUCIBLE k-shapes THE SURJECTIVE PISTOLS OF HEIGHT k 1 ANGE BIGENI arxiv:1402.1383v2 [math.co] 17 Mar 2014 Abstract. This paper constructs a bijection between irreducible k-shapes
More informationA new ILS algorithm for parallel machine scheduling problems
J Intell Manuf (2006) 17:609 619 DOI 10.1007/s10845-006-0032-2 A new ILS algorithm for parallel machine scheduling problems Lixin Tang Jiaxiang Luo Received: April 2005 / Accepted: January 2006 Springer
More informationGenerating epsilon-efficient solutions in multiobjective programming
DEPARTMENT OF MATHEMATICAL SCIENCES Clemson University, South Carolina, USA Technical Report TR2005 10 EWb Generating epsilon-efficient solutions in multiobjective programming A. Engau and M. M. Wiecek
More informationBanach Spaces from Barriers in High Dimensional Ellentuck Spaces
Banach Spaces from Barriers in High Dimensional Ellentuck Spaces A. ARIAS N. DOBRINEN G. GIRÓN-GARNICA J. G. MIJARES Two new hierarchies of Banach spaces T k (d, θ) and T(A k d, θ), k any positive integer,
More informationAlgorithms and Theory of Computation. Lecture 11: Network Flow
Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a
More informationA Brøndsted-Rockafellar Theorem for Diagonal Subdifferential Operators
A Brøndsted-Rockafellar Theorem for Diagonal Subdifferential Operators Radu Ioan Boţ Ernö Robert Csetnek April 23, 2012 Dedicated to Jon Borwein on the occasion of his 60th birthday Abstract. In this note
More informationM. Marques Alves Marina Geremia. November 30, 2017
Iteration complexity of an inexact Douglas-Rachford method and of a Douglas-Rachford-Tseng s F-B four-operator splitting method for solving monotone inclusions M. Marques Alves Marina Geremia November
More informationSGN Advanced Signal Processing Project bonus: Sparse model estimation
SGN 21006 Advanced Signal Processing Project bonus: Sparse model estimation Ioan Tabus Department of Signal Processing Tampere University of Technology Finland 1 / 12 Sparse models Initial problem: solve
More informationGame Theory Lecture 10+11: Knowledge
Game Theory Lecture 10+11: Knowledge Christoph Schottmüller University of Copenhagen November 13 and 20, 2014 1 / 36 Outline 1 (Common) Knowledge The hat game A model of knowledge Common knowledge Agree
More informationSection 6 Fault-Tolerant Consensus
Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.
More informationCOMP/MATH 300 Topics for Spring 2017 June 5, Review and Regular Languages
COMP/MATH 300 Topics for Spring 2017 June 5, 2017 Review and Regular Languages Exam I I. Introductory and review information from Chapter 0 II. Problems and Languages A. Computable problems can be expressed
More informationLecture notes for Analysis of Algorithms : Markov decision processes
Lecture notes for Analysis of Algorithms : Markov decision processes Lecturer: Thomas Dueholm Hansen June 6, 013 Abstract We give an introduction to infinite-horizon Markov decision processes (MDPs) with
More informationCMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017
CMSC CMSC : Lecture Greedy Algorithms for Scheduling Tuesday, Sep 9, 0 Reading: Sects.. and. of KT. (Not covered in DPV.) Interval Scheduling: We continue our discussion of greedy algorithms with a number
More informationLinear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs
Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized
More information3.10 Lagrangian relaxation
3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the
More informationEquivalences of Extensive Forms with Perfect Recall
Equivalences of Extensive Forms with Perfect Recall Carlos Alós-Ferrer and Klaus Ritzberger University of Cologne and Royal Holloway, University of London, 1 and VGSF 1 as of Aug. 1, 2016 1 Introduction
More informationAutomata-based Verification - III
COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata
More informationStatic-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Static-priority Scheduling
CSCE 990: Real-Time Systems Static-Priority Scheduling Steve Goddard goddard@cse.unl.edu http://www.cse.unl.edu/~goddard/courses/realtimesystems Static-priority Scheduling Real-Time Systems Static-Priority
More informationThe Simplex and Policy Iteration Methods are Strongly Polynomial for the Markov Decision Problem with Fixed Discount
The Simplex and Policy Iteration Methods are Strongly Polynomial for the Markov Decision Problem with Fixed Discount Yinyu Ye Department of Management Science and Engineering and Institute of Computational
More informationRealization Plans for Extensive Form Games without Perfect Recall
Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in
More informationComplex numbers, the exponential function, and factorization over C
Complex numbers, the exponential function, and factorization over C 1 Complex Numbers Recall that for every non-zero real number x, its square x 2 = x x is always positive. Consequently, R does not contain
More informationA strongly polynomial algorithm for linear systems having a binary solution
A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More informationImplicit Enumeration for Representation Systems in Multi-objective Optimisation
Master s Degree in Informatics Engineering Dissertation Implicit Enumeration for Representation Systems in Multi-objective Optimisation September, 2015 Alexandre Daniel Borges de Jesus ajesus@student.dei.uc.pt
More informationOn NP-Completeness for Linear Machines
JOURNAL OF COMPLEXITY 13, 259 271 (1997) ARTICLE NO. CM970444 On NP-Completeness for Linear Machines Christine Gaßner* Institut für Mathematik und Informatik, Ernst-Moritz-Arndt-Universität, F.-L.-Jahn-Strasse
More informationCSC 2414 Lattices in Computer Science September 27, Lecture 4. An Efficient Algorithm for Integer Programming in constant dimensions
CSC 2414 Lattices in Computer Science September 27, 2011 Lecture 4 Lecturer: Vinod Vaikuntanathan Scribe: Wesley George Topics covered this lecture: SV P CV P Approximating CVP: Babai s Nearest Plane Algorithm
More informationChapter 7 Network Flow Problems, I
Chapter 7 Network Flow Problems, I Network flow problems are the most frequently solved linear programming problems. They include as special cases, the assignment, transportation, maximum flow, and shortest
More informationPart V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows
Matching Input: undirected graph G = (V, E). M E is a matching if each node appears in at most one Part V edge in M. Maximum Matching: find a matching of maximum cardinality Matchings Ernst Mayr, Harald
More informationOn simulations and bisimulations of general flow systems
On simulations and bisimulations of general flow systems Jen Davoren Department of Electrical & Electronic Engineering The University of Melbourne, AUSTRALIA and Paulo Tabuada Department of Electrical
More informationTheory of Computation
Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 3: Finite State Automata Motivation In the previous lecture we learned how to formalize
More informationDistributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 55, NO. 9, SEPTEMBER 2010 1987 Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE Abstract
More informationRecognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki
Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing Toshio Suzui Osaa Prefecture University Saai, Osaa 599-8531, Japan suzui@mi.cias.osaafu-u.ac.jp
More informationA Brief Introduction to Multiobjective Optimization Techniques
Università di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni A Brief Introduction to Multiobjective Optimization Techniques Maurizio Palesi Maurizio Palesi [mpalesi@diit.unict.it]
More informationOn the BMS Algorithm
On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of
More informationSection Notes 9. IP: Cutting Planes. Applied Math 121. Week of April 12, 2010
Section Notes 9 IP: Cutting Planes Applied Math 121 Week of April 12, 2010 Goals for the week understand what a strong formulations is. be familiar with the cutting planes algorithm and the types of cuts
More informationBranch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems
Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems Yongjia Song James R. Luedtke August 9, 2012 Abstract We study solution approaches for the design of reliably
More informationProof. We indicate by α, β (finite or not) the end-points of I and call
C.6 Continuous functions Pag. 111 Proof of Corollary 4.25 Corollary 4.25 Let f be continuous on the interval I and suppose it admits non-zero its (finite or infinite) that are different in sign for x tending
More informationMcCreight's suffix tree construction algorithm
McCreight's suffix tree construction algorithm b 2 $baa $ 5 $ $ba 6 3 a b 4 $ aab$ 1 Motivation Recall: the suffix tree is an extremely useful data structure with space usage and construction time in O(n).
More informationMultiple Criteria Optimization: Some Introductory Topics
Multiple Criteria Optimization: Some Introductory Topics Ralph E. Steuer Department of Banking & Finance University of Georgia Athens, Georgia 30602-6253 USA Finland 2010 1 rsteuer@uga.edu Finland 2010
More informationCHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES
27 CHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES 3.1 INTRODUCTION The express purpose of this research is to assimilate reliability and its associated probabilistic variables into the Unit
More informationLinear fractional multi-objective optimization problems subject to fuzzy relational equations with the max-average composition
Applied and Computational Mathematics 2015; 4(1-2): 20-30 Published online February 6, 2015 (http://www.sciencepublishinggroup.com/j/acm) doi: 10.11648/j.acm.s.2015040102.15 ISSN: 2328-5605 (Print); ISSN:
More informationStatistics and learning: Big Data
Statistics and learning: Big Data Learning Decision Trees and an Introduction to Boosting Sébastien Gadat Toulouse School of Economics February 2017 S. Gadat (TSE) SAD 2013 1 / 30 Keywords Decision trees
More informationAssignment #1 Sample Solutions
CS 320L Applied Discrete Mathematics Spring 2018 Instructor: Marc Pomplun Assignment #1 Sample Solutions Question 1: Hair Splitting with Set Expressions Let us define the successor of the set A to be the
More informationAlgorithm Robust For The Bicriteria Discrete Optimization Problem
Algorithm Robust For The Bicriteria Discrete Optimization Problem Department of Mathematics University of Kaiserslautern 21.05.07 Example from Electrical Engineering Example from Electrical Engineering
More informationAn accelerated non-euclidean hybrid proximal extragradient-type algorithm for convex concave saddle-point problems
Optimization Methods and Software ISSN: 1055-6788 (Print) 1029-4937 (Online) Journal homepage: http://www.tandfonline.com/loi/goms20 An accelerated non-euclidean hybrid proximal extragradient-type algorithm
More informationr/lt.i Ml s." ifcr ' W ATI II. The fnncrnl.icniccs of Mr*. John We mil uppn our tcpiiblicnn rcprc Died.
$ / / - (\ \ - ) # -/ ( - ( [ & - - - - \ - - ( - - - - & - ( ( / - ( \) Q & - - { Q ( - & - ( & q \ ( - ) Q - - # & - - - & - - - $ - 6 - & # - - - & -- - - - & 9 & q - / \ / - - - -)- - ( - - 9 - - -
More informationW i n t e r r e m e m b e r t h e W O O L L E N S. W rite to the M anageress RIDGE LAUNDRY, ST. H E LE N S. A uction Sale.
> 7? 8 «> ««0? [ -! ««! > - ««>« ------------ - 7 7 7 = - Q9 8 7 ) [ } Q ««
More informationOn Semicontinuity of Convex-valued Multifunctions and Cesari s Property (Q)
On Semicontinuity of Convex-valued Multifunctions and Cesari s Property (Q) Andreas Löhne May 2, 2005 (last update: November 22, 2005) Abstract We investigate two types of semicontinuity for set-valued
More informationSemi-Simultaneous Flows and Binary Constrained (Integer) Linear Programs
DEPARTMENT OF MATHEMATICAL SCIENCES Clemson University, South Carolina, USA Technical Report TR2006 07 EH Semi-Simultaneous Flows and Binary Constrained (Integer Linear Programs A. Engau and H. W. Hamacher
More informationSIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding
SIGNAL COMPRESSION Lecture 3 4.9.2007 Shannon-Fano-Elias Codes and Arithmetic Coding 1 Shannon-Fano-Elias Coding We discuss how to encode the symbols {a 1, a 2,..., a m }, knowing their probabilities,
More informationSet-based Min-max and Min-min Robustness for Multi-objective Robust Optimization
Proceedings of the 2017 Industrial and Systems Engineering Research Conference K. Coperich, E. Cudney, H. Nembhard, eds. Set-based Min-max and Min-min Robustness for Multi-objective Robust Optimization
More informationThe max flow problem. Ford-Fulkerson method. A cut. Lemma Corollary Max Flow Min Cut Theorem. Max Flow Min Cut Theorem
The max flow problem Ford-Fulkerson method 7 11 Ford-Fulkerson(G) f = 0 while( simple path p from s to t in G f ) 10-2 2 1 f := f + f p output f 4 9 1 2 A cut Lemma 26. + Corollary 26.6 Let f be a flow
More informationMatchings in hypergraphs of large minimum degree
Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains
More informationMIDAS: A Mixed Integer Dynamic Approximation Scheme
MIDAS: A Mixed Integer Dynamic Approximation Scheme Andy Philpott, Faisal Wahid, Frédéric Bonnans May 7, 2016 Abstract Mixed Integer Dynamic Approximation Scheme (MIDAS) is a new sampling-based algorithm
More informationCh. 10 Vector Quantization. Advantages & Design
Ch. 10 Vector Quantization Advantages & Design 1 Advantages of VQ There are (at least) 3 main characteristics of VQ that help it outperform SQ: 1. Exploit Correlation within vectors 2. Exploit Shape Flexibility
More information