A coverage-based Box-Algorithm to compute a representation for optimization problems with three objective functions

Size: px
Start display at page:

Download "A coverage-based Box-Algorithm to compute a representation for optimization problems with three objective functions"

Transcription

1 A coverage-based Box-Algorithm to compute a representation for optimization problems with three objective functions Tobias Kuhn (Coauthor: Stefan Ruzika) Department of Mathematics University of Kaiserslautern Recent Advances in Multi-Objective Optimization Lancaster, June 24, 2016 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

2 Thanks to... We gratefully acknowledge support by Federal Ministry of Education and Research, Germany, BMBF, project Robuste Evakuierung und zivile Sicherheitsplanung (RobEZiS), grant number 13N Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

3 Multiple Objective Programming Problem (Multiple Objective Programming Problem) Let f i : X R n R, i {1,..., p} =: [p]. (MOP) min f (x) := (f 1(x),..., f p (x)) x X f 2 (x) f 1 (x) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

4 Optimality Concept Definition x X efficient : x X : f (x) f (x ) : x X i [p] : f i (x) f i (x ) f (x) f (x ) y Y = f (X ) nondominated : y = f (x ), x efficient X E : Set of efficient solutions Y N : Set of nondominated points f 2 (x) y I : Ideal point y N : Nadir point f 1 (x) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

5 Optimality Concept Definition x X efficient : x X : f (x) f (x ) : x X i [p] : f i (x) f i (x ) f (x) f (x ) y Y = f (X ) nondominated : y = f (x ), x efficient X E : Set of efficient solutions Y N : Set of nondominated points f 2 (x) y I : Ideal point y N : Nadir point y N y I f 1 (x) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

6 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

7 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice, Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

8 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice,... consist of infinitely many points, Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

9 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice,... consist of infinitely many points,... grow exponentially in the input size of the problem. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

10 Motivation General goal: Compute the nondominated set Y N (and present it to the decision maker)! But: Y N may... be very large in practice,... consist of infinitely many points,... grow exponentially in the input size of the problem. compute representation of Y N, i. e., an appropriate substitute for the nondominated set. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

11 Representative System Definition (Representative System) For some MOP with outcome set Y, we call a finite approximation Rep Y representative system and its elements representative points. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

12 Representative System Definition (Representative System) For some MOP with outcome set Y, we call a finite approximation Rep Y representative system and its elements representative points. What is a good representative system? Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

13 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

14 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep b) Uniformity: min z ẑ. z,ẑ Rep z ẑ Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

15 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep b) Uniformity: min z ẑ. z,ẑ Rep z ẑ c) Cardinality: Rep. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

16 Quality Measures Definition (Sayin 2000, Ruzika 2007) a) Coverage error: max min z y. y Y N z Rep b) Uniformity: min z ẑ. z,ẑ Rep z ẑ c) Cardinality: Rep. d) Representation error: max z Rep min y Y N y z. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

17 Some Literature using Boxes for MOPs Boxes / rectangles / cuboids... are frequently used in multiple objective programming: Laumans et al. (2006), Dhaenens et al. (2010), Kirlik and Sayin (2014): exact nondominated set by fixing one objective and projecting the others; grid-based structure; ε-constraint method. Dächert and Klamroth (2013): Improvement of splitting of boxes + generic algorithm; ε-constraint or Tchebycheff method Boland et al. (2014): Partition of projected search space by L-shapes and rectangles; 3-objective integer problems; experimental quality assessment. + several other approaches, e. g. in evolutionary algorithms. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

18 Our Contribution Goal: Simple algorithm for computing a representative system with desired coverage error for MOPs with p = 3 objectives with the capability of relating the run time of the algorithm to the quality of the representative system. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

19 Our Contribution Goal: Simple algorithm for computing a representative system with desired coverage error for MOPs with p = 3 objectives with the capability of relating the run time of the algorithm to the quality of the representative system. Idea: Extending the Box-Algorithm of [Hamacher et al. 2007] to the case of three objective functions Hamacher, Pedersen, Ruzika Finding representative sytems for discrete bicriterion optimization problems Operations Research Letters 35(3): , 2007 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

20 Short Review of the Box-Algorithm (2D) f2 f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

21 Short Review of the Box-Algorithm (2D) f2 f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

22 Short Review of the Box-Algorithm (2D) y N f2 y I f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

23 Short Review of the Box-Algorithm (2D) y N f2 y I ε f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

24 Short Review of the Box-Algorithm (2D) y N f2 y I ε f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

25 Short Review of the Box-Algorithm (2D) f2 f 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

26 Box-Algorithm for MOPs with Three Objectives Initialization (MOP) min (f 1 (x), f 2 (x), f 3 (x)) s. t. x X R n Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

27 Box-Algorithm for MOPs with Three Objectives Initialization (MOP) min (f 1 (x), f 2 (x), f 3 (x)) s. t. x X R n Definition Let l, u R 3 with l u. We refer to the cuboid B(l, u) := l + R 3 u R3 = {y R3 l y u} as the box defined by l and u. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

28 Box-Algorithm for MOPs with Three Objectives Initialization (MOP) min (f 1 (x), f 2 (x), f 3 (x)) s. t. x X R n Definition Let l, u R 3 with l u. We refer to the cuboid B(l, u) := l + R 3 u R3 = {y R3 l y u} as the box defined by l and u. Lemma Let l 0 y I R 3 and let u0 y N + R 3. Then Y N B(l 0, u 0 ). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

29 Update Step Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Then, we define the lexicographic ε-constraint scalarizations with lower bounds (P 1 ε 1,ε 2 ), (P 2 ε 1,ε 3 ), and (P 3 ε 2,ε 3 ) as (P 1 ε 1,ε 2 ) lex min (f 3 (x), f 2 (x), f 1 (x)) s. t. x X l 1 f 1 (x) ε 1 l 2 f 2 (x) ε 2 l 3 f 3 (x) ( u 3 ) =: f (x) B(l, u)(ε 1,ε 2,u 3 ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

30 Update Step Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Then, we define the lexicographic ε-constraint scalarizations with lower bounds (P 1 ε 1,ε 2 ), (P 2 ε 1,ε 3 ), and (P 3 ε 2,ε 3 ) as (P 1 ε 1,ε 2 ) lex min (f 3 (x), f 2 (x), f 1 (x)) and, analogously, s. t. x X l 1 f 1 (x) ε 1 l 2 f 2 (x) ε 2 l 3 f 3 (x) ( u 3 ) =: f (x) B(l, u)(ε 1,ε 2,u 3 ) (P 2 ε 1,ε 3 ) lex min (f 2(x), f 1(x), f 3(x)) s. t. x X f (x) B(l, u) (ε 1,u 2,ε 3 ) (P 3 ε 2,ε 3 ) lex min (f 1(x), f 3(x), f 2(x)) s. t. x X f (x) B(l, u) (u 1,ε 2,ε 3 ). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

31 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

32 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Proof. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

33 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Proof. B(z, u) is dominated by z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

34 Update Step Proposition Let z be the image under f of an optimal solution of (Pε 1 1,ε 2 ). Then, there does not exist a y Y N \ {z } such that ( y B(z, u) B l, (ε 1, ε 2, z3 ) ) \ B ((l 1, z2, z3 ), (z1, ε 2, z3 ) ) Proof. B(z, u) is dominated by z A nondominated point in B ( l, (ε 1, ε 2, z 3 ) ) \ B ( (l 1, z 2, z 3 ), (z 1, ε 2, z 3 ) ) contradicts optimality of z for (P 1 ε 1,ε 2 ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

35 Update Step Example: Consider an initial box with l = 0 and u = (12, 10, 10). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

36 Update Step Example: Solve (P 1 ε 1,ε 2 ) with ε 1 = 6 and ε 2 = 5. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

37 Update Step Example: Optimal solution with image z = (2, 3, 4) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

38 Update Step Example: Optimal solution with image z = (2, 3, 4) Cut-off Regions (see first proposition): B ( (2, 3, 4), (12, 10, 10) ) und B ( 0, (6, 5, 4) ) \ B ( (0, 3, 4), (2, 5, 4) ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

39 Update Step Example: Optimal solution with image z = (2, 3, 4) Cut-off Regions (see first proposition): B ( (2, 3, 4), (12, 10, 10) ) und B ( 0, (6, 5, 4) ) \ B ( (0, 3, 4), (2, 5, 4) ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

40 Update Step Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Suppose (P 1 ε 1,ε 2 ) is solved. Then, the four quarters of the current box B(l, u) are defined as ε 1 Q 1,1 := B l, ε 2, u 3 ε 1 u 1 Q 1,2 := B l 2, ε 2, l 3 u 3 ε 1 Q 1,3 := B ε 2, u, l 3 l 1 ε 1 Q 1,4 := B ε 2, u 2. l 3 u 3 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

41 Definition Let l, u R 3, l u and let ε i = l i + u i l i 2 for i = 1, 2, 3. Suppose (Pε 1 1,ε 2 ) is solved and let z R 3 denote the image under f of an optimal solution for (Pε 1 1,ε 2 ). Then, the subdivision of the current box B(l, u) consists of the boxes l 1 z 1 B 1,1 := B z2, ε 2, z3 u 3 ε 1 u 1 B 1,3 := B l 2, ε 2, l 3 z3 ε 1 u 1 B 1,5 := B ε 2, u 2, l 3 z3 l 1 l 1 ε 1 B 1,2 := B l 2, z z3 2 u 3 ε 1 u 1 B 1,4 := B l 2, z z3 2 u 3 B 1,7 := B ε 2, u 2 z3 u 3 l 1 ε 1 B 1,6 := B ε 2, u 2 l 3 z3 z 1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

42 Properties of the Subdivision Lemma 7 Y N B(l, u) i=1 B 1,i Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

43 Properties of the Subdivision Lemma 7 Y N B(l, u) i=1 B 1,i Proof. Follows directly from previous proposition. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

44 Properties of the Subdivision Lemma 7 Y N B(l, u) i=1 B 1,i Proof. Follows directly from previous proposition. Observation Vol(B 1,i ) 1 Vol(B(l, u)) 4 Moreover, for each of the quarters Q 1,1, Q 1,2 and Q 1,3, we can find two pairs of boxes for which the combined volume fulfills this formula. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

45 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

46 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

47 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

48 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B lex + (ε 1 l 1, ε 2 l 2, 0) ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

49 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B lex + (ε 1 l 1, ε 2 l 2, 0) ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B ( (ε 1, ε 2, l 3 ), (u 1, u 2, z 3 ) )) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

50 Properties of the Subdivision Lemma 7 Vol(B 1,i ) 3 Vol(B(l, u)) 4 i=1 Proof. B lex := B ( l, (ε 1, ε 2, z 3 ) ) and B dom := B (z, u) are cut off with Vol(B lex ) + Vol(B dom ) Vol(B lex ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B lex + (ε 1 l 1, ε 2 l 2, 0) ) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B ( (ε 1, ε 2, l 3 ), (u 1, u 2, z 3 ) )) + Vol ( B ( (ε 1, ε 2, z 3 ), u )) = Vol ( B ( (ε 1, ε 2, l 3 ), u )) = Vol(Q 1,3 ) = 1 Vol(B(l, u)) 4 Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

51 Correctness Algorithm 1 Box-Algorithm for three objectives Require: MOP with three objectives, δ C > 0 Ensure: Rep representative system with coverage error at most δ C 1: S := {InitialBox()} 2: while S do 3: B := B(l, u) := SelectBox(S) 4: if l u δ C then 5: Use (Pu 1 1,u 2 ) to search for a representative point in B 6: else 7: Determine the 2 longest edges of B 8: Solve (P.,.), j j {1, 2, 3}, dividing these 2 edges 9: Add optimal outcome z to Rep 10: for i {1,..., 7} do 11: Add B j,i to S Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

52 Correctness Algorithm 1 Box-Algorithm for three objectives Require: MOP with three objectives, δ C > 0 Ensure: Rep representative system with coverage error at most δ C 1: S := {InitialBox()} 2: while S do 3: B := B(l, u) := SelectBox(S) 4: if l u δ C then 5: Use (Pu 1 1,u 2 ) to search for a representative point in B 6: else 7: Determine the 2 longest edges of B 8: Solve (P.,.), j j {1, 2, 3}, dividing these 2 edges 9: Add optimal outcome z to Rep 10: for i {1,..., 7} do 11: Add B j,i to S Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

53 Correctness Theorem Algorithm 1 terminates in finitely many steps. It outputs a collection of boxes containing all nondominated points. The representative system Rep has a coverage error of at most( δ C (w. r. t. ). More precisely, the ( ) ) L 2 log2 (7) algorithm performs at most O δ C many iterations, where L is the distance of the corner points of the initial box B(l 0, u 0 ), i.e., L := l 0 u 0. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

54 Correctness Theorem Algorithm 1 terminates in finitely many steps. It outputs a collection of boxes containing all nondominated points. The representative system Rep has a coverage error of at most( δ C (w. r. t. ). More precisely, the ( ) ) L 2 log2 (7) algorithm performs at most O δ C many iterations, where L is the distance of the corner points of the initial box B(l 0, u 0 ), i.e., L := l 0 u 0. Proof. see our paper... Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

55 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

56 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Proof. Let y Y N. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

57 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Proof. Let y Y N. Coverage property: z Rep with y z δ C which implies z (δ C, δ C, δ C ) y. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

58 Correctness Corollary Let Rep be a representative system with coverage error less than or equal to δ C (w. r. t. ) and let Rep N denote all points of Rep which are not dominated by any other point in this set. Then it is ( Y N Rep N (δ C, δ C, δ C ) ) + R 3. Proof. Let y Y N. Coverage property: z Rep with y z δ C which implies z (δ C, δ C, δ C ) y. If z Rep N, then there exists ẑ Rep N with ẑ z. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

59 Selection Rule max-dist selection rule Corollary Let SelectBox() always select the box with largest corner point distance. Suppose the algorithm is aborted prematurely after Γ 1 iterations and for all remaining boxes B S, we additionally execute a completion step. Then, the representative system Rep has a coverage error of at most L 2 (log 7 (6Γ+1))/2, where L equals the corner point distance l 0 u 0 of the initial box B(l 0, u 0 ). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

60 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

61 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Idea: Do not select the box with maximal distance, but the box which cannot be dominated in a future iteration. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

62 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Idea: Do not select the box with maximal distance, but the box which cannot be dominated in a future iteration. Store the list of unexplored boxes in analogy to a tree, where we perform a depth first search (DFS). Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

63 Selection Rule nondominated selection rule Problem: Generation of (in a later step) dominated solutions. Idea: Do not select the box with maximal distance, but the box which cannot be dominated in a future iteration. Store the list of unexplored boxes in analogy to a tree, where we perform a depth first search (DFS). Result: By appropriately cutting off dominated parts of (partial) dominated boxes during the algorithm, we obtain a representative system Rep = Rep N fulfilling the desired accuracy. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

64 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

65 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm The representation error max z Rep min y Y N z y can be positive. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

66 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm The representation error max z Rep min y Y N z y can be positive. Suppose representative system Rep has coverage error at most δ C w. r. t. some norm. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

67 Bounding the Representation Error Rep Y N is not guaranteed in the algorithm The representation error max z Rep min y Y N z y can be positive. Suppose representative system Rep has coverage error at most δ C w. r. t. some norm. Definition Let B be the last subdivision (covering the whole set Y N ) obtained from Algorithm 1. Let z Rep and B(z) B be the set containing either the box for which z was computed or the corresponding child boxes contained in the corresponding quarter of the box for which z was computed. Then, we define B z := { B B : B ( z R 3 ) B B(z) }. If Bz, we call z a critical representative point. Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

68 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds (B z = ) = (z Y N ) Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

69 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds Proposition min max max z Rep B(l,u) B (B z = ) = (z Y N ) max min z y z Rep y Y N z Rep B z z l z, max z ẑ + δ C δ C (z R3 ) max ẑ B Rep where B Rep (z R 3 δ C ) := { y Rep : ỹ z R 3 y ỹ } δc and max l z returns the value 0 if B(l,u) B Bz =. z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

70 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds Proposition min max max z Rep B(l,u) B (B z = ) = (z Y N ) max min z y z Rep y Y N z Rep B z z l z, max z ẑ + δ C δ C (z R3 ) max ẑ B Rep where B Rep (z R 3 δ C ) := { y Rep : ỹ z R 3 y ỹ } δc and max l z returns the value 0 if B(l,u) B Bz =. z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

71 Bounding the Representation Error Lemma For MOP, let (Rep, B) be the output of Algorithm 1 and z Rep be some representative point. Then, it holds Proposition min max max z Rep B(l,u) B (B z = ) = (z Y N ) max min z y z Rep y Y N z Rep B z z l z, max z ẑ + δ C δ C (z R3 ) max ẑ B Rep where B Rep (z R 3 δ C ) := { y Rep : ỹ z R 3 y ỹ } δc and max l z returns the value 0 if B(l,u) B Bz =. z Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

72 Conclusion Box algorithm for computing representative sets for MOPs with p = 3 objectives easy to implement with desired coverage error with the capability of relating the run time of the algorithm to the quality of the representative system with different selection rules representative points are not necessarily nondominated but bound on representation error Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

73 Conclusion Box algorithm for computing representative sets for MOPs with p = 3 objectives easy to implement with desired coverage error with the capability of relating the run time of the algorithm to the quality of the representative system with different selection rules representative points are not necessarily nondominated but bound on representation error Thank you for your attention! Tobias Kuhn (TU Kaiserslautern) Triobjective Box-Algorithm Lancaster, June 24, / 26

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization

Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization Jochen Gorski Kathrin Klamroth Stefan Ruzika Abstract Connectedness of efficient solutions is a powerful property in

More information

Technische Universität Ilmenau Institut für Mathematik

Technische Universität Ilmenau Institut für Mathematik Technische Universität Ilmenau Institut für Mathematik Preprint No. M 18/03 A branch-and-bound based algorithm for nonconvex multiobjective optimization Julia Niebling, Gabriele Eichfelder Februar 018

More information

Online Computation of Abelian Runs

Online Computation of Abelian Runs Online Computation of Abelian Runs Gabriele Fici 1, Thierry Lecroq 2, Arnaud Lefebvre 2, and Élise Prieur-Gaston2 1 Dipartimento di Matematica e Informatica, Università di Palermo, Italy Gabriele.Fici@unipa.it

More information

Approximate Map Labeling. is in (n log n) Frank Wagner* B 93{18. December Abstract

Approximate Map Labeling. is in (n log n) Frank Wagner* B 93{18. December Abstract SERIE B INFORMATIK Approximate Map Labeling is in (n log n) Frank Wagner* B 93{18 December 1993 Abstract Given n real numbers, the -CLOSENESS problem consists in deciding whether any two of them are within

More information

Unranked Tree Automata with Sibling Equalities and Disequalities

Unranked Tree Automata with Sibling Equalities and Disequalities Unranked Tree Automata with Sibling Equalities and Disequalities Wong Karianto Christof Löding Lehrstuhl für Informatik 7, RWTH Aachen, Germany 34th International Colloquium, ICALP 2007 Xu Gao (NFS) Unranked

More information

A Parametric Simplex Algorithm for Linear Vector Optimization Problems

A Parametric Simplex Algorithm for Linear Vector Optimization Problems A Parametric Simplex Algorithm for Linear Vector Optimization Problems Birgit Rudloff Firdevs Ulus Robert Vanderbei July 9, 2015 Abstract In this paper, a parametric simplex algorithm for solving linear

More information

A differential intermediate value theorem

A differential intermediate value theorem A differential intermediate value theorem by Joris van der Hoeven Dépt. de Mathématiques (Bât. 425) Université Paris-Sud 91405 Orsay Cedex France June 2000 Abstract Let T be the field of grid-based transseries

More information

Connectedness of Efficient Solutions in Multiple. Objective Combinatorial Optimization

Connectedness of Efficient Solutions in Multiple. Objective Combinatorial Optimization Connectedness of Efficient Solutions in Multiple Objective Combinatorial Optimization Jochen Gorski Kathrin Klamroth Stefan Ruzika Communicated by H. Benson Abstract Connectedness of efficient solutions

More information

Minmax Tree Cover in the Euclidean Space

Minmax Tree Cover in the Euclidean Space Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 3, pp. 345 371 (2011) Minmax Tree Cover in the Euclidean Space Seigo Karakawa 1 Ehab Morsy 1 Hiroshi Nagamochi 1 1 Department

More information

arxiv: v1 [cs.dm] 26 Apr 2010

arxiv: v1 [cs.dm] 26 Apr 2010 A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs George B. Mertzios Derek G. Corneil arxiv:1004.4560v1 [cs.dm] 26 Apr 2010 Abstract Given a graph G, the longest path

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 411 (010) 417 44 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: wwwelseviercom/locate/tcs Resource allocation with time intervals

More information

Fault-Tolerant Consensus

Fault-Tolerant Consensus Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process

More information

arxiv: v1 [math.oc] 23 Jan 2017

arxiv: v1 [math.oc] 23 Jan 2017 Multi-objective minmax robust combinatorial optimization with cardinality-constrained uncertainty Andrea Raith a, Marie Schmidt b, Anita Schöbel c, and Lisa Thom c,* arxiv:1701.06317v1 [math.oc] 23 Jan

More information

Math Models of OR: Branch-and-Bound

Math Models of OR: Branch-and-Bound Math Models of OR: Branch-and-Bound John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA November 2018 Mitchell Branch-and-Bound 1 / 15 Branch-and-Bound Outline 1 Branch-and-Bound

More information

Committee Selection with a Weight Constraint Based on Lexicographic Rankings of Individuals

Committee Selection with a Weight Constraint Based on Lexicographic Rankings of Individuals Committee Selection with a Weight Constraint Based on Lexicographic Rankings of Individuals Christian Klamler 1, Ulrich Pferschy 2, and Stefan Ruzika 3 1 University of Graz, Institute of Public Economics,

More information

Integer Programming Duality in Multiple Objective Programming

Integer Programming Duality in Multiple Objective Programming Integer Programming Duality in Multiple Objective Programming Kathrin Klamroth 1 Jørgen Tind 1 Sibylle Zust 2 03.07.2003 Abstract The weighted sums approach for linear and convex multiple criteria optimization

More information

Artificial Intelligence. Non-deterministic state model. Model for non-deterministic problems. Solutions. Blai Bonet

Artificial Intelligence. Non-deterministic state model. Model for non-deterministic problems. Solutions. Blai Bonet Artificial Intelligence Blai Bonet Non-deterministic state model Universidad Simón Boĺıvar, Caracas, Venezuela Model for non-deterministic problems Solutions State models with non-deterministic actions

More information

Worst case analysis for a general class of on-line lot-sizing heuristics

Worst case analysis for a general class of on-line lot-sizing heuristics Worst case analysis for a general class of on-line lot-sizing heuristics Wilco van den Heuvel a, Albert P.M. Wagelmans a a Econometric Institute and Erasmus Research Institute of Management, Erasmus University

More information

Diskrete Mathematik Solution 6

Diskrete Mathematik Solution 6 ETH Zürich, D-INFK HS 2018, 30. October 2018 Prof. Ueli Maurer Marta Mularczyk Diskrete Mathematik Solution 6 6.1 Partial Order Relations a) i) 11 and 12 are incomparable, since 11 12 and 12 11. ii) 4

More information

Some Results Concerning Uniqueness of Triangle Sequences

Some Results Concerning Uniqueness of Triangle Sequences Some Results Concerning Uniqueness of Triangle Sequences T. Cheslack-Postava A. Diesl M. Lepinski A. Schuyler August 12 1999 Abstract In this paper we will begin by reviewing the triangle iteration. We

More information

Unavoidable subtrees

Unavoidable subtrees Unavoidable subtrees Maria Axenovich and Georg Osang July 5, 2012 Abstract Let T k be a family of all k-vertex trees. For T T k and a tree T, we write T T if T contains at least one of the trees from T

More information

Further discussion of Turing machines

Further discussion of Turing machines Further discussion of Turing machines In this lecture we will discuss various aspects of decidable and Turing-recognizable languages that were not mentioned in previous lectures. In particular, we will

More information

On the Existence of Ideal Solutions in Multi-objective 0-1 Integer Programs

On the Existence of Ideal Solutions in Multi-objective 0-1 Integer Programs On the Existence of Ideal Solutions in Multi-objective -1 Integer Programs Natashia Boland a, Hadi Charkhgard b, and Martin Savelsbergh a a School of Industrial and Systems Engineering, Georgia Institute

More information

A fast algorithm to generate necklaces with xed content

A fast algorithm to generate necklaces with xed content Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,

More information

Distributed Optimization. Song Chong EE, KAIST

Distributed Optimization. Song Chong EE, KAIST Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links

More information

Computing Efficient Solutions of Nonconvex Multi-Objective Problems via Scalarization

Computing Efficient Solutions of Nonconvex Multi-Objective Problems via Scalarization Computing Efficient Solutions of Nonconvex Multi-Objective Problems via Scalarization REFAIL KASIMBEYLI Izmir University of Economics Department of Industrial Systems Engineering Sakarya Caddesi 156, 35330

More information

arxiv: v1 [math.co] 25 Apr 2018

arxiv: v1 [math.co] 25 Apr 2018 Nyldon words arxiv:1804.09735v1 [math.co] 25 Apr 2018 Émilie Charlier Department of Mathematics University of Liège Allée de la Découverte 12 4000 Liège, Belgium echarlier@uliege.be Manon Stipulanti Department

More information

CS 336. We use the principle of inclusion and exclusion. Let B. = {five digit decimal numbers ending with a 5}, and

CS 336. We use the principle of inclusion and exclusion. Let B. = {five digit decimal numbers ending with a 5}, and CS 336 1. The important issue is the logic you used to arrive at your answer. 2. Use extra paper to determine your solutions then neatly transcribe them onto these sheets. 3. Do not submit the scratch

More information

Lexicographic Choice under Variable Capacity Constraints

Lexicographic Choice under Variable Capacity Constraints Lexicographic Choice under Variable Capacity Constraints Battal Doğan Serhat Doğan Kemal Yıldız May 14, 2017 Abstract In several matching markets, in order to achieve diversity, agents priorities are allowed

More information

recent developments of approximation theory and greedy algorithms

recent developments of approximation theory and greedy algorithms recent developments of approximation theory and greedy algorithms Peter Binev Department of Mathematics and Interdisciplinary Mathematics Institute University of South Carolina Reduced Order Modeling in

More information

Game Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano

Game Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Game Theory Albert-Ludwigs-Universität Freiburg Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Research Group Foundations of Artificial Intelligence June 17, 2013 June 17, 2013

More information

Extensive Form Games I

Extensive Form Games I Extensive Form Games I Definition of Extensive Form Game a finite game tree X with nodes x X nodes are partially ordered and have a single root (minimal element) terminal nodes are z Z (maximal elements)

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization 2017-2018 1 Maximum matching on bipartite graphs Given a graph G = (V, E), find a maximum cardinal matching. 1.1 Direct algorithms Theorem 1.1 (Petersen, 1891) A matching M is

More information

Two-Player Kidney Exchange Game

Two-Player Kidney Exchange Game Two-Player Kidney Exchange Game Margarida Carvalho INESC TEC and Faculdade de Ciências da Universidade do Porto, Portugal margarida.carvalho@dcc.fc.up.pt Andrea Lodi DEI, University of Bologna, Italy andrea.lodi@unibo.it

More information

Maximising the number of induced cycles in a graph

Maximising the number of induced cycles in a graph Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Discrete Optimization 23

Discrete Optimization 23 Discrete Optimization 23 2 Total Unimodularity (TU) and Its Applications In this section we will discuss the total unimodularity theory and its applications to flows in networks. 2.1 Total Unimodularity:

More information

An exponentially graded mesh for singularly perturbed problems

An exponentially graded mesh for singularly perturbed problems An exponentially graded mesh for singularly perturbed problems Christos Xenophontos Department of Mathematics and Statistics University of Cyprus joint work with P. Constantinou (UCY), S. Franz (TU Dresden)

More information

Advanced Automata Theory 7 Automatic Functions

Advanced Automata Theory 7 Automatic Functions Advanced Automata Theory 7 Automatic Functions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory

More information

arxiv: v2 [math.co] 17 Mar 2014

arxiv: v2 [math.co] 17 Mar 2014 A BIJECTION BETWEEN IRREDUCIBLE k-shapes THE SURJECTIVE PISTOLS OF HEIGHT k 1 ANGE BIGENI arxiv:1402.1383v2 [math.co] 17 Mar 2014 Abstract. This paper constructs a bijection between irreducible k-shapes

More information

A new ILS algorithm for parallel machine scheduling problems

A new ILS algorithm for parallel machine scheduling problems J Intell Manuf (2006) 17:609 619 DOI 10.1007/s10845-006-0032-2 A new ILS algorithm for parallel machine scheduling problems Lixin Tang Jiaxiang Luo Received: April 2005 / Accepted: January 2006 Springer

More information

Generating epsilon-efficient solutions in multiobjective programming

Generating epsilon-efficient solutions in multiobjective programming DEPARTMENT OF MATHEMATICAL SCIENCES Clemson University, South Carolina, USA Technical Report TR2005 10 EWb Generating epsilon-efficient solutions in multiobjective programming A. Engau and M. M. Wiecek

More information

Banach Spaces from Barriers in High Dimensional Ellentuck Spaces

Banach Spaces from Barriers in High Dimensional Ellentuck Spaces Banach Spaces from Barriers in High Dimensional Ellentuck Spaces A. ARIAS N. DOBRINEN G. GIRÓN-GARNICA J. G. MIJARES Two new hierarchies of Banach spaces T k (d, θ) and T(A k d, θ), k any positive integer,

More information

Algorithms and Theory of Computation. Lecture 11: Network Flow

Algorithms and Theory of Computation. Lecture 11: Network Flow Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a

More information

A Brøndsted-Rockafellar Theorem for Diagonal Subdifferential Operators

A Brøndsted-Rockafellar Theorem for Diagonal Subdifferential Operators A Brøndsted-Rockafellar Theorem for Diagonal Subdifferential Operators Radu Ioan Boţ Ernö Robert Csetnek April 23, 2012 Dedicated to Jon Borwein on the occasion of his 60th birthday Abstract. In this note

More information

M. Marques Alves Marina Geremia. November 30, 2017

M. Marques Alves Marina Geremia. November 30, 2017 Iteration complexity of an inexact Douglas-Rachford method and of a Douglas-Rachford-Tseng s F-B four-operator splitting method for solving monotone inclusions M. Marques Alves Marina Geremia November

More information

SGN Advanced Signal Processing Project bonus: Sparse model estimation

SGN Advanced Signal Processing Project bonus: Sparse model estimation SGN 21006 Advanced Signal Processing Project bonus: Sparse model estimation Ioan Tabus Department of Signal Processing Tampere University of Technology Finland 1 / 12 Sparse models Initial problem: solve

More information

Game Theory Lecture 10+11: Knowledge

Game Theory Lecture 10+11: Knowledge Game Theory Lecture 10+11: Knowledge Christoph Schottmüller University of Copenhagen November 13 and 20, 2014 1 / 36 Outline 1 (Common) Knowledge The hat game A model of knowledge Common knowledge Agree

More information

Section 6 Fault-Tolerant Consensus

Section 6 Fault-Tolerant Consensus Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.

More information

COMP/MATH 300 Topics for Spring 2017 June 5, Review and Regular Languages

COMP/MATH 300 Topics for Spring 2017 June 5, Review and Regular Languages COMP/MATH 300 Topics for Spring 2017 June 5, 2017 Review and Regular Languages Exam I I. Introductory and review information from Chapter 0 II. Problems and Languages A. Computable problems can be expressed

More information

Lecture notes for Analysis of Algorithms : Markov decision processes

Lecture notes for Analysis of Algorithms : Markov decision processes Lecture notes for Analysis of Algorithms : Markov decision processes Lecturer: Thomas Dueholm Hansen June 6, 013 Abstract We give an introduction to infinite-horizon Markov decision processes (MDPs) with

More information

CMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017

CMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017 CMSC CMSC : Lecture Greedy Algorithms for Scheduling Tuesday, Sep 9, 0 Reading: Sects.. and. of KT. (Not covered in DPV.) Interval Scheduling: We continue our discussion of greedy algorithms with a number

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

3.10 Lagrangian relaxation

3.10 Lagrangian relaxation 3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the

More information

Equivalences of Extensive Forms with Perfect Recall

Equivalences of Extensive Forms with Perfect Recall Equivalences of Extensive Forms with Perfect Recall Carlos Alós-Ferrer and Klaus Ritzberger University of Cologne and Royal Holloway, University of London, 1 and VGSF 1 as of Aug. 1, 2016 1 Introduction

More information

Automata-based Verification - III

Automata-based Verification - III COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata

More information

Static-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Static-priority Scheduling

Static-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Static-priority Scheduling CSCE 990: Real-Time Systems Static-Priority Scheduling Steve Goddard goddard@cse.unl.edu http://www.cse.unl.edu/~goddard/courses/realtimesystems Static-priority Scheduling Real-Time Systems Static-Priority

More information

The Simplex and Policy Iteration Methods are Strongly Polynomial for the Markov Decision Problem with Fixed Discount

The Simplex and Policy Iteration Methods are Strongly Polynomial for the Markov Decision Problem with Fixed Discount The Simplex and Policy Iteration Methods are Strongly Polynomial for the Markov Decision Problem with Fixed Discount Yinyu Ye Department of Management Science and Engineering and Institute of Computational

More information

Realization Plans for Extensive Form Games without Perfect Recall

Realization Plans for Extensive Form Games without Perfect Recall Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in

More information

Complex numbers, the exponential function, and factorization over C

Complex numbers, the exponential function, and factorization over C Complex numbers, the exponential function, and factorization over C 1 Complex Numbers Recall that for every non-zero real number x, its square x 2 = x x is always positive. Consequently, R does not contain

More information

A strongly polynomial algorithm for linear systems having a binary solution

A strongly polynomial algorithm for linear systems having a binary solution A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th

More information

Ring Sums, Bridges and Fundamental Sets

Ring Sums, Bridges and Fundamental Sets 1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G

More information

Implicit Enumeration for Representation Systems in Multi-objective Optimisation

Implicit Enumeration for Representation Systems in Multi-objective Optimisation Master s Degree in Informatics Engineering Dissertation Implicit Enumeration for Representation Systems in Multi-objective Optimisation September, 2015 Alexandre Daniel Borges de Jesus ajesus@student.dei.uc.pt

More information

On NP-Completeness for Linear Machines

On NP-Completeness for Linear Machines JOURNAL OF COMPLEXITY 13, 259 271 (1997) ARTICLE NO. CM970444 On NP-Completeness for Linear Machines Christine Gaßner* Institut für Mathematik und Informatik, Ernst-Moritz-Arndt-Universität, F.-L.-Jahn-Strasse

More information

CSC 2414 Lattices in Computer Science September 27, Lecture 4. An Efficient Algorithm for Integer Programming in constant dimensions

CSC 2414 Lattices in Computer Science September 27, Lecture 4. An Efficient Algorithm for Integer Programming in constant dimensions CSC 2414 Lattices in Computer Science September 27, 2011 Lecture 4 Lecturer: Vinod Vaikuntanathan Scribe: Wesley George Topics covered this lecture: SV P CV P Approximating CVP: Babai s Nearest Plane Algorithm

More information

Chapter 7 Network Flow Problems, I

Chapter 7 Network Flow Problems, I Chapter 7 Network Flow Problems, I Network flow problems are the most frequently solved linear programming problems. They include as special cases, the assignment, transportation, maximum flow, and shortest

More information

Part V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows

Part V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows Matching Input: undirected graph G = (V, E). M E is a matching if each node appears in at most one Part V edge in M. Maximum Matching: find a matching of maximum cardinality Matchings Ernst Mayr, Harald

More information

On simulations and bisimulations of general flow systems

On simulations and bisimulations of general flow systems On simulations and bisimulations of general flow systems Jen Davoren Department of Electrical & Electronic Engineering The University of Melbourne, AUSTRALIA and Paulo Tabuada Department of Electrical

More information

Theory of Computation

Theory of Computation Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 3: Finite State Automata Motivation In the previous lecture we learned how to formalize

More information

Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE

Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 55, NO. 9, SEPTEMBER 2010 1987 Distributed Randomized Algorithms for the PageRank Computation Hideaki Ishii, Member, IEEE, and Roberto Tempo, Fellow, IEEE Abstract

More information

Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki

Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing Toshio Suzui Osaa Prefecture University Saai, Osaa 599-8531, Japan suzui@mi.cias.osaafu-u.ac.jp

More information

A Brief Introduction to Multiobjective Optimization Techniques

A Brief Introduction to Multiobjective Optimization Techniques Università di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni A Brief Introduction to Multiobjective Optimization Techniques Maurizio Palesi Maurizio Palesi [mpalesi@diit.unict.it]

More information

On the BMS Algorithm

On the BMS Algorithm On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of

More information

Section Notes 9. IP: Cutting Planes. Applied Math 121. Week of April 12, 2010

Section Notes 9. IP: Cutting Planes. Applied Math 121. Week of April 12, 2010 Section Notes 9 IP: Cutting Planes Applied Math 121 Week of April 12, 2010 Goals for the week understand what a strong formulations is. be familiar with the cutting planes algorithm and the types of cuts

More information

Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems

Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems Yongjia Song James R. Luedtke August 9, 2012 Abstract We study solution approaches for the design of reliably

More information

Proof. We indicate by α, β (finite or not) the end-points of I and call

Proof. We indicate by α, β (finite or not) the end-points of I and call C.6 Continuous functions Pag. 111 Proof of Corollary 4.25 Corollary 4.25 Let f be continuous on the interval I and suppose it admits non-zero its (finite or infinite) that are different in sign for x tending

More information

McCreight's suffix tree construction algorithm

McCreight's suffix tree construction algorithm McCreight's suffix tree construction algorithm b 2 $baa $ 5 $ $ba 6 3 a b 4 $ aab$ 1 Motivation Recall: the suffix tree is an extremely useful data structure with space usage and construction time in O(n).

More information

Multiple Criteria Optimization: Some Introductory Topics

Multiple Criteria Optimization: Some Introductory Topics Multiple Criteria Optimization: Some Introductory Topics Ralph E. Steuer Department of Banking & Finance University of Georgia Athens, Georgia 30602-6253 USA Finland 2010 1 rsteuer@uga.edu Finland 2010

More information

CHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES

CHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES 27 CHAPTER 3 ANALYSIS OF RELIABILITY AND PROBABILITY MEASURES 3.1 INTRODUCTION The express purpose of this research is to assimilate reliability and its associated probabilistic variables into the Unit

More information

Linear fractional multi-objective optimization problems subject to fuzzy relational equations with the max-average composition

Linear fractional multi-objective optimization problems subject to fuzzy relational equations with the max-average composition Applied and Computational Mathematics 2015; 4(1-2): 20-30 Published online February 6, 2015 (http://www.sciencepublishinggroup.com/j/acm) doi: 10.11648/j.acm.s.2015040102.15 ISSN: 2328-5605 (Print); ISSN:

More information

Statistics and learning: Big Data

Statistics and learning: Big Data Statistics and learning: Big Data Learning Decision Trees and an Introduction to Boosting Sébastien Gadat Toulouse School of Economics February 2017 S. Gadat (TSE) SAD 2013 1 / 30 Keywords Decision trees

More information

Assignment #1 Sample Solutions

Assignment #1 Sample Solutions CS 320L Applied Discrete Mathematics Spring 2018 Instructor: Marc Pomplun Assignment #1 Sample Solutions Question 1: Hair Splitting with Set Expressions Let us define the successor of the set A to be the

More information

Algorithm Robust For The Bicriteria Discrete Optimization Problem

Algorithm Robust For The Bicriteria Discrete Optimization Problem Algorithm Robust For The Bicriteria Discrete Optimization Problem Department of Mathematics University of Kaiserslautern 21.05.07 Example from Electrical Engineering Example from Electrical Engineering

More information

An accelerated non-euclidean hybrid proximal extragradient-type algorithm for convex concave saddle-point problems

An accelerated non-euclidean hybrid proximal extragradient-type algorithm for convex concave saddle-point problems Optimization Methods and Software ISSN: 1055-6788 (Print) 1029-4937 (Online) Journal homepage: http://www.tandfonline.com/loi/goms20 An accelerated non-euclidean hybrid proximal extragradient-type algorithm

More information

r/lt.i Ml s." ifcr ' W ATI II. The fnncrnl.icniccs of Mr*. John We mil uppn our tcpiiblicnn rcprc Died.

r/lt.i Ml s. ifcr ' W ATI II. The fnncrnl.icniccs of Mr*. John We mil uppn our tcpiiblicnn rcprc Died. $ / / - (\ \ - ) # -/ ( - ( [ & - - - - \ - - ( - - - - & - ( ( / - ( \) Q & - - { Q ( - & - ( & q \ ( - ) Q - - # & - - - & - - - $ - 6 - & # - - - & -- - - - & 9 & q - / \ / - - - -)- - ( - - 9 - - -

More information

On Semicontinuity of Convex-valued Multifunctions and Cesari s Property (Q)

On Semicontinuity of Convex-valued Multifunctions and Cesari s Property (Q) On Semicontinuity of Convex-valued Multifunctions and Cesari s Property (Q) Andreas Löhne May 2, 2005 (last update: November 22, 2005) Abstract We investigate two types of semicontinuity for set-valued

More information

Semi-Simultaneous Flows and Binary Constrained (Integer) Linear Programs

Semi-Simultaneous Flows and Binary Constrained (Integer) Linear Programs DEPARTMENT OF MATHEMATICAL SCIENCES Clemson University, South Carolina, USA Technical Report TR2006 07 EH Semi-Simultaneous Flows and Binary Constrained (Integer Linear Programs A. Engau and H. W. Hamacher

More information

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding

SIGNAL COMPRESSION Lecture Shannon-Fano-Elias Codes and Arithmetic Coding SIGNAL COMPRESSION Lecture 3 4.9.2007 Shannon-Fano-Elias Codes and Arithmetic Coding 1 Shannon-Fano-Elias Coding We discuss how to encode the symbols {a 1, a 2,..., a m }, knowing their probabilities,

More information

Set-based Min-max and Min-min Robustness for Multi-objective Robust Optimization

Set-based Min-max and Min-min Robustness for Multi-objective Robust Optimization Proceedings of the 2017 Industrial and Systems Engineering Research Conference K. Coperich, E. Cudney, H. Nembhard, eds. Set-based Min-max and Min-min Robustness for Multi-objective Robust Optimization

More information

The max flow problem. Ford-Fulkerson method. A cut. Lemma Corollary Max Flow Min Cut Theorem. Max Flow Min Cut Theorem

The max flow problem. Ford-Fulkerson method. A cut. Lemma Corollary Max Flow Min Cut Theorem. Max Flow Min Cut Theorem The max flow problem Ford-Fulkerson method 7 11 Ford-Fulkerson(G) f = 0 while( simple path p from s to t in G f ) 10-2 2 1 f := f + f p output f 4 9 1 2 A cut Lemma 26. + Corollary 26.6 Let f be a flow

More information

Matchings in hypergraphs of large minimum degree

Matchings in hypergraphs of large minimum degree Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains

More information

MIDAS: A Mixed Integer Dynamic Approximation Scheme

MIDAS: A Mixed Integer Dynamic Approximation Scheme MIDAS: A Mixed Integer Dynamic Approximation Scheme Andy Philpott, Faisal Wahid, Frédéric Bonnans May 7, 2016 Abstract Mixed Integer Dynamic Approximation Scheme (MIDAS) is a new sampling-based algorithm

More information

Ch. 10 Vector Quantization. Advantages & Design

Ch. 10 Vector Quantization. Advantages & Design Ch. 10 Vector Quantization Advantages & Design 1 Advantages of VQ There are (at least) 3 main characteristics of VQ that help it outperform SQ: 1. Exploit Correlation within vectors 2. Exploit Shape Flexibility

More information