A Branch and Price Algorithm for a Stackelberg Security Game

Total Page:16

File Type:pdf, Size:1020Kb

A Branch and Price Algorithm for a Stackelberg Security Game Computers & Industrial Engineering 111 (2017) 216–227 Contents lists available at ScienceDirect Computers & Industrial Engineering journal homepage: www.elsevier.com/locate/caie A branch and price algorithm for a Stackelberg Security Game ⇑ Felipe Lagos a, Fernando Ordóñez b, , Martine Labbé c,d a Georgia Institute of Technology, United States b Universidad de Chile, Chile c Université Libre de Bruxelles, Belgium d INRIA, Lille, France article info abstract Article history: Mixed integer optimization formulations are an attractive alternative to solve Stackelberg Game prob- Received 14 June 2017 lems thanks to the efficiency of state of the art mixed integer algorithms. In particular, decomposition Received in revised form 26 June 2017 algorithms, such as branch and price methods, make it possible to tackle instances large enough to rep- Accepted 28 June 2017 resent games inspired in real world domians. Available online 29 June 2017 In this work we focus on Stackelberg Games that arise from a security application and investigate the use of a new branch and price method to solve its mixed integer optimization formulation. We prove that Keywords: the algorithm provides upper and lower bounds on the optimal solution at every iteration and investigate Column generation the use of stabilization heuristics. Our preliminary computational results compare this solution approach Stackelberg games Security with previous decomposition methods obtained from alternative integer programming formulations of Stackelberg games. Ó 2017 Published by Elsevier Ltd. 1. Introduction to attack. Such Stackelberg Security Game models have been used in the deployment of decision support systems with specialized Stackelberg games model the strategic interaction between algorithms in real security domain applications (Jain et al., 2010; players, where one participant – the leader – is able to commit Pita, Tambe, Kiekintveld, Cullen, & Steigerwald, 2011; Shieh et al., to a strategy first, knowing that the remaining players – the follow- 2012). ers – will take this strategy into account and respond in an optimal Recent work has developed efficient integer optimization solu- manner. These games have been used to represent markets in tion algorithms for different variants of the SSGs (Hochbaum, Lyu, which a participant has significant market share and can commit & Ordóñez, 2014; Jain, Kardes, Kiekintveld, Ordóñez, & Tambe, to a strategy (von Stackelberg, Bazin, Hill, & Urch, 2010), where 2010; Jain, Kiekintveld, & Tambe, 2011; Jain et al., 2011; government decides tolls or capacities in a transportation network Kiekintveld et al., 2009). In general terms these optimization prob- (Labbé, Marcotte, & Savard, 1998), and of late have been used to lems are formulated with the defender committing to a mixed represent the attacker-defender interaction in security domains (randomized) strategy and the attacker(s) responding with a pure (Jain et al., 2010). These games are examples of bilevel optimiza- strategy after conducting surveillance of the defender’s mixed tion problems, which are in general non convex optimization prob- strategy. A mixed strategy refers to a probability distribution over lems that are difficult to solve. the possible actions while a pure strategy corresponds to selecting In this work we focus on a specific class of Stackelberg games one of the possible actions. In this SSG, the defender mixed strate- which we refer to as Stackelberg Security Games (SSG) that arise gies are probability distributions over possible patrolling strate- in security domains and have a particular payoff structure (Yin, gies, while the attacker’s pure strategy corresponds to selecting a Korzhyk, Kiekintveld, Conitzer, & Tambe, 2010). In a SSG, the secu- specific target to attack. In addition, the number of actions of the rity (or defender) behaves as the leader selecting a patrolling strat- defender can be exponential in size, with respect to the targets egy first and then, possibly many attackers act as the follower, and defense resources, due to the combinatorics of using N observing the defender’s patrolling strategy and deciding where resources to patrol m targets. This illustrates that to solve SSGs we have to address mixed integer optimization problems with ⇑ exponential number of variables. Addressing the combinatorial Corresponding author. size of defender strategies has led to both development of branch E-mail addresses: [email protected] (F. Ordóñez), [email protected] (M. Labbé). and price methods (Kiekintveld et al., 2009) and constraint gener- http://dx.doi.org/10.1016/j.cie.2017.06.034 0360-8352/Ó 2017 Published by Elsevier Ltd. F. Lagos et al. / Computers & Industrial Engineering 111 (2017) 216–227 217 ation methods (Yang, Jiang, Tambe, & Ordóñez, 2013). There are, follower will choose an optimal response and will break ties in favor however, problem instances that arise from real security applica- of the leader. In other words, following the formal definition of a tions that still challenge existing solution methods. Here we inves- SSE in Kiekintveld et al. (2009), a pair of strategies x and h tigate a new branch and price method developed for a novel ðq ðxÞÞh2H form a SSE if they satisfy: formulation of Stackelberg games (MIPSG), introduced in Casorrán-Amilburu, Fortz, Labbé, and Ordóñez (2017). This new ; h P 1. The leader (defender) maximizes utility: uDðx ðq ðxÞÞh2HÞ formulation has been shown to provide tighter linear relaxations 0; h 0 0 uDðx ðq ðx ÞÞh2HÞ for any feasible x than other existing mixed integer formulations and to give the con- h ; h P 2. The followers (attackers) play a best response: uAðx q ðxÞÞ vex hull of the feasible integer solutions when there is only one h u ðx; gÞfor any feasible g. follower. A 3. The follower breaks ties in favor of the leader: We begin by introducing notation and describing the integer u ðx; ðqhðxÞÞ Þ P u ðx; ðqhÞ Þ for any ðqhÞ that is optimal optimization formulations that have been considered previously D h2H D h2H h2H for the followers, that is for any h; qh 2 argmax uh ðx; gÞ. in the next section. We also introduce the equivalent MIPSG for- g A mulation. In Section 3 we present the column generation algorithm for the solution of the linear relaxation of MIPSG, along with a This can be formulated as the following bilevel optimization speed up that can be obtained by aggregating subproblems, and problem, where e is the vector of all ones of appropriate the existence of upper and lower bounds at every iteration. We dimension: also describe the branching strategies used in adapting this column ; h max uDðx ðq Þh2HÞ generation to a Branch and Price method and how to apply dual s:t: eT x ¼ 1; x P 0 stabilization techniques. We present our preliminary computa- h h ; T ; P h H: tional results in Section 4 and provide concluding remarks in q ¼ argmaxgfuAðx gÞje g ¼ 1 g 0g 2 Section 5. Given that the inner optimization problem is a linear optimization problem over the jQj dimensional simplex, there always exists an 2. Integer optimization formulations of SSG optimal pure-strategy response for the attacker, so in the integer optimization formulations we present now we restrict our attention In a Stackelberg security game we consider that the leader is the to the set of pure strategies for the attacker. As we see below, the defender and the attacker (of possibly many types) is the follower. optimality condition of the inner optimization problem can be We let H be the set of possible attacker types and assume that ph expressed with linear constraints and integer variables when we corresponds to a known a priori probability distribution that the make use of the fact that the followers respond with an optimal defender is facing an attacker of type h 2 H. The attacker may pure strategy. Although this leads to being able to use efficient decide to attack any one of a set of targets Q. The mixed strategy mixed integer optimization solution procedures, the problem for the hth attacker is the vector of probabilities over this set of tar- remains theoretically difficult as the problem of choosing the opti- gets, which we denote as qh ¼ðqhÞ . The defender allocates up to mal strategy for the leader to commit to in a Bayesian Stackelberg j j2Q game is NP-hard (Conitzer & Sandholm, 2006). N resources to protect targets, with N < jQj. Each resource can be The payoffs for agents depend only on the target attacked, the assigned to a patrol that protects multiple targets, s # Q, so the # adversary type and whether or not a defender resource is covering set of feasible patrols for one resource is a set S PðQÞ, where h PðQÞ represents the power set of Q. The defender’s pure strategies, the target. Let the parameter Rdj denote the defender’s utility, or or joint patrols, are combinations of up to N such patrols, one for reward, if j 2 Q is attacked by adversary h 2 H when it is covered each available resource. In addition we assume that in a joint by a defender resource. If j 2 Q is not covered, the defender patrol a target is covered by at most one resource. Let X denote h receives a penalty Pdj . Likewise, the attacker’s utilities are denoted the set of joint patrols, or defender strategies. A joint patrol i 2 X, h by a reward Raj when target j is attacked and not covered and pen- jQj can be represented by the vector a ¼½a ; a ; ...; a 2f0; 1g h i i1 i2 ijQj alty Pa , when j is attacked while protected. Therefore if we let j 2 i where a represents whether or not target j is covered in strategy j ij denote when target j 2 Q is protected by patrol i 2 X, then we con- i.
Recommended publications
  • A Branch-And-Price Approach with Milp Formulation to Modularity Density Maximization on Graphs
    A BRANCH-AND-PRICE APPROACH WITH MILP FORMULATION TO MODULARITY DENSITY MAXIMIZATION ON GRAPHS KEISUKE SATO Signalling and Transport Information Technology Division, Railway Technical Research Institute. 2-8-38 Hikari-cho, Kokubunji-shi, Tokyo 185-8540, Japan YOICHI IZUNAGA Information Systems Research Division, The Institute of Behavioral Sciences. 2-9 Ichigayahonmura-cho, Shinjyuku-ku, Tokyo 162-0845, Japan Abstract. For clustering of an undirected graph, this paper presents an exact algorithm for the maximization of modularity density, a more complicated criterion to overcome drawbacks of the well-known modularity. The problem can be interpreted as the set-partitioning problem, which reminds us of its integer linear programming (ILP) formulation. We provide a branch-and-price framework for solving this ILP, or column generation combined with branch-and-bound. Above all, we formulate the column gen- eration subproblem to be solved repeatedly as a simpler mixed integer linear programming (MILP) problem. Acceleration tech- niques called the set-packing relaxation and the multiple-cutting- planes-at-a-time combined with the MILP formulation enable us to optimize the modularity density for famous test instances in- cluding ones with over 100 vertices in around four minutes by a PC. Our solution method is deterministic and the computation time is not affected by any stochastic behavior. For one of them, column generation at the root node of the branch-and-bound tree arXiv:1705.02961v3 [cs.SI] 27 Jun 2017 provides a fractional upper bound solution and our algorithm finds an integral optimal solution after branching. E-mail addresses: (Keisuke Sato) [email protected], (Yoichi Izunaga) [email protected].
    [Show full text]
  • Optimal Placement by Branch-And-Price
    Optimal Placement by Branch-and-Price Pradeep Ramachandaran1 Ameya R. Agnihotri2 Satoshi Ono2;3;4 Purushothaman Damodaran1 Krishnaswami Srihari1 Patrick H. Madden2;4 SUNY Binghamton SSIE1 and CSD2 FAIS3 University of Kitakyushu4 Abstract— Circuit placement has a large impact on all aspects groups of up to 36 elements. The B&P approach is based of performance; speed, power consumption, reliability, and cost on column generation techniques and B&B. B&P has been are all affected by the physical locations of interconnected applied to solve large instances of well known NP-Complete transistors. The placement problem is NP-Complete for even simple metrics. problems such as the Vehicle Routing Problem [7]. In this paper, we apply techniques developed by the Operations We have tested our approach on benchmarks with known Research (OR) community to the placement problem. Using optimal configurations, and also on problems extracted from an Integer Programming (IP) formulation and by applying a the “final” placements of a number of recent tools (Feng Shui “branch-and-price” approach, we are able to optimally solve 2.0, Dragon 3.01, and mPL 3.0). We find that suboptimality is placement problems that are an order of magnitude larger than those addressed by traditional methods. Our results show that rampant: for optimization windows of nine elements, roughly suboptimality is rampant on the small scale, and that there is half of the test cases are suboptimal. As we scale towards merit in increasing the size of optimization windows used in detail windows with thirtysix elements, we find that roughly 85% of placement.
    [Show full text]
  • Branch-And-Bound Experiments in Convex Nonlinear Integer Programming
    Noname manuscript No. (will be inserted by the editor) More Branch-and-Bound Experiments in Convex Nonlinear Integer Programming Pierre Bonami · Jon Lee · Sven Leyffer · Andreas W¨achter September 29, 2011 Abstract Branch-and-Bound (B&B) is perhaps the most fundamental algorithm for the global solution of convex Mixed-Integer Nonlinear Programming (MINLP) prob- lems. It is well-known that carrying out branching in a non-simplistic manner can greatly enhance the practicality of B&B in the context of Mixed-Integer Linear Pro- gramming (MILP). No detailed study of branching has heretofore been carried out for MINLP, In this paper, we study and identify useful sophisticated branching methods for MINLP. 1 Introduction Branch-and-Bound (B&B) was proposed by Land and Doig [26] as a solution method for MILP (Mixed-Integer Linear Programming) problems, though the term was actually coined by Little et al. [32], shortly thereafter. Early work was summarized in [27]. Dakin [14] modified the branching to how we commonly know it now and proposed its extension to convex MINLPs (Mixed-Integer Nonlinear Programming problems); that is, MINLP problems for which the continuous relaxation is a convex program. Though a very useful backbone for ever-more-sophisticated algorithms (e.g., Branch- and-Cut, Branch-and-Price, etc.), the basic B&B algorithm is very elementary. How- Pierre Bonami LIF, Universit´ede Marseille, 163 Av de Luminy, 13288 Marseille, France E-mail: [email protected] Jon Lee Department of Industrial and Operations Engineering, University
    [Show full text]
  • Generic Branch-Cut-And-Price
    Generic Branch-Cut-and-Price Diplomarbeit bei PD Dr. M. L¨ubbecke vorgelegt von Gerald Gamrath 1 Fachbereich Mathematik der Technischen Universit¨atBerlin Berlin, 16. M¨arz2010 1Konrad-Zuse-Zentrum f¨urInformationstechnik Berlin, [email protected] 2 Contents Acknowledgments iii 1 Introduction 1 1.1 Definitions . .3 1.2 A Brief History of Branch-and-Price . .6 2 Dantzig-Wolfe Decomposition for MIPs 9 2.1 The Convexification Approach . 11 2.2 The Discretization Approach . 13 2.3 Quality of the Relaxation . 21 3 Extending SCIP to a Generic Branch-Cut-and-Price Solver 25 3.1 SCIP|a MIP Solver . 25 3.2 GCG|a Generic Branch-Cut-and-Price Solver . 27 3.3 Computational Environment . 35 4 Solving the Master Problem 39 4.1 Basics in Column Generation . 39 4.1.1 Reduced Cost Pricing . 42 4.1.2 Farkas Pricing . 43 4.1.3 Finiteness and Correctness . 44 4.2 Solving the Dantzig-Wolfe Master Problem . 45 4.3 Implementation Details . 48 4.3.1 Farkas Pricing . 49 4.3.2 Reduced Cost Pricing . 52 4.3.3 Making Use of Bounds . 54 4.4 Computational Results . 58 4.4.1 Farkas Pricing . 59 4.4.2 Reduced Cost Pricing . 65 5 Branching 71 5.1 Branching on Original Variables . 73 5.2 Branching on Variables of the Extended Problem . 77 5.3 Branching on Aggregated Variables . 78 5.4 Ryan and Foster Branching . 79 i ii Contents 5.5 Other Branching Rules . 82 5.6 Implementation Details . 85 5.6.1 Branching on Original Variables . 87 5.6.2 Ryan and Foster Branching .
    [Show full text]
  • A Branch and Price Approach to the K-Clustering Minimum Biclique Completion Problem
    A Branch and Price Approach to the k-Clustering Minimum Biclique Completion Problem Stefano Gualandia,1, Francesco Maffiolib, Claudio Magnic aDipartimento di Matematica, Universit`adegli Studi di Pavia, Via Ferrata 1, 27100, Pavia, Italy bPolitecnico di Milano, Dipartimento di Elettronica e Informazione, Piazza Leonardo da Vinci 32, 20133 Milano, Italy cMax Planck Institute for Computer Science, Department 1: Algorithms and Complexity, Campus E1 4, 66123 Saarbr¨ucken, Germany Abstract Given a bipartite graph G = (S, T, E), we consider the problem of finding k bipartite subgraphs, called ”clusters”, such that each vertex i of S appears in exactly one of them, every vertex j of T appears in each cluster in which at least one of its neighbors appears, and the total number of edges needed to make each cluster complete (i.e., to become a biclique) is minimized. This problem is known as k-clustering Minimum Biclique Completion Problem and has been shown strongly NP-hard. It has applications in bundling channels for multicast transmissions. Given a set of demands of services from clients, the application consists of finding k multicast sessions that partition the set of demands. Each service has to belong to a single multicast session, while each client can appear in more sessions. We extend previous work by developing a Branch and Price algorithm that embeds a new metaheuristic based on Variable Neighborhood Infeasible Search and a non-trivial branching rule. The metaheuristic is also adapted to solve efficiently the pricing subproblem. In addition to the random instances used in the literature, we present structured instances generated using the MovieLens data set collected by the GroupLens Research Project.
    [Show full text]
  • Branch-And-Price: Column Generation for Solving Huge Integer Programs ,Y
    BranchandPrice Column Generation for y Solving Huge Integer Programs Cynthia Barnhart Ellis L Johnson George L Nemhauser Martin WPSavelsb ergh Pamela H Vance School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta GA Abstract We discuss formulations of integer programs with a huge number of variables and their solution by column generation metho ds ie implicit pricing of nonbasic variables to generate new columns or to prove LP optimality at a no de of the branch andb ound tree We present classes of mo dels for whichthisapproach decomp oses the problem provides tighter LP relaxations and eliminates symmetryWethen discuss computational issues and implementation of column generation branchand b ound algorithms including sp ecial branching rules and ecientways to solvethe LP relaxation February Revised May Revised January Intro duction The successful solution of largescale mixed integer programming MIP problems re quires formulations whose linear programming LP relaxations give a go o d approxima Currently at MIT Currently at Auburn University This research has b een supp orted by the following grants and contracts NSF SES NSF and AFORS DDM NSF DDM NSF DMI and IBM MHV y An abbreviated and unrefereed version of this pap er app eared in Barnhart et al tion to the convex hull of feasible solutions In the last decade a great deal of attention has b een given to the branchandcut approach to solving MIPs Homan and Padb erg and Nemhauser and Wolsey give general exp ositions of this metho dology The basic
    [Show full text]
  • A Branch-And-Price Algorithm for Combined Location and Routing Problems Under Capacity Restrictions
    A Branch-and-Price Algorithm for Combined Location and Routing Problems Under Capacity Restrictions Z. Akca ∗ R.T. Berger † T.K Ralphs ‡ September 17, 2008 Abstract We investigate the problem of simultaneously determining the location of facilities and the design of vehicle routes to serve customer demands under vehicle and facility capacity restrictions. We present a set-partitioning-based formulation of the problem and study the relationship between this formulation and the graph-based formulations that have been used in previous studies of this problem. We describe a branch-and-price algorithm based on the set-partitioning formulation and discuss computational experi- ence with both exact and heuristic variants of this algorithm. 1 Introduction The design of a distribution system begins with the questions of where to locate the facilities and how to allo- cate customers to the selected facilities. These questions can be answered using location-allocation models, which are based on the assumption that customers are served individually on out-and-back routes. How- ever, when customers have demands that are less-than-truckload and thus can receive service from routes making multiple stops, the assumption of individual routes will not accurately capture the transportation cost. Therefore, the integration of location-allocation and routing decisions may yield more accurate and cost-effective solutions. In this paper, we investigate the so-called location and routing problem (LRP). Given a set of candidate facility locations and a set of customer locations, the objective of the LRP is to determine the number and location of facilities and construct a set of vehicle routes from facilities to customers in such a way as to minimize total system cost.
    [Show full text]
  • A Branch and Price Algorithm for a Stackelberg Security Game
    A Branch and Price Algorithm for a Stackelberg Security Game Felipe Lagosa, Fernando Ord´o~nezb, Martine Labb´ec aGeorgia Institute of Technology bUniversidad de Chile, [email protected], corresponding author cUniversit´eLibre de Bruxelles, [email protected] Abstract Mixed integer optimization formulations are an attractive alternative to solve Stackelberg Game problems thanks to the efficiency of state of the art mixed integer algorithms. In particular, decomposition algorithms, such as branch and price methods, make it possible to tackle instances large enough to represent games inspired in real world domians. In this work we focus on Stackelberg Games that arise from a security application and investigate the use of a new branch and price method to solve its mixed integer optimization formulation. We prove that the algorithm provides upper and lower bounds on the optimal solution at every iteration and investigate the use of stabilization heuristics. Our preliminary computational results compare this solution approach with previous decomposition methods obtained from alternative integer programming formulations of Stackelberg games. 1. Introduction Stackelberg games model the strategic interaction between players, where one participant { the leader { is able to commit to a strategy first, knowing that the remaining players { the followers { will take this strategy into account and respond in an optimal manner. These games have been used to represent markets in which a participant has significant market share and can commit to a strategy [19], where government decides tolls or capacities in a transportation network [11], and of late have been used to represent the attacker-defender interaction in security domains [9].
    [Show full text]
  • A Branch-And-Price Algorithm for Bin Packing Problem
    A BRANCH-AND-PRICE ALGORITHM FOR BIN PACKING PROBLEM MASOUD ATAEI A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE GRADUATE PROGRAM IN APPLIED AND INDUSTRIAL MATHEMATICS YORK UNIVERSITY TORONTO, ONTARIO August 2015 © Masoud Ataei, 2015 Abstract Bin Packing Problem examines the minimum number of identical bins needed to pack a set of items of various sizes. Employing branch-and-bound and column generation usually requires designation of the problem-specific branching rules compatible with the nature of the pricing sub-problem of column generation, or alternatively it requires determination of the k-best solutions of knapsack problem at level kth of the tree. Instead, we present a new approach to deal with the pricing sub-problem of column generation which handles two- dimensional knapsack problems. Furthermore, a set of new upper bounds for Bin Packing Problem is introduced in this work which employs solutions of the continuous relaxation of the set-covering formulation of Bin Packing Problem. These high quality upper bounds are computed inexpensively and dominate the ones generated by state-of-the-art methods. Keywords: Bin Packing Problem, Branch-and-Bound, Column Generation. ii To my parents iii Acknowledgments I would like to express my deep sense of appreciation to my supervisor, Dr. Michael Chen. Had it not been for his invaluable guidance and tremendous support, I would not be able to surmount all obstacles laid in the path of research. His flexibility and dedication allowed me to explore different areas of Operational Research that caught my interest while keeping in sight my road map and final goals.
    [Show full text]
  • Mathematical Models and Decomposition Algorithms for Cutting and Packing Problems
    Alma Mater Studiorum - Universit`adi Bologna Dottorato di Ricerca in Automatica e Ricerca Operativa Ciclo XXIX Settore concorsuale di afferenza: 01/A6 - RICERCA OPERATIVA Settore scientifico disciplinare: MAT/09 - RICERCA OPERATIVA Mathematical Models and Decomposition Algorithms for Cutting and Packing Problems Presentata da Maxence Delorme Coordinatore Dottorato Relatore Prof. Daniele Vigo Prof. Silvano Martello Co-relatore Prof. Manuel Iori Esame finale anno 2017 Contents Acknowledgments v 1 Introduction 1 2 BPP and CSP: Mathematical Models and Exact Algorithms 7 2.1 Introduction.................................... 7 2.2 Formalstatement................................. 10 2.3 Upperandlowerbounds............................. 11 2.3.1 Approximation algorithms . 12 2.3.2 Lowerbounds............................... 13 2.3.3 Heuristics and metaheuristics . 15 2.4 Pseudo-polynomial formulations . ...... 17 2.4.1 ConsiderationsonthebasicILPmodel. 17 2.4.2 One-cutformulation ........................... 19 2.4.3 DP-flowformulation ........................... 21 2.4.4 Arc-flowformulations . .. .. .. .. .. .. .. 23 2.5 Enumerationalgorithms . 24 2.5.1 Branch-and-bound ............................ 24 2.5.2 Constraint programming approaches . 26 2.6 Branch-and-price ................................ 26 2.6.1 Set covering formulation and column generation . ...... 26 2.6.2 Integerround-upproperty. 29 2.6.3 Branch(-and-cut)-and-price algorithms . ....... 30 2.7 Experimentalevaluation . 33 2.7.1 Benchmarks................................ 33 2.7.2 Computercodes
    [Show full text]
  • B6.3 Integer Programming
    Course Organisation What is integer programming? Introductory Examples B6.3 Integer Programming Raphael Hauser Mathematical Institute University Of Oxford MT 2018 R. Hauser B6.3 Integer Programming Course Organisation What is integer programming? Introductory Examples 1 Course Organisation 2 What is integer programming? 3 Introductory Examples R. Hauser B6.3 Integer Programming Course Organisation What is integer programming? Introductory Examples Course Organisation Lectures Mon 14:00–15:00 Lecture Room L1 Thu 12:00–13:00, Lecture Room L3 Problem Sheets and Classes 6 problem sheets, classes in Weeks 3–7 of MT, and Week 1 of HT. R. Hauser B6.3 Integer Programming Course Organisation What is integer programming? Introductory Examples Class Details Class 1: Dr Ebrahim Patel & Mr Zhen Shao Tuesdays, 11 am - 12 pm, Week 3 (C3), Week 4 (C5), Week 5 (C3), Week 6 (C5), Week 7 (C5), Week 1, HT (C4) Hand in written work by: Fridays, 10 am, Week before class Class 2: Prof Raphael Hauser & Mr Julien Vaes Wed 9:00-10:00, Weeks 3-7 of MT (C5) and Week 1 of HT (place to be confirmed) Hand in written work by: Mon 12 noon Class 3: Prof Raphael Hauser & Mr Jonathan Grant-Peters Thu 9:00-10:00, Week 3 MT (C4), Weeks 4-7 MT (L5), and Week 1 of HT (place to be confirmed) Hand in written work by: Tue 12 noon R. Hauser B6.3 Integer Programming Course Organisation What is integer programming? Introductory Examples What is integer programming? Integer Programming concerns the mathematical analysis of and design of algorithms for optimisation problems of the following forms.
    [Show full text]
  • Branch-And-Cut and Branch-And-Cut-And-Price Algorithms for Solving Vehicle Routing Problems
    Downloaded from orbit.dtu.dk on: Oct 05, 2021 Branch-and-cut and Branch-and-Cut-and-Price Algorithms for Solving Vehicle Routing Problems Jepsen, Mads Kehlet Publication date: 2011 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Jepsen, M. K. (2011). Branch-and-cut and Branch-and-Cut-and-Price Algorithms for Solving Vehicle Routing Problems. Technical University of Denmark. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. PHD Thesis Branch-and-cut and Branch-and-Cut-and-Price Algorithms for Solving Vehicle Routing Problems Author: Mads Kehlet Jepsen Supervisor: Professor David Pisinger min cexe e E X2 s:t: x = 2 i V e 8 2 c e δ(i) 2X x = 2 K e j j e δ(0) 2X x 2r(S) S V ; S 2 e ≥ 8 ⊆ c j j ≥ e δ(S) 2X x 0; 1; 2 e δ(0) e 2 f g 8 2 x 0; 1 e E δ(0) e 2 f g 8 2 n min cpλp p P X2 s.t α λ = 1 i V ijp p 8 2 c p P (i;j) δ+(i) X2 X2 λ 0; 1 p P p 2 f g 8 2 min c x p y e e − i i e E i N X2 X2 x = 2y i V e i 8 2 e δ(i) 2X y0 = 1 x 2y i S; S V ; S 2 e ≥ i 8 2 8 ⊆ c j j ≥ e δ(S) 2X d y Q i i ≤ i N X2 x 0; 1 e E e 2 f g 8 2 y 0; 1 i V: i 2 f g 8 2 8.
    [Show full text]