Lectures on Integer Programming

Total Page:16

File Type:pdf, Size:1020Kb

Lectures on Integer Programming Lectures on Integer Programming L.E. Trotter, Jr. School of OR&IE Cornell University Ithaca, New York 14853 June 16, 2004 Abstract Lecture notes for the “Doctoral School in Discrete Systems Optimization,” E.P.F.- Lausanne, June 2004. This material stresses fundamental aspects of geometry and duality for Integer Programming. 1 Linear Spaces n We generally deal with IR = x = (x1,...,xn) : xj IR j , the n dimensional eu- clidean vector space over the reals{ IR. Sometimes attention∈ is restricted∀ } to−Qn, the rational n vectors. Familiarity with manipulation of vectors and matrices is assumed, but we review the− formal properties of vector spaces, stressing the manner in which the theory of linear equality systems extends naturally to linear inequality systems. Subspaces As a vector space, IRn must obey certain axioms. First, IRn is an abelian group with respect to (vector) addition: there is a zero element 0 = (0,..., 0) IRn, each element has an ∈ inverse, and vector addition is associative and commutative. 0+ a = a, a IRn ∀ ∈ n a +( a)=0, a IR (a + b)+ c = a +(− b + c), ∀ a,∈ b, c IRn a + b = b + a, ∀ a, b ∈IRn ∀ ∈ Next, IRn satisfies IR-module properties governing the action of IR on IRn via (scalar) mul- tiplication: there is a unit scalar 1 IR, scalar multiplication is associative, and scalar multiplication distributes over (both vector∈ and scalar) addition. 1a = a, a IRn ∀ ∈ n λ(µa)=(λµ)a, a IR ; λ,µ IR λ(a + b)= λa + λb, ∀ a,∈ b IRn∀; λ ∈IR ∀ ∈ n ∀ ∈ (λ + µ)a = λa + µa, a IR ; λ,µ IR ∀ ∈ ∀ ∈ Finally, IRn is closed with respect to vector addition and scalar multiplication. a + λb IRn, a, b IRn; λ IR ∈ ∀ ∈ ∀ ∈ Exercise 1.1 Show that the closure condition is equivalent to the requirement: λ a + + λ a IRn, m 1; λ ,...,λ IR; a ,...,a IRn. 2 1 1 ··· m m ∈ ∀ ≥ ∀ 1 m ∈ ∀ 1 m ∈ n The expression λ1a1 + +λmam is a linear combination of the ai. Any subset of IR obeying the above stipulations,··· i.e., containing 0 and closed under linear combinations, is a subspace. As with a1,...,am in the exercise, we often index the vectors in a set, denoting (ai)j, the jth component of ai, simply by aij. Moreover, when the set is finite, say A = a1,...,am , A may be identified with the m n matrix A IRm×n, whose ith row is (a ,...,a{ ); thus} × ∈ i1 in we write ai A to mean that ai is the ith row of matrix A. Whether we choose to view A as a set or as∈ a matrix (an ordered set of vectors) will always be clear from context. When matrix–vector products are involved, it will also be clear from context whether row or column vectors are intended, enabling us (usually) to avoid the use of transpose notation. 1 When all λi = 0, the linear combination λ1a1 + + λmam is trivial; otherwise, it is nontriv- ial. Of course, the result of the trivial linear combination··· is just the zero vector. And when 0 results from a nontrivial linear combination, the a1,...,am are linearly dependent. This terminology extends to sets: S IRn is linearly dependent when some finite subset, consist- ing of distinct elements of S, satisfies⊆ a linear dependence relation λ a + + λ a = 0. 1 1 ··· m m Similarly, a / S is linearly dependent on S provided a and otherwise only (distinct) members of S satisfy a∈ linear dependence relation in which the coefficient of a is nonzero; of course, we may scale so that the coefficient of a is 1 and then, provided S = , rewrite the dependence − 6 ∅ relation as an equation expressing a as a linear combination of members of S. The linear span of S IRn is L(S)= S a IRn : a is linearly dependent on S ; when T S L(T ), we say that⊆ T spans S. In particular,∪{ ∈ observe that L( )= 0 , as 0 is} linearly dependent⊆ ⊆ on ∅ { } any set, even ; thus is not a subspace. ∅ ∅ Exercise 1.2 Show that: (i) S T L(S) L(T ); (ii) S⊆ L(⇒S); ⊆ (iii) L⊆(L(S)) = L(S); (iv) S = L(S) S is a subspace. 2 ⇔ For any S IRn, it follows from the exercise that L(S) is a subspace containing S; we say that L(S) is⊆ the subspace generated by S. On the other hand, the intersection of all subspaces containing S, or equivalently, the unique minimal subspace containing S, is called the linear hull of S. Now when T is a subspace and T S, (i) and (iv) imply L(S) L(T )= T , and ⊇ ⊆ consequently L(S) also gives the linear hull of S. Thus we have two ways to think about any subspace: an interior (generator) description provided by the linear span and an exterior (constraint) description in terms of the linear hull. Below we turn these dual geometric descriptions into finite and equivalent representations for any subspace. Finite Generator Representations For matrix A, L(A) is finitely generated by the rows of A; in this case L(A) is called the row space of A. Exercise 1.3 Consider the following elementary row operations on rows ai, ak of matrix A: (i) interchange a a ; i ↔ k (ii) replace a a + a ; k ← k i (iii) replace ai λai, 0 = λ IR. Show that these operations← leave6 ∈ the row space of A unchanged. 2 We now show that every subspace has a finite set of generators. Any set of vectors which is not linearly dependent is linearly independent; in particular, the empty set is linearly ∅ independent. 2 m Proposition 1.4 Let a0 = i=1 λiai, with a1,...,am linearly independent. Then: (i) the λi are unique; P (ii) a :0 i = k is linearly independent λ =0; { i ≤ 6 } ⇔ k 6 (iii) L( a ,...,a )= L( a :0 i = k λ =0. { 1 m} { i ≤ 6 } ⇔ k 6 Proof: (i) If a = m λ a = m µ a , then 0= a a = m (λ µ )a . 0 i=1 i i i=1 i i 0 − 0 i=1 i − i i Thus linear independence of a ,...,a implies λ µ =0 i; hence λ = µ i. P P1 m i − i ∀P i i ∀ (ii) λk =0 0= a0 + i6=k λiai ai :0 i = k linearly dependent. For the converse,⇒ −a :0 i = k linearly⇒{ dependent≤ 6 } µ a = 0, and some µ = 0. { i ≤P 6 } ⇒ 0≤i6=k i i i 6 Moreover, µ0 = 0, since a1,...,am are linearly independent.P Thus a = 6 ( µ /µ )a = m λ a , so part (i) implies λ = 0. 0 1≤i6=k − i 0 i i=1 i i k (iii) First note that a L( a ,...,a ), hence L( a ,...,a )= L( a ,...,a ). P 0 ∈ { 1 P m} { 0 m} { 1 m} Now λk =0 ak = (1/λk)a0 1≤i6=k(λi/λk)ai ak L( ai : i = k )= L( a0,...,am ). If λ = 0,6 then⇒ a L( a :1 − i = k )= L( a :0⇒ i∈= k {). 6 } { } k 0 ∈ { i ≤ P6 } { i ≤ 6 } But linear independence of a ,...,a a L( a :1 i = k ) = L( a ,...,a ). 2 1 m ⇒ k 6∈ { i ≤ 6 } 6 { 1 m} Proposition 1.5 For subspace S, with a ,...,a = A S and b ,...,b = B S, { 1 m} ⊆ { 1 n} ⊆ if A is linearly independent and B spans S, then m n. ≤ Proof: Considering the a sequentially for 1 i m, if a B, we do nothing. i ≤ ≤ i ∈ If a B, then a L(B), so a = n λ b with b : λ =0 linearly independent. i 6∈ i ∈ i j=1 j j { j j 6 } For some λj = 0, we must have bj P a1,...,am , and we replace bj ai in B. Proposition 1.46 implies that this replacement6∈ { does} not change L(B)=←S. After m steps, a ,...,a b ,...,b and it follows that m n. 2 { 1 m}⊆{ 1 n} ≤ Thus the maximum number of linearly independent elements of a subspace is no larger than the minimum number of its elements needed to span. Since the unit vectors e1,...,en (i.e., n eij = 1 for i = j and eij = 0 for i = j) span IR , any linearly independent set of vectors in IRn, say a ,...,a , must satisfy6 m n. { 1 m} ≤ Exercise 1.6 For A IRm×n with m < n, show that Ax =0 has a solution x =0. 2 ∈ { } 6 A basis for a subspace S is a maximal linearly independent subset of S, i.e., a linearly independent set that is properly contained in no linearly independent subset of S. If B is a basis for S, then L(B) L(S) = S by (1.2), and maximality of B with respect to ⊆ linear independence implies that every other element of S is linearly dependent on B, hence S L(B). Thus L(B)= S; i.e., B spans S. Since a basis is both independent and spanning, we⊆ are able to strengthen the max-min relation observed following Proposition 1.5 above: in any subspace, the maximum size of an independent set equals the minimum size of a spanning set. Moreover, if B1 and B2 are bases, then B1 B2 , since B1 is independent and B2 is spanning; symmetrically, B B . It therefore| |≤| follows| that all bases of a subspace | 2|≤| 1| are the same size, i.e., are equicardinal. We summarize these observations in the following fundamental theorem of linear algebra, the Finite Basis Theorem, stating that any subspace can be represented as the set of all linear combinations of the finite set of generators given by any of its bases, i.e., is finitely generated by the elements of any basis.
Recommended publications
  • Arxiv:1908.06506V2 [Math.CO] 14 Aug 2020
    POSITIONAL VOTING AND DOUBLY STOCHASTIC MATRICES JACQUELINE ANDERSON, BRIAN CAMARA, AND JOHN PIKE Abstract. We provide elementary proofs of several results concerning the possible outcomes arising from a fixed profile within the class of positional voting systems. Our arguments enable a simple and explicit construction of paradoxical profiles, and we also demonstrate how to choose weights that realize desirable results from a given profile. The analysis ultimately boils down to thinking about positional voting systems in terms of doubly stochastic matrices. 1. Introduction Suppose that n candidates are running for a single office. There are many different social choice pro- cedures one can use to select a winner. In this article, we study a particular class called positional voting systems. A positional voting system is an electoral method in which each voter submits a ranked list of the candidates. Points are then assigned according to a fixed weighting vector w that gives wi points to a candidate every time they appear in position i on a ballot, and candidates are ranked according to the total number of points received. For example, plurality is a positional voting system with weighting vector w = [ 1 0 0 ··· 0 ]T. One point is assigned to each voter's top choice, and the candidate with the most points wins. The Borda count is another common positional voting system in which the weighting vector is given by w = [ n − 1 n − 2 ··· 1 0 ]T. Other examples include the systems used in the Eurovision Song Contest, parliamentary elections in Nauru, and the AP College Football Poll [2,8,9].
    [Show full text]
  • FUNDAMENTALS Contents 1. Mathematical Backgrounds 1 1.1
    FUNDAMENTALS HANG SI Contents 1. Mathematical Backgrounds 1 1.1. Convex sets, convex hulls 1 1.2. Simplicial complexes, triangulations 3 1.3. Planar graphs, Euler's formula 5 2. Algorithm Backgrounds 8 2.1. Algorithmic foundations 9 2.2. Incremental construction 11 2.3. Randomized algorithms 15 Exercises 18 References 19 In order to well-understood the discussion and the analysis of algorithms in this chap- ter, it is necessary to understand the fundamental geometry and combinatorics of trian- gulations. We will first present the basic and related materials in this chapter. 1. Mathematical Backgrounds 1.1. Convex sets, convex hulls. d 1.1.1. Linear, affine, and convex combinations. The space R is a vector space. A linear d subspace of R is closed under addition of vectors and under multiplication of (scalar) real numbers. For example, the linear subspaces of R2 are the origin 0, all lines passing through origin, and R2 itself. Basic geometric objects are points, lines, planes and so forth, which are affine sub- spaces, also called flats. In an affine subspaces, lines are not passing through 0. An d affine subspace of R has the form x + L where x is some vector and L is a subspace of d R . Thus non-empty affine subspaces are the translates of linear subspaces. d Let a1, a2, :::, an be points in R , and α1, α2, :::, αn be (scalar) real value in R, then a linear combination of a1, a2, :::, an is a point: d α1a1 + α2a2 + + αnan R : ··· 2 In particular, it is n an affine combination if αi = 1, or • i=1 a conical combination if αi 0; i, or • Pn≥ 8 a convex combination if i=1 αi = 1, and αi 0; i.
    [Show full text]
  • Projecting Onto the Intersection of a Cone and a Sphere
    Projecting onto the intersection of a cone and a sphere Heinz H. Bauschke,∗ Minh N. Bui,† and Xianfu Wang‡ April 12, 2018 Abstract The projection onto the intersection of sets generally does not allow for a closed form even when the individual projection operators have explicit descriptions. In this work, we systematically an- alyze the projection onto the intersection of a cone with either a ball or a sphere. Several cases are provided where the projector is available in closed form. Various examples based on finitely gen- erated cones, the Lorentz cone, and the cone of positive semidefinite matrices are presented. The usefulness of our formulae is illustrated by numerical experiments for determining copositivity of real symmetric matrices. 2010 Mathematics Subject Classification: Primary 47H09, 52A05, 90C25, 90C26; Secondary 15B48, 47H04. Keywords: ball, convex set, convex cone, copositive matrix, projection, projector, sphere. 1 Introduction Throughout this paper, we assume that is a real Hilbert space (1.1) H with inner product and induced norm . Let K and S be subsets of , with associated projec- h·|·i k · k H tion operator (or projectors) PK and PS, (1.2) respectively. Our aim is to derive a formula for the projector of the intersection PK S. (1.3) ∩ arXiv:1708.00585v2 [math.OC] 12 Apr 2018 Only in rare cases is it possible to obtain a “closed form” for PK S in terms of PK and PS: e.g., when ∩ K and S are either both half-spaces (Haugazeau; see [10] and also [3, Corollary 29.25]) or both sub- spaces (Anderson–Duffin; see [1, Theorem 8] and also [3, Corollary 25.38]).
    [Show full text]
  • Pseudometrics, the Complex of Ultrametrics, and Iterated Cycle Structures
    University of New Hampshire University of New Hampshire Scholars' Repository Doctoral Dissertations Student Scholarship Spring 2019 Pseudometrics, The Complex of Ultrametrics, and Iterated Cycle Structures Eric Robert Kehoe University of New Hampshire, Durham Follow this and additional works at: https://scholars.unh.edu/dissertation Recommended Citation Kehoe, Eric Robert, "Pseudometrics, The Complex of Ultrametrics, and Iterated Cycle Structures" (2019). Doctoral Dissertations. 2451. https://scholars.unh.edu/dissertation/2451 This Dissertation is brought to you for free and open access by the Student Scholarship at University of New Hampshire Scholars' Repository. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of University of New Hampshire Scholars' Repository. For more information, please contact [email protected]. Pseudometrics, The Complex of Ultrametrics, and Iterated Cycle Structures BY Eric R. Kehoe DISSERTATION Submitted to the University of New Hampshire in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Mathematics May, 2019 ALL RIGHTS RESERVED c 2019 Eric R. Kehoe ii This thesis/dissertation has been examined and approved in partial fulfillment of the re- quirements for the degree of Doctor of Philosophy in Mathematics by: Thesis/Dissertation Director, David Feldman, Professor of Mathematics and Statistics John Gibson, Professor of Mathematics and Statistics Don Hadwin, Professor of Mathematics and Statistics Maria Basterra, Professor of Mathematics and Statistics Dmitri Nikshych, Professor of Mathematics and Statistics On April 17th, 2019 Original approval signatures are on file with the University of New Hampshire Graduate School. iii DEDICATION To my love Emily. iv ACKNOWLEDGEMENTS I would like to thank my parents for always supporting my dream of becoming a mathemati- cian.
    [Show full text]
  • Control Techniques for Constrained Discrete Time Systems
    Control techniques for constrained discrete time systems Paolo d’Alessandro, Elena De Santis April 27, 2004 ii Contents Introduction vii 0.1 Notations terminology and recalls . vii iii iv CONTENTS Preface ??? v vi PREFACE Introduction Reading the book requires some mathematical background. This is proposed in form functional to the present purposes in [7] and consists in the …rst place of rudiments of topology, linear spaces, Hilbert spaces and convex analysis. The style of exposition therein is concise and therefore for most proofs and details it is useful to make reference to the classical books: [8], [11] and [12]. In addition to that, we need here some of the results contained in this latter book, especially some basic ideas underlying the conical approach and the main results of the dual conical methods for the solution of linear feasibility and optimality problems. Rather then duplicating the presentation in [7], the following section aims at establishing the notations used in the present book as well as providing a sort of check list for the reader of the concept and results that will be used in the sequel. It does not substitute reading the above references, unless one is already familiar with the required background. We do not exclude a few re…nements later on, wherever required. 0.1 Notations terminology and recalls We shall consider, unless otherwise stated, points and sets in the Euclidean real spaces Rn equipped with the usual product topology, even though many of the involved concept are valid for more general linear spaces. At times we refer to a generic linear space, especially when there is no additional e¤ort to achieve maximum generality.
    [Show full text]
  • Lecture 2: Convex Sets
    Lecture 2: Convex sets August 28, 2008 Lecture 2 Outline • Review basic topology in Rn • Open Set and Interior • Closed Set and Closure • Dual Cone • Convex set • Cones • Affine sets • Half-Spaces, Hyperplanes, Polyhedra • Ellipsoids and Norm Cones • Convex, Conical, and Affine Hulls • Simplex • Verifying Convexity Convex Optimization 1 Lecture 2 Topology Review n Let {xk} be a sequence of vectors in R n n Def. The sequence {xk} ⊆ R converges to a vector xˆ ∈ R when kxk − xˆk tends to 0 as k → ∞ • Notation: When {xk} converges to a vector xˆ, we write xk → xˆ n • The sequence {xk} converges xˆ ∈ R if and only if for each component i: the i-th components of xk converge to the i-th component of xˆ i i |xk − xˆ | tends to 0 as k → ∞ Convex Optimization 2 Lecture 2 Open Set and Interior Let X ⊆ Rn be a nonempty set Def. The set X is open if for every x ∈ X there is an open ball B(x, r) that entirely lies in the set X, i.e., for each x ∈ X there is r > 0 s.th. for all z with kz − xk < r, we have z ∈ X Def. A vector x0 is an interior point of the set X, if there is a ball B(x0, r) contained entirely in the set X Def. The interior of the set X is the set of all interior points of X, denoted by R (X) • How is R (X) related to X? 2 • Example X = {x ∈ R | x1 ≥ 0, x2 > 0} R 2 (X) = {x ∈ R | x1 > 0, x2 > 0} R n 0 (S) of a probability simplex S = {x ∈ R | x 0, e x = 1} Th.
    [Show full text]
  • Linear Algebra
    Linear algebra Integer linear programming: formulations, techniques and applications. 03 Santiago Valdés Ravelo [email protected] August, 2020 “Algebra is the offer made by the devil to the mathematician. The devil says: I will give you this powerful machine, it will answer any question you like. All you need to do is give me your soul: give up geometry and you will have this marvellous machine.”1 Michael F. Atiyah. 1Michael F. Atiyah, “Special Article: Mathematics in the 20푡ℎ Century”, Bulletin of the London Mathematical Society, 2002, p. 7. 1 Vectors 2 Matrices 3 Linear systems 4 Exercises Vectors Vectors Definition Finite sequence of real values: ⎫ value 1 } } } value 2 } } } value 3 } 푛 + ⎬ 푣 ∈ ℝ , where 푛 ∈ ℕ … } } value 푛 − 1 } } } value 푛 } } ⎭ Vectors Special vectors. Null Vector with all the elements equal to zero (null): ⎫ 0 } } 0 } } 푣 = [0, 0, … , 0]푡 } … 푣 ⎬ } 0 } } } 0 } ⎭ Vectors Special vectors. Unit Vector with one element equals to 1 and the rest equal to 0: ⎫ 0 } } } … } } 0 } } 푣 = [0, … , 0, 1, 0, … , 0]푡 } 1 ⎬ 푣 } 0 } } } … } } 0 } } * unit vectors are those whose norm is equals to 1 ⎭ Vectors Operations. Sum Sum the elements at the same position: ⎫ } 푛 푣1 + 푤1 } 푣, 푤 ∈ ℝ ∶ } } 푣2 + 푤2 } 푣 + 푤 = [푣 , 푣 , … , 푣 ]푡 + [푤 , 푤 , … , 푤 ]푡 푣 + 푤 1 2 푛 1 2 푛 … ⎬ } } 푡 푣푛 + 푤푛 } 푣 + 푤 = [푣1 + 푤1, 푣2 + 푤2, … , 푣푛 + 푤푛] } } ⎭ Vectors Operations. Scalar multiplication Multiply each element of the vector by the scalar (real number): ⎫ } 푛 휆 × 푣1 } 휆 ∈ ℝ, 푣 ∈ ℝ ∶ } } 휆 × 푣2 } 휆 × 푣 = 휆 × [푣 , 푣 , … , 푣 ]푡 휆 × 푣 1 2 푛 … ⎬ } } 푡 휆 × 푣푛 } 휆 × 푣 = [휆 × 푣1, 휆 × 푣2, … , 휆 × 푣푛] } } ⎭ Vectors Operations.
    [Show full text]
  • Mtftfl the Degree .CH?
    COMPUTATIONAL VERIFICATION OF THE CONE CONJECTURE A thesis presented to the faculty of 3 4 , San Francisco State University -Z -o \8 In partial fulfilment of The Requirements for MtfTfl The Degree .CH? Master of Arts In Mathematics by Tsz Leong Chan San Francisco, California December 2018 Copyright by Tsz Leong Chan 2018 CERTIFICATION OF APPROVAL I certify that I have read COMPUTATIONAL VERIFICATION OF THE CONE CONJECTURE by Tsz Leong Chan and that in my opinion this work meets the criteria for approving a thesis submitted m par­ tial fulfillment of the requirements for the degree: Master of Arts in Mathematics at San Francisco State University. Dr. Joseph Gubeladze Professor of Mathematics Dr. Matthias Beck Professor of Mathematics Dr. Serkan Hosten Professor of Mathematics COMPUTATIONAL VERIFICATION OF THE CONE CONJECTURE Tsz Leong Char San Francisco State University 2018 The set of polyhedral pointed rational cones form a partially ordered set with respect to elementary additive extensions of certain type. This poset captures a global picture of the interaction of all possible rational cones with the integer lattice and, also, provides an alternative approach- to another important poset, the poset of normal polytopes. One of the central conjectures in the field, is the s.c. Cone Conjecture: the order on cones is the inclusion order. The con­ jecture has been proved only in dimensions up to 3. In this work we develop an algorithmic approach to the conjecture in higher dimensions. Namely, we study how often two specific types of cone extensions generate the chains of cones in dimensions 4 and 5, whose existence follows from the Cone Conjecture.
    [Show full text]
  • Convex Combinations
    Convexity and Polyhedra Carlo Mannino (from Geir Dahl notes on convexity) University of Oslo, INF-MAT5360 - Autumn 2011 (Mathematical optimization) Convex Sets n Set C R is convex if (1- )x1 + x2 C whenever x1 , x2 C 0 ≤ ≤ 1 (the segment joining x1 , x2 is contained in C) x x2 1 non-convex x2 convex x1 • Show that the unit ball B = {x Rn : ||x|| ≤ 1} is convex. (Hint use the triangle inequality ||x+y|| ≤ ||x||+ ||y||) Half-spaces n T Example of convex sets: half-spaces H = {xR : a x ≤ a0} H x H aTx ≤ a (1- ) aTx ≤ (1- ) a 1 1 0 1 0 0 ≤ ≤ 1 T T x2 H a x2 ≤ a0 a x2 ≤ a0 T summing up x2 H a ((1- ) x1 + x2) ≤ a0 (1- ) x1 + x2 H Convex Cones The set of solutions to a linear system of equation is a polyhedron. n n H = {xℝ : Ax = b} H = {xℝ : Ax ≤ b , -Ax ≤ -b } n Convex Cone: C ⊆ℝ if 휆1 x1 + 휆2 x2 ∈ C whenever x1, x2 ∈ C and 휆1 , 휆2 ≥ 0. Each convex cone is a convex set. (show) m,n n Let A ∈ ℝ . Then C = {xℝ : Ax ≤ 0} is a convex cone (show). n 푡 Let x1,…,xt ∈ ℝ , and 휆1,…,휆 t ≥ 0. The vector x = 푗=1 휆푗xj is a nonnegative (or conical) combination of x1,…,xt n The set C(x1,…,xt) of all nonnegative combinations of x1,…,xt ∈ ℝ is a convex cone (show), called finitely generated cone. Linear Programming Property: C1 , C2 convex sets → C1 ∩ C2 convex (show!) Linear programming: x = (x1, …, xn) maximize c1x1 + … + cn xn Subject to 푎11x1 + … +푎 1푛 xn ≤ 푏1 ⋮ P 푎푚1x1 + +푎 푚 푛 xn ≤ 푏푚 x1 , …, xn ≥ 0 max {cTx: x ϵ P }, with P = {xRn: Ax ≤ b, x≥ 0} Find the optimum solution in P P intersection of a finite number of half-spaces: convex set (polyhedron) The set of optimal solutions to a linear program is a polyhedron (show!) Convex Combinations n 푡 Let x1,…,xt ∈ ℝ , and 휆1,…,휆 t ≥ 0, such that 푗=1 휆푗 = 1.
    [Show full text]
  • On the Polyhedrality of the Chvátal-Gomory Closure
    On the Polyhedrality of the Chv´atal-Gomory Closure Haoran Zhu ∗ Abstract In this paper, we provide an equivalent condition for the Chv´atal-Gomory (CG) closure of a closed convex set to be finitely-generated. Using this result, we are able to prove that, for any closed convex set that can be written as the Minkowski sum of a compact convex set and a closed convex cone, its CG closure is a rational polyhedron if and only if its recession cone is a rational polyhedral cone. As a consequence, this generalizes and unifies all the currently known results, for the case of rational polyhedron [24] and compact convex set [9]. Key words: Chv´atal-Gomory closure polyhedral cutting-planes · · 1 Introduction Cutting-plane method is one of the most fundamental techniques for solving (mixed) integer pro- gramming problems, and often times in practice, it is combined with the branch-and-bound method. Since the early days of Integer Programming (IP), numerous types of cutting-planes have been in- troduced and studied in the literature, several of them have also been widely implemented into commercial solvers. Among those cuts, Chv`atal-Gomory (CG) cut ([18, 5]) was the first cutting- plane that has ever been proposed, and various interesting results have been obtained from both the theoretical and practical point of view (see, e.g., [6, 3, 15]). One of the theoretical questions regarding to CG cut is, what are the structural properties of the region obtained from intersecting all of those cuts? In the terminology of cutting-plane theory, this region is referred to as Chv`atal-Gomory (CG) closure.
    [Show full text]
  • Fundamentals of Convex Analysis Theory and Decision Library
    FUNDAMENTALS OF CONVEX ANALYSIS THEORY AND DECISION LIBRARY General Editors: W. Leinfellner (Vienna) and G. Eberlein (Munich) Series A: Philosophy and Methodology of the Social Sciences Series B: Mathematical and Statistical Methods Series C: Game Theory, Mathematical Programming and Operations Research Series D: System Theory, Knowledge Engineering and Problem Solving SERIES B: MATHEMATICAL AND STATISTICAL METHODS VOLUME 24 Editor: H. J. Skala (Paderborn); Assistant Editor: M. Kraft (Paderborn); Editorial Board: 1. Aczel (Waterloo, Ont.), G. Bamberg (Augsburg), H. Drygas (Kassel), W. Eichhorn (Karlsruhe), P. Fishburn (Murray Hill, N.J.), D. Fraser (Toronto), W. Janko (Vienna), P. de Jong (Vancouver), T. Kariya (Tokyo), M. Machina (La Jolla, Calif.), A. Rapoport (Toronto), M. Richter (Kaiserslautern), B. K. Sinha (Cattonsville, Md.), D. A. Sprott (Waterloo, Ont.), P. Suppes (Stanford, Calif.), H. Theil (Gainesville, Fla.), E. Trillas (Madrid), L. A. Zadeh (Berkeley, Calif.). Scope: The series focuses on the application of methods and ideas of logic, mathematics and statistics to the social sciences. In particular, formal treatment of social phenomena, the analysis of decision making, information theory and problems of inference will be central themes of this part of the library. Besides theoretical results, empirical investigations and the testing of theoretical models of real world problems will be subjects of interest. In addition to emphasizing interdisciplinary communication, the series will seek to support the rapid dissemination of recent results. The titles published in this series are listed at the end of this volume. FUNDAMENTALS OF CONVEX ANALYSIS Duality, Separation, Representation, and Resolution by MICHAEL J. PANIK Department of Economics, University of Hartford, West Hartford, Connecticut, U.S.A.
    [Show full text]
  • Chapter 2 POLYHEDRAL COMBINATORICS
    Chapter 2 POLYHEDRAL COMBINATORICS Robert D. Carr Discrete Mathematics and Algorithms Department, Sandia National Laboratories [email protected] Goran Konjevod Computer Science and Engineering Department, Arizona State University [email protected] Abstract Polyhedral combinatorics is a rich mathematical subject motivated by integer and linear programming. While not exhaustive, this survey cov- ers a variety of interesting topics, so let's get right to it! Keywords: combinatorial optimization, integer programming, linear programming, polyhedron, relaxation, separation, duality, compact optimization, pro- jection, lifting, dynamic programming, total dual integrality, integrality gap, approximation algorithms Introduction There exist several excellent books [15, 24, 29, 35, 37] and survey articles [14, 33, 36] on combinatorial optimization and polyhedral com- binatorics. We do not see our article as a competitor to these fine works. Instead, in the first half of our Chapter, we focus on the very founda- tions of polyhedral theory, attempting to present important concepts and problems as early as possible. This material is for the most part classical and we do not trace the original sources. In the second half (Sections 5{7), we present more advanced material in the hope of draw- ing attention to what we believe are some valuable and useful, but less well explored, directions in the theory and applications of polyhedral combinatorics. We also point out a few open questions that we feel have not been given the consideration they deserve. 2-2 Polyhedral Combinatorics 2.1 Combinatorial Optimization and Polyhedral Combinatorics Consider an undirected graph G = (V; E) (i.e. where each edge is a set of 2 vertices (endpoints) in no specified order).
    [Show full text]