Handbook of Combinatorial Optimization: Supplement Volume B, 2. sējumsDing-Zhu Du, Panos M. Pardalos Springer Science & Business Media, 2006. gada 18. aug. - 394 lappuses Combinatorial (or discrete) optimization is one of the most active fields in the interface of operations research, computer science, and applied ma- ematics. Combinatorial optimization problems arise in various applications, including communications network design, VLSI design, machine vision, a- line crew scheduling, corporate planning, computer-aided design and m- ufacturing, database query design, cellular telephone frequency assignment, constraint directed reasoning, and computational biology. Furthermore, combinatorial optimization problems occur in many diverse areas such as linear and integer programming, graph theory, artificial intelligence, and number theory. All these problems, when formulated mathematically as the minimization or maximization of a certain function defined on some domain, have a commonality of discreteness. Historically, combinatorial optimization starts with linear programming. Linear programming has an entire range of important applications including production planning and distribution, personnel assignment, finance, allo- tion of economic resources, circuit simulation, and control systems. Leonid Kantorovich and Tjalling Koopmans received the Nobel Prize (1975) for their work on the optimal allocation of resources. Two important discov- ies, the ellipsoid method (1979) and interior point approaches (1984) both provide polynomial time algorithms for linear programming. These al- rithms have had a profound effect in combinatorial optimization. Many polynomial-time solvable combinatorial optimization problems are special cases of linear programming (e.g. matching and maximum flow). In ad- tion, linear programming relaxations are often the basis for many appro- mation algorithms for solving NP-hard problems (e.g. dual heuristics). |
No grāmatas satura
1.5. rezultāts no 57.
9. lappuse
... prove the result for sum type cost functions. The proof for max type cost functions is similar. For sum type cost functions, it is sufficient to prove the result when the cost vectors and differ in only one position. Let for and ...
... prove the result for sum type cost functions. The proof for max type cost functions is similar. For sum type cost functions, it is sufficient to prove the result when the cost vectors and differ in only one position. Let for and ...
23. lappuse
... prove only part 1 since the proof of the part 2 is similar. We may represent the partition of interval [S, T] as follows: Using this representation on the interval we have Let There are twocases to consider: and In the first case For we ...
... prove only part 1 since the proof of the part 2 is similar. We may represent the partition of interval [S, T] as follows: Using this representation on the interval we have Let There are twocases to consider: and In the first case For we ...
24. lappuse
... proved by induction that the portion of the Hasse diagram eliminated by preservation rules of order while searching for a maximum of the submodular function will certainly be eliminated by preservation rules of order In this sense ...
... proved by induction that the portion of the Hasse diagram eliminated by preservation rules of order while searching for a maximum of the submodular function will certainly be eliminated by preservation rules of order In this sense ...
29. lappuse
... proved in Theorem 2.2 of Lee et al. [27] that is submodular. In Goldengorin et al. [14] computational experiments with QCP have been restricted to instances of size not more than 80, because instances of that size have been considered ...
... proved in Theorem 2.2 of Lee et al. [27] that is submodular. In Goldengorin et al. [14] computational experiments with QCP have been restricted to instances of size not more than 80, because instances of that size have been considered ...
56. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
2 | |
5 | |
The Steiner Ratio of BanachMinkowski Space A Survey | 55 |
Probabilistic Verification and NonApproximablity 83 | 82 |
Steiner Trees in Industry Xiuzhen Cheng Yingshu Li DingZhu Du and Hung Q Ngo | 193 |
Networkbased Model and Algorithms in Data Mining | 217 |
The Generalized Assignment Problem and Extensions Dolores Romero Morales and H Edwin Romeijn | 259 |
Additional Approaches to the | 297 |
Concluding Remarks | 304 |
Optimal Rectangular Partitions Xiuzhen Cheng DingZhu Du JoonMo Kim and Lu Ruan 313 | 329 |
Introduction | 330 |
Author Index 371 | 370 |
Subject Index | 381 |
Citi izdevumi - Skatīt visu
Handbook of combinatorial optimization, 2. sējums Dingzhu Du,Panos M. Pardalos Ierobežota priekšskatīšana - 1998 |
Handbook of Combinatorial Optimization: Supplement Volume B Ding-Zhu Du,Panos M. Pardalos Priekšskatījums nav pieejams - 2011 |
Bieži izmantoti vārdi un frāzes
agent applied approximation algorithms approximation scheme Arora assignment problem Banach-Minkowski capacity constraints CDS construction checkable cluster clusterhead combinatorial optimization complexity Computer Science conjecture connected dominating set consider convex corresponding cost data correcting algorithm dataset decoding defined denote distribution edges elements encoding Feige graph product greedy heuristic guillotine Hadamard code Håstad holographic codes independent sets input Journal Lemma length linear lower bound market graph matrix maximum clique minimal minimum spanning tree multi-degree neighbors Neural Networks nodes non-approximability NP complete NP-hard obtain Operations Research optimal solution optimization problems parameters performance ratio polynomial polynomial-time approximation polynomial-time approximation scheme probabilistic problem instances procedure proof prove random rectangular partition rectilinear reduce Romero Morales Section segment solve space SPLP Steiner minimum tree Steiner points Steiner ratio Steiner tree problem subproblems subset tasks techniques Theorem Theory upper bound variables vector verifier vertex vertices WCDS