93 research outputs found
Dominance inequalities for scheduling around an unrestrictive common due date
The problem considered in this work consists in scheduling a set of tasks on
a single machine, around an unrestrictive common due date to minimize the
weighted sum of earliness and tardiness. This problem can be formulated as a
compact mixed integer program (MIP). In this article, we focus on
neighborhood-based dominance properties, where the neighborhood is associated
to insert and swap operations. We derive from these properties a local search
procedure providing a very good heuristic solution. The main contribution of
this work stands in an exact solving context: we derive constraints eliminating
the non locally optimal solutions with respect to the insert and swap
operations. We propose linear inequalities translating these constraints to
strengthen the MIP compact formulation. These inequalities, called dominance
inequalities, are different from standard reinforcement inequalities. We
provide a numerical analysis which shows that adding these inequalities
significantly reduces the computation time required for solving the scheduling
problem using a standard solver.Comment: 30 pages, 7 figures and 4 table
Mixed integer formulations using natural variables for single machine scheduling around a common due date
34 pages, 10 figuresWhile almost all existing works which optimally solve just-in-time scheduling problems propose dedicated algorithmic approaches, we propose in this work mixed integer formulations. We consider a single machine scheduling problem that aims at minimizing the weighted sum of earliness tardiness penalties around a common due-date. Using natural variables, we provide one compact formulation for the unrestrictive case and, for the general case, a non-compact formulation based on non-overlapping inequalities. We show that the separation problem related to the latter formulation is solved polynomially. In this formulation, solutions are only encoded by extreme points. We establish a theoretical framework to show the validity of such a formulation using non-overlapping inequalities, which could be used for other scheduling problems. A Branch-and-Cut algorithm together with an experimental analysis are proposed to assess the practical relevance of this mixed integer programming based methods
Contractions in perfect graph
In this paper, we characterize the class of {\em contraction perfect} graphs
which are the graphs that remain perfect after the contraction of any edge set.
We prove that a graph is contraction perfect if and only if it is perfect and
the contraction of any single edge preserves its perfection. This yields a
characterization of contraction perfect graphs in terms of forbidden induced
subgraphs, and a polynomial algorithm to recognize them. We also define the
utter graph which is the graph whose stable sets are in bijection with
the co-2-plexes of , and prove that is perfect if and only if is
contraction perfect.Comment: 11 pages, 4 figure
Calculus inference graphs and analog circuit synthesis
Abstract In this article, we consider a calculus system as a set of variables linked by calculus operations. These operations can be algebric equations, differential equations, algorithmic functions, boolean equations... We interest in finding a particular set of variables, called parameters, such that the values of the resting variables can be infered by using the operations. This problem reduces to a combinatorial optimization problem, called the calculus inference subgraph problem, for which we propose both exact and approximative solving methods. We focus on applying these results to analog circuit synthesis in order to compute the component sizing variable values from the expected values of both input and output circuit parameters
Survivability in hierarchical telecommunications networks
Abstract We consider the problem of designing a two level telecommunications network at minimum cost. The decisions involved are the locations of concentrators, the assignments of user nodes to concentrators and the installation of links connecting concentrators in a reliable backbone network. We define a reliable backbone network as one where there exist at least 2-edge disjoint paths between any pair of concentrator nodes. We formulate this problem as an integer program and propose a facial study of the associated polytope. We describe valid inequalities and give sufficient conditions for these inequalities to be facet defining. We also propose some reduction operations in order to speed up the separation procedures for these inequalities. Using these results, we devise a branch-and-cut algorithm and present some computational results
Vulnerability assessment of spatial networks: models and solutions
In this paper we present a collection of combinatorial optimization problems that allows to assess the vulnerability of spatial networks in the presence of disruptions. The proposed measures of vulnerability along with the model of failure are suitable in many applications where the consideration of failures in the transportation system is crucial. By means of computational results, we show how the proposed methodology allows us to find useful information regarding the capacity of a network to resist disruptions and under which circumstances the network collapses
Clique-branching formulation for the vertex coloring problem
International audienc
- …