93 research outputs found

    Dominance inequalities for scheduling around an unrestrictive common due date

    Full text link
    The problem considered in this work consists in scheduling a set of tasks on a single machine, around an unrestrictive common due date to minimize the weighted sum of earliness and tardiness. This problem can be formulated as a compact mixed integer program (MIP). In this article, we focus on neighborhood-based dominance properties, where the neighborhood is associated to insert and swap operations. We derive from these properties a local search procedure providing a very good heuristic solution. The main contribution of this work stands in an exact solving context: we derive constraints eliminating the non locally optimal solutions with respect to the insert and swap operations. We propose linear inequalities translating these constraints to strengthen the MIP compact formulation. These inequalities, called dominance inequalities, are different from standard reinforcement inequalities. We provide a numerical analysis which shows that adding these inequalities significantly reduces the computation time required for solving the scheduling problem using a standard solver.Comment: 30 pages, 7 figures and 4 table

    Mixed integer formulations using natural variables for single machine scheduling around a common due date

    Get PDF
    34 pages, 10 figuresWhile almost all existing works which optimally solve just-in-time scheduling problems propose dedicated algorithmic approaches, we propose in this work mixed integer formulations. We consider a single machine scheduling problem that aims at minimizing the weighted sum of earliness tardiness penalties around a common due-date. Using natural variables, we provide one compact formulation for the unrestrictive case and, for the general case, a non-compact formulation based on non-overlapping inequalities. We show that the separation problem related to the latter formulation is solved polynomially. In this formulation, solutions are only encoded by extreme points. We establish a theoretical framework to show the validity of such a formulation using non-overlapping inequalities, which could be used for other scheduling problems. A Branch-and-Cut algorithm together with an experimental analysis are proposed to assess the practical relevance of this mixed integer programming based methods

    Contractions in perfect graph

    Full text link
    In this paper, we characterize the class of {\em contraction perfect} graphs which are the graphs that remain perfect after the contraction of any edge set. We prove that a graph is contraction perfect if and only if it is perfect and the contraction of any single edge preserves its perfection. This yields a characterization of contraction perfect graphs in terms of forbidden induced subgraphs, and a polynomial algorithm to recognize them. We also define the utter graph u(G)u(G) which is the graph whose stable sets are in bijection with the co-2-plexes of GG, and prove that u(G)u(G) is perfect if and only if GG is contraction perfect.Comment: 11 pages, 4 figure

    Calculus inference graphs and analog circuit synthesis

    Get PDF
    Abstract In this article, we consider a calculus system as a set of variables linked by calculus operations. These operations can be algebric equations, differential equations, algorithmic functions, boolean equations... We interest in finding a particular set of variables, called parameters, such that the values of the resting variables can be infered by using the operations. This problem reduces to a combinatorial optimization problem, called the calculus inference subgraph problem, for which we propose both exact and approximative solving methods. We focus on applying these results to analog circuit synthesis in order to compute the component sizing variable values from the expected values of both input and output circuit parameters

    Survivability in hierarchical telecommunications networks

    Get PDF
    Abstract We consider the problem of designing a two level telecommunications network at minimum cost. The decisions involved are the locations of concentrators, the assignments of user nodes to concentrators and the installation of links connecting concentrators in a reliable backbone network. We define a reliable backbone network as one where there exist at least 2-edge disjoint paths between any pair of concentrator nodes. We formulate this problem as an integer program and propose a facial study of the associated polytope. We describe valid inequalities and give sufficient conditions for these inequalities to be facet defining. We also propose some reduction operations in order to speed up the separation procedures for these inequalities. Using these results, we devise a branch-and-cut algorithm and present some computational results

    Vulnerability assessment of spatial networks: models and solutions

    Get PDF
    In this paper we present a collection of combinatorial optimization problems that allows to assess the vulnerability of spatial networks in the presence of disruptions. The proposed measures of vulnerability along with the model of failure are suitable in many applications where the consideration of failures in the transportation system is crucial. By means of computational results, we show how the proposed methodology allows us to find useful information regarding the capacity of a network to resist disruptions and under which circumstances the network collapses

    Clique-branching formulation for the vertex coloring problem

    No full text
    International audienc
    corecore