No abstract available.
Cited By
- Ferreira G, Felipe Zanella A, Bakirtzis S, Ravazzi C, Dabbene F, Calafiore G, Wassell I, Zhang J and Fiore M (2024). A Joint Optimization Approach for Power-Efficient Heterogeneous OFDMA Radio Access Networks, IEEE Journal on Selected Areas in Communications, 42:11, (3232-3245), Online publication date: 1-Nov-2024.
- Bani Hassan J, Mirzazadeh Z, Abdi S, Eshaghnezhad M and Mansoori A (2023). A Novel Neurodynamic Model for Data Envelopment Analysis: A Case Study on Iran’s Olympic Sports Caravan, Neural Processing Letters, 55:9, (12079-12092), Online publication date: 1-Dec-2023.
- Ou Y and Lin H (2021). A neurodynamic approach to zero-one quadratic programming, Numerical Algorithms, 88:3, (1251-1274), Online publication date: 1-Nov-2021.
- Cerqueira G, Aguiar S and Marques M (2021). Modified Greedy Heuristic for the one-dimensional cutting stock problem, Journal of Combinatorial Optimization, 42:3, (657-674), Online publication date: 1-Oct-2021.
- Ranjbar M, Effati S and Miri S (2019). An efficient neural network for solving convex optimization problems with a nonlinear complementarity problem function, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:6, (4233-4242), Online publication date: 1-Mar-2020.
- Eshaghnezhad M, Rahbarnia F, Effati S and Mansoori A (2019). An Artificial Neural Network Model to Solve the Fuzzy Shortest Path Problem, Neural Processing Letters, 50:2, (1527-1548), Online publication date: 1-Oct-2019.
- Sojoudi S, Fattahi S and Lavaei J (2019). Convexification of generalized network flow problem, Mathematical Programming: Series A and B, 173:1-2, (353-391), Online publication date: 1-Jan-2019.
- Gauthier J, Desrosiers J and Lübbecke M (2018). Vector Space Decomposition for Solving Large-Scale Linear Programs, Operations Research, 66:5, (1376-1389), Online publication date: 1-Oct-2018.
- Jamil N, Müller J, Naeem M, Lutteroth C and Weber G (2016). Extending linear relaxation for non-square matrices and soft constraints, Journal of Computational and Applied Mathematics, 308:C, (346-360), Online publication date: 15-Dec-2016.
- Nazemi A, Abbasi B and Omidi F (2015). Solving portfolio selection models with uncertain returns using an artificial neural network scheme, Applied Intelligence, 42:4, (609-621), Online publication date: 1-Jun-2015.
- Calvete H and Galé C (2012). Linear bilevel programming with interval coefficients, Journal of Computational and Applied Mathematics, 236:15, (3751-3762), Online publication date: 1-Sep-2012.
- Contreras I, Cordeau J and Laporte G (2011). Benders Decomposition for Large-Scale Uncapacitated Hub Location, Operations Research, 59:6, (1477-1490), Online publication date: 1-Nov-2011.
- Keshavarz E and Khorram E (2011). A fuzzy bi-criteria transportation problem, Computers and Industrial Engineering, 61:4, (947-957), Online publication date: 1-Nov-2011.
- Wang J and Guo Z Parametric sensitivity and scalability of k-winners-take-all networks with a single state variable and infinity-gain activation functions Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part I, (77-85)
- Heikkinen T Multiuser scheduling via dynamic optimization Proceedings of the 8th international conference on Wired/Wireless Internet Communications, (95-106)
- Fernańdez F, Perea F and Puerto J Avoiding unfairness of Owen solutions in linear production games Proceedings of the Behavioral and Quantitative Game Theory: Conference on Future Directions, (1-7)
- Padró C and Vázquez L Finding lower bounds on the complexity of secret sharing schemes by linear programming Proceedings of the 9th Latin American conference on Theoretical Informatics, (344-355)
- Reed J, Buehrer R and Da Silva C An optimization approach to single-source localization using direction and range estimates Proceedings of the 28th IEEE conference on Global telecommunications, (3800-3804)
- Bai L and Rubin P (2009). Combinatorial Benders Cuts for the Minimum Tollbooth Problem, Operations Research, 57:6, (1510-1522), Online publication date: 1-Nov-2009.
- Chen C, Lin C and Lin C (2009). Nonlinear system control using adaptive neural fuzzy networks based on a modified differential evolution, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 39:4, (459-473), Online publication date: 1-Jul-2009.
- Luis M, Salhi S and Nagy G (2009). Region-rejection based heuristics for the capacitated multi-source Weber problem, Computers and Operations Research, 36:6, (2007-2017), Online publication date: 1-Jun-2009.
- Liu S and Kao C (2009). Short Communication, Computers and Industrial Engineering, 56:4, (1697-1700), Online publication date: 1-May-2009.
- Tsai J, Ho W and Chou J (2009). Design of two-dimensional IIR digital structure-specified filters by using an improved genetic algorithm, Expert Systems with Applications: An International Journal, 36:3, (6928-6934), Online publication date: 1-Apr-2009.
- Frénay B and Saerens M (2009). QL2, a simple reinforcement learning scheme for two-player zero-sum Markov games, Neurocomputing, 72:7-9, (1494-1507), Online publication date: 1-Mar-2009.
- Liu S and Chuang M (2009). Fuzzy efficiency measures in fuzzy DEA/AR with application to university libraries, Expert Systems with Applications: An International Journal, 36:2, (1105-1113), Online publication date: 1-Mar-2009.
- Sherali H, Hobeika A and Jeenanunta C (2009). An Optimal Constrained Pruning Strategy for Decision Trees, INFORMS Journal on Computing, 21:1, (49-61), Online publication date: 1-Jan-2009.
- Broberg J and Buyya R A multi-commodity flow approach to maximising utility in linked market-based grids Proceedings of the 5th international workshop on Middleware for grid computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference, (1-6)
- Costa E, Terra L and Jamil G Mathematical programming elements Proceedings of the 9th WSEAS international conference on Mathematical and computational methods in science and engineering, (67-73)
- Hottinen A and Heikkinen T Distributed subchannel assignment in an OFDMA relay Proceedings of the 2nd international conference on Performance evaluation methodologies and tools, (1-6)
- Lee C and Dong Kim H (2007). Reliable overlay multicast trees for private Internet broadcasting with multiple sessions, Computers and Operations Research, 34:9, (2849-2864), Online publication date: 1-Sep-2007.
- Retvari G, Biro J and Cinkler T Fairness in Capacitated Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1604-1612)
- Zheng Q, Ray S, Hong X, Tang L and Gao L Integrity and its applications Proceedings of the 45th annual ACM Southeast Conference, (350-354)
- Diaby M A linear programming formulation of the traveling Salesman problem Proceedings of the 11th WSEAS International Conference on Applied Mathematics, (97-102)
- Jia Liu , Tae Yoon Park , Hou Y, Yi Shi and Sherali H Cross-Layer Optimization of MIMO-Based Mesh Networks Under Orthogonal Channels Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (49-54)
- Benson H (2006). Continuous Modular Design Problem, Journal of Optimization Theory and Applications, 131:2, (159-178), Online publication date: 1-Nov-2006.
- Combarro E and Miranda P (2006). Identification of fuzzy measures from sample data with genetic algorithms, Computers and Operations Research, 33:10, (3046-3066), Online publication date: 1-Oct-2006.
- Soleimani-Damaneh M, Jahanshahloo G and Abbasbandy S (2006). Computational and theoretical pitfalls in some current performance measurement techniques; and a new approach, Applied Mathematics and Computation, 181:2, (1199-1207), Online publication date: 1-Oct-2006.
- Hashemi S, Modarres M, Nasrabadi E and Nasrabadi M (2006). Fully fuzzified linear programming, solution and duality, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 17:3, (253-261), Online publication date: 1-Jul-2006.
- Rétvári G, Bíró J and Cinkler T On improving the accuracy of OSPF traffic engineering Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, (51-62)
- Venkatesh S and Buehrer R A linear programming approach to NLOS error mitigation in sensor networks Proceedings of the 5th international conference on Information processing in sensor networks, (301-308)
- Siqueira P, Scheer S and Steiner M Application of the “winner takes all” principle in wang's recurrent neural network for the assignment problem Proceedings of the Second international conference on Advances in Neural Networks - Volume Part I, (731-738)
- Herrero J, Berlanga A, Molina J and Casar J (2005). Methods for Operations Planning in Airport Decision Support Systems, Applied Intelligence, 22:3, (183-206), Online publication date: 1-May-2005.
- Yeh C and Marek-Sadowska M Skew-programmable clock design for FPGA and skew-aware placement Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays, (33-40)
- Ramachandaran P, Agnihotri A, Ono S, Damodaran P, Srihari K and Madden P Optimal placement by branch-and-price Proceedings of the 2005 Asia and South Pacific Design Automation Conference, (337-342)
- Jahanshahloo G, Matin R and Vencheh A (2004). On FDH efficiency analysis with interval data, Applied Mathematics and Computation, 159:1, (47-55), Online publication date: 1-Nov-2004.
- Keys A and Rees L (2004). A sequential-design metamodeling strategy for simulation optimization, Computers and Operations Research, 31:11, (1911-1932), Online publication date: 1-Oct-2004.
- Nookala V and Sapatnekar S A method for correcting the functionality of a wire-pipelined circuit Proceedings of the 41st annual Design Automation Conference, (570-575)
- Müezzinoğlu M and Güzeli C (2004). Associative Memory Design via Path Embedding into a Graph, Neural Processing Letters, 19:3, (205-209), Online publication date: 1-Jun-2004.
- Hou Y, Shi Y and Sherali H Rate allocation in wireless sensor networks with network lifetime requirement Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, (67-77)
- Gupta N, Cho Y and Hossain M Experiments with UNA for solving linear constraints in real variables Proceedings of the 2004 ACM symposium on Applied computing, (1013-1020)
- Manquinho V and Marques-Silva J (2004). Satisfiability-Based Algorithms for Boolean Optimization, Annals of Mathematics and Artificial Intelligence, 40:3-4, (353-372), Online publication date: 1-Mar-2004.
- Hall N and Posner M (2004). Sensitivity Analysis for Scheduling Problems, Journal of Scheduling, 7:1, (49-83), Online publication date: 1-Jan-2004.
- Mazzini F, Mateus G and Smith J (2003). Lagrangean based methods for solving large-scale cellular network design problems, Wireless Networks, 9:6, (659-672), Online publication date: 1-Nov-2003.
- McMahan H, Gordon G and Blum A Planning in the presence of cost functions controlled by an adversary Proceedings of the Twentieth International Conference on International Conference on Machine Learning, (536-543)
- Olecka A Evaluating classifiers' performance in a constrained environment Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (605-612)
- Liu X (2002). Network optimization with stochastic traffic flows, International Journal of Network Management, 12:4, (225-234), Online publication date: 15-Jul-2002.
- Ozmutlu H, Gautam N and Barton R (2002). Managing End-to-End Network Performance via Optimized Monitoring Strategies, Journal of Network and Systems Management, 10:1, (107-126), Online publication date: 1-Mar-2002.
- Ben-Hur A, Siegelmann H and Fishman S (2002). A Theory of Complexity for Continuous Time Systems, Journal of Complexity, 18:1, (51-86), Online publication date: 1-Mar-2002.
- Moulin H and Stong R (2002). Fair Queuing and Other Probabilistic Allocation Methods, Mathematics of Operations Research, 27:1, (1-30), Online publication date: 1-Feb-2002.
- Edvardsson J and Kamkar M Analysis of the constraint solver in UNA based test data generation Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (237-245)
- Edvardsson J and Kamkar M (2001). Analysis of the constraint solver in UNA based test data generation, ACM SIGSOFT Software Engineering Notes, 26:5, (237-245), Online publication date: 1-Sep-2001.
- Song Y, Xu R, Wang C and Li Z Data locality enhancement by memory reduction Proceedings of the 15th international conference on Supercomputing, (50-64)
- Han C, Shin K and Hou C (2001). Synchronous Bandwidth Allocation for Real-Time Communications with the Timed-Token MAC Protocol, IEEE Transactions on Computers, 50:5, (414-431), Online publication date: 1-May-2001.
- Babayev D and Bell G (2001). An Optimization Problem with a Separable Non-Convex Objective Function and a Linear Constraint, Journal of Heuristics, 7:2, (169-184), Online publication date: 1-Mar-2001.
- Sherali H, Subramanian S and Loganathan G (2001). Effective Relaxations and Partitioning Schemes for Solving Water Distribution Network Design Problems to Global Optimality, Journal of Global Optimization, 19:1, (1-26), Online publication date: 1-Jan-2001.
- Tind J and Wiecek M (1999). Augmented Lagrangian and Tchebycheff Approaches in Multiple Objective Programming, Journal of Global Optimization, 14:3, (251-266), Online publication date: 1-May-1999.
- Helander M, Zhao M and Ohlsson N (1998). Planning Models for Software Reliability and Cost, IEEE Transactions on Software Engineering, 24:6, (420-434), Online publication date: 1-Jun-1998.
- Maheshwari N and Sapatnekar S (1998). Efficient retiming of large circuits, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 6:1, (74-83), Online publication date: 1-Mar-1998.
- Maheshwari N and Sapatnekar S An improved algorithm for minimum-area retiming Proceedings of the 34th annual Design Automation Conference, (2-7)
- Lev B (1996). Book Reviews, Interfaces, 26:6, (139-148), Online publication date: 1-Dec-1996.
- Benson H and Lee D (1996). Outcome-based algorithm for optimizing over the efficient set of a bicriteria linear programming problem, Journal of Optimization Theory and Applications, 88:1, (77-105), Online publication date: 1-Jan-1996.
- Thomadakis M and Liu J An efficient steepest-edge simplex algorithm for SIMD computers Proceedings of the 10th international conference on Supercomputing, (286-293)
- Mak W and Wong D Board-level multi-terminal net routing for FPGA-based logic emulation Proceedings of the 1995 IEEE/ACM international conference on Computer-aided design, (339-344)
- Shivakumar N and Widom J User profile replication for faster location lookup in mobile environments Proceedings of the 1st annual international conference on Mobile computing and networking, (161-169)
- Higle J and Sen S (1995). Epigraphical nesting, Journal of Optimization Theory and Applications, 84:2, (339-360), Online publication date: 1-Feb-1995.
- Alizadeh F (1995). Interior Point Methods in Semidefinite Programming with Applications to Combinatorial Optimization, SIAM Journal on Optimization, 5:1, (13-51), Online publication date: 1-Feb-1995.
- Karypis G, Gupta A and Kumar V A parallel formulation of interior point algorithms Proceedings of the 1994 ACM/IEEE conference on Supercomputing, (204-213)
- Wang L, Lai Y, Liu B and Chang T A graph-based simplex algorithm for minimizing the layout size and the delay on timing critical paths Proceedings of the 1993 IEEE/ACM international conference on Computer-aided design, (703-708)
- Almohamad H and Duffuaa S (1993). A Linear Programming Approach for the Weighted Graph Matching Problem, IEEE Transactions on Pattern Analysis and Machine Intelligence, 15:5, (522-525), Online publication date: 1-May-1993.
- Kortanek K (1993). Vector-Supercomputer Experiments with the Primal Affine Linear Programming Scaling Algorithm, SIAM Journal on Scientific Computing, 14:2, (279-294), Online publication date: 1-Mar-1993.
- DeMillo R and Offutt A (1991). Constraint-Based Automatic Test Data Generation, IEEE Transactions on Software Engineering, 17:9, (900-910), Online publication date: 1-Sep-1991.
- (1991). Aggregation and Disaggregation Techniques and Methodology in Optimization, Operations Research, 39:4, (553-582), Online publication date: 1-Aug-1991.
- Basirzadeh H and Kamyad A (1986). An approach for solving of a moving boundary problem, Journal of Applied Mathematics and Computing, 14:1-2, (97-113), Online publication date: 1-Jan-1986.
- Aráoz J and Edmonds J (1985). A case of non-convergent dual changes in assignment problems, Discrete Applied Mathematics, 11:2, (95-102), Online publication date: 1-Jun-1985.
Index Terms
- Linear programming and network flows (2nd ed.)
Recommendations
On linear programming relaxations for solving polynomial programming problems
Highlights- Theoretically compared the tightness of the J-set relaxation with the recursive McCormick relaxations.
AbstractThis paper studies linear programming (LP) relaxations for solving polynomial programming problems. A polynomial programming problem can be equivalently formulated as a quadratically constrained quadratic program (QCQP) by introducing ...
Preemptive Scheduling, Linear Programming and Network Flows
A refinement of the Birkhoff–von Neumann theorem on bistochastic matrices is derived by a simple argument based on network flow theory; this result is then used for solving a problem of preemptive scheduling on unrelated processors with constraints ...
Safe bounds in linear and mixed-integer linear programming
Current mixed-integer linear programming solvers are based on linear programming routines that use floating-point arithmetic. Occasionally, this leads to wrong solutions, even for problems where all coefficients and all solution components are small ...