Problem definition: : Multistage stochastic programming is a well-established framework for sequential decision making under uncertainty by seeking policies that can be dynamically adjusted as uncertainty is realized....
详细信息
Problem definition: : Multistage stochastic programming is a well-established framework for sequential decision making under uncertainty by seeking policies that can be dynamically adjusted as uncertainty is realized. Often, for example, because of contractual constraints, such flexible policies are not desirable, and the decision maker may need to commit to a set of actions for a certain number of periods. Two-stage stochastic programming might be better suited to such settings, where first-stage decisions do not adapt to the uncertainty realized. In this paper, we propose a novel alternative approach, named as adaptive two-stage stochastic programming, where each component of the decision policy requiring limited flexibility has its own revision point, a period prior to which the decisions are determined at the beginning of the planning until this revision point, and after which they are revised for adjusting to the uncertainty realized thus far until the end of the planning. We then analyze this approach over the capacity expansion planning problem, that may require limited flexibility over expansion decisions. Methodology/results: : We provide a generic mixed-integer programming formulation for the adaptive two-stage stochastic programming problem with finite support, in particular, for scenario trees, and show that this problem is NP-hard in general. Next, we focus on the capacity expansion planning problem and derive bounds on the value of adaptive two-stage programming in comparison with the two-stage and multistage approaches in terms of revision points. We propose several heuristic solution algorithms based on this bound analysis. These algorithms either provide approximation guarantees or computational advantages in solving the resulting adaptive two-stage stochastic problem. Managerial implications: : We provide insights on the choice of the revision times based on our analytical analysis. We further present an extensive computational study on a generatio
Traditional target coverage only ensures monitoring of targets. However, as people's security awareness increases, the requirement for target coverage also increases from monitoring to identification. Thus full-vi...
详细信息
Traditional target coverage only ensures monitoring of targets. However, as people's security awareness increases, the requirement for target coverage also increases from monitoring to identification. Thus full-view coverage model is proposed to guarantee that any facing direction of a target could be covered. Based on this coverage model, we study the maximum full-view target coverage problem in camera sensor networks, where each camera sensor has P working directions, aiming at maximizing the number of full-view covered targets by scheduling the working directions of camera sensors. To solve this problem, we design a (1 - 1/e)-approximation algorithm based on pipage rounding and an efficient heuristic algorithm. Finally, simulation results are presented to demonstrate the performance of our algorithms. (C) 2019 Elsevier B.V. All rights reserved.
The minimum total domination problem and the minimum total restrained domination problem are classical combinatorial optimization problems. In this paper, we first show that the decision versions of both the minimum t...
详细信息
The minimum total domination problem and the minimum total restrained domination problem are classical combinatorial optimization problems. In this paper, we first show that the decision versions of both the minimum total domination problem and the minimum total restrained domination problem are NP-complete for grid graphs (a subclass of unit disk graphs), thereby strengthening the result on the total domination decision problem in unit disk graphs established by Jena et al. (2021). Then, we present a linear-time 6.387approximation algorithm for the minimum total domination problem in unit disk graphs, improving upon the previous algorithm with a ratio of 8 by Jena et al. (2021). Finally, we propose a linear-time 10.387-approximation algorithm and a PTAS for the minimum total restrained domination problem in unit disk graphs. (c) 2024 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
We are given a set of m identical parallel machines and a set of n jobs in large computing systems, where each job J(j) consists of a bag of bj identical tasks with a processing time p(j), and has a rejection penalty ...
详细信息
We are given a set of m identical parallel machines and a set of n jobs in large computing systems, where each job J(j) consists of a bag of bj identical tasks with a processing time p(j), and has a rejection penalty wj. Job J(j )is either accepted in which case all the b(j) tasks must be processed by one of the machines, or rejected which incurs a rejection penalty w(j). The problem of bag-of-tasks scheduling with rejection is to find a feasible schedule, so as to minimize the makespan plus the total rejection penalty of all rejected jobs. In this paper, we present a polynomial time approximation scheme.
In this paper, we study how to fairly allocate a set of m indivisible chores to a group of n agents, each of which has a general additive cost function on the items. Since envy-free (EF) allocations are not guaranteed...
详细信息
In this paper, we study how to fairly allocate a set of m indivisible chores to a group of n agents, each of which has a general additive cost function on the items. Since envy-free (EF) allocations are not guaranteed to exist, we consider the notion of envy-freeness up to any item (EFX). In contrast to the fruitful results regarding the (approximation of) EFX allocations for goods, very little is known for the allocation of chores. Prior to our work, for the allocation of chores, it is known that EFX allocations always exist for two agents or general number of agents with identical ordering cost functions. For general instances, no non-trivial approximation result regarding EFX allocation is known. In this paper, we make progress in this direction by providing several polynomial time algorithms for the computation of EFX and approximately EFX allocations. We root show that for three agents we can always compute a (2 + 6) -approximation of EFX allocation. For n >= 4 agents, our algorithm always computes a (3n2 - n) -approximation. We also study the bi-valued instances, in which agents have at most two cost values on the chores. For three agents, we provide an algorithm for the computation of EFX allocations. For n >= 4 agents, we present algorithms for the computation of partial EFX allocations with at most (n - 1) unallocated items;and (n - 1) -approximation of EFX allocations.
Previous studies on Approximate Near-Neighbors Search (ANNS) among curves are either focused on curves in R-1 or under the discrete Frechet distance. In this paper, we propose the first data structure for curves under...
详细信息
Previous studies on Approximate Near-Neighbors Search (ANNS) among curves are either focused on curves in R-1 or under the discrete Frechet distance. In this paper, we propose the first data structure for curves under the (continuous) Frechet distance in higher dimensions. Given a set P of n curves each with number of vertices at most m in R-d, and a fixed delta > 0, we aim to preprocess P into a data structure so that for any given query curve Q with k vertices, we can efficiently report all curves in P whose Frechet distances to Q are at most delta. In the case that k is given in the preprocessing stage, for any epsilon > 0 we propose a deterministic data structure whose space is n center dot O (max{(root d/epsilon)(kd), (D root d/epsilon(2))(kd)}) that can answer (1 + epsilon)delta-ANNS queries in O (kd) query time, where D is the diameter of P. Considering k as part of the query slightly changes the space to n center dot O (1/epsilon)(md) with O (kd) query time within an approximation factor of 5 + epsilon. Moreover, we show that our generic data structure for ANNS can give an alternative treatment of the approximate subtrajectory range searching problem studied by de Berg et al. [1]. (c) 2023 Elsevier B.V. All rights reserved.
In this article we study graphs with inductive neighborhood properties. Let P be a graph property, a graph G = (V, E) with n vertices is said to have an inductive neighborhood property with respect to P if there is an...
详细信息
In this article we study graphs with inductive neighborhood properties. Let P be a graph property, a graph G = (V, E) with n vertices is said to have an inductive neighborhood property with respect to P if there is an ordering of vertices v(1), ... , v(n) such that the property P holds on the induced subgraph G[N(v(i)) boolean AND V-i], where N(v(i)) is the neighborhood of v(i) and V-i = {v(i), ... , v(n)}. It turns out that if we take P as a graph with maximum independent set size no greater than k, then this definition gives a natural generalization of both chordal graphs and (k + 1)-claw-free graphs. We refer to such graphs as inductive k-independent graphs. We study properties of such families of graphs, and we show that several natural classes of graphs are inductive k-independent for small k. In particular, any intersection graph of translates of a convex object in a two dimensional plane is an inductive 3-independent graph;furthermore, any planar graph is an inductive 3-independent graph. For any fixed constant k, we develop simple, polynomial time approximation algorithms for inductive k-independent graphs with respect to several well-studied NP-complete problems. Our generalized formulation unifies and extends several previously known results.
Segment routing (SR) combines the advantages of source routing powered by software-defined networking (SDN) paradigm and hop-by-hop routing in legacy network infrastructure. The recent applications of SR in multi-doma...
详细信息
Segment routing (SR) combines the advantages of source routing powered by software-defined networking (SDN) paradigm and hop-by-hop routing in legacy network infrastructure. The recent applications of SR in multi-domain network and service function chaining (SFC) entail the efficient use of multiple segments. However, because of the computation inefficiency, it is nearly impossible to accurately evaluate whether and to what extent various types of networks will benefit from SR with multiple segments using conventional approaches. In this paper, we propose a flexible Q-SR framework as well as its formulation in order to fully explore the potential of SR from an algorithmic perspective. The framework is highly extensible to design and evaluate algorithms that can be adapted to various network topologies and traffic matrices. For the offline setting, we develop a fully polynomial time approximation scheme (FPTAS) which can find a (1 +w) approximation solution for any specified w > 0 in time that is a polynomial function of the network size. To the best of our knowledge, the proposed FPTAS is the first algorithm that can compute arbitrarily accurate solution. For the online setting, we develop an online primal-dual algorithm that is proven to be O(1)-competitive and violates link capacities by a factor of O(logn), where n is the node number of the network. For the proposed approximation algorithms, we prove theoretical performance bounds and conduct extensive simulations on synthetic and realistic networks to analyze SR related and algorithmic parameters and validate the computation efficiency in both offline and online scenarios.
We consider to design approximation algorithms for the survivable network design problem in hypergraphs (SNDPHG) based on algorithms developed for the survivable network design problem in graphs (SNDP) or the element ...
详细信息
We consider to design approximation algorithms for the survivable network design problem in hypergraphs (SNDPHG) based on algorithms developed for the survivable network design problem in graphs (SNDP) or the element connectivity problem in graphs (ECP). Given an instance of the SNDPHG. by replacing each hyperedge e = {v(1),...,v(k)} with a new vertex omega(e) and k edges {omega(e),nu(1)},...,{omega(e),nu(k)} we define an SNDP or ECP in the resulting graph. We show that by approximately solving the. SNDP or ECP defined in this way, several approximation algorithms for the SNDPHG can be obtained. One of our results is a d(max)(+)-approximation algorithm for the SNDPHG with d(max) less than or equal to 3, where d(max) (resp. d(max)(+)) is the maximum degree of hyperedges (resp. hyperedges with positive cost). Another is a d(max)(+)H(r(max))-approximation algorithm for the SNDPHG, where H(i) = Sigma(j=1)(l) 1/j is the harmonic function and r(max) is the maximum connectivity requirement.
We study the mathematical concept of the strength of a graph as defined by Cunningham to partition very large graphs. The strength is the objective value of an attack problem on a graph where the striker aims at divid...
详细信息
We study the mathematical concept of the strength of a graph as defined by Cunningham to partition very large graphs. The strength is the objective value of an attack problem on a graph where the striker aims at dividing the graph into a maximum number of connected components removing as few edges as possible per component uncoupled. The strength is the optimal number of edges per component uncoupled or, in the weighted version, the sum of the weights of the edges removed per component uncoupled. Given a connected graph with n vertices and m weighted edges, we denote by W the total sum of the integer weights, and we describe an algorithm that approximates within a factor of 1 + epsilon the weighted strength in time O(m log(W) log(3)(n)/epsilon(2)), and that can be implemented with O(m) memory use if we allow a complexity of O(m log(2)(W) log(3)(n)/epsilon(2)). This result has several important applications, in particular for the detection of dense areas of a graph, in terms of weighted edges, which in turn can be used for spam detection, community identification, and partitioning.
暂无评论