Preview

A Branch and Bound Algorithm for the Robust Spanning Tree Problem with Interval Data

Better Essays
Open Document
Open Document
5768 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Branch and Bound Algorithm for the Robust Spanning Tree Problem with Interval Data
A branch and bound algorithm for the robust spanning tree problem with interval data
R. Montemanni∗, L.M. Gambardella
Istituto Dalle Molle di Studi sull’Intelligenza Artificiale (IDSIA) Galleria 2, CH-6928 Manno-Lugano, Switzerland

Abstract The robust spanning tree problem is a variation, motivated by telecommunications applications, of the classic minimum spanning tree problem. In the robust spanning tree problem edge costs lie in an interval instead of having a fixed value. Interval numbers model uncertainty about the exact cost values. A robust spanning tree is a spanning tree whose total cost minimizes the maximum deviation from the optimal spanning tree over all realizations of the edge costs. This robustness concept is formalized in mathematical terms and is used to drive optimization. In this paper a branch and bound algorithm for the robust spanning tree problem is proposed. The method embeds the extension of some results previously presented in the literature and some new elements, such as a new lower bound and some new reduction rules, all based on the exploitation of some peculiarities of the branching strategy adopted. Computational results obtained by the algorithm are presented. The technique we propose is up to 210 faster than methods recently appeared in the literature. Keywords: Branch and bound, robust optimization, interval data, spanning tree problem.

1

Introduction

This paper presents a branch and bound algorithm for a robust version of the minimum spanning tree problem where edge costs lie in an interval instead of having a fixed value. Each interval is used to model uncertainty about the real value of the respective cost, which can take any value in the interval, independently from the costs associated with the other edges of the graph. Adopting the model described above, the classic optimality criterion of the minimum spanning tree problem (where a fixed cost is associated with each edge of the graph) does not apply anymore, and



References: [1] I. Aron and P. Van Hentenryck. A constraints satisfaction approach to the robust spanning tree problem with interval data. In preparation. Computer Science Department, Brown University, May 2002. [2] I. Aron and P. Van Hentenryck. On the complexity of the robust spanning tree with interval data. Operations Research Letters, to appear. [3] D.P. Bertsekas and R. Gallagher. Data Networks. Prentice-Hall, Englewood Cliffs, NJ, 1987. [4] A. Cayley. A theorem on trees. Quarterly Journal of Pure and Applied Mathematics, 23:376–378, 1889. [5] J.J. Dongarra. Performance of various computers using standard linear algebra software in a fortran environment. Technical Report CS-89-85, University of Tennessee, July 2003. [6] H.N. Gabow. Two algorithms for generating weighted spanning trees in order. SIAM Journal on Computing, 6(1):139–150, March 1977. 10 [7] P. Kouvelis and G. Yu. Robust Discrete Optimization and its applications. Kluwer Academic Publishers, 1997. [8] G.L. Kozina and V.A. Perepelista. Interval spanning trees problem: solvability and computational complexity. Interval Computations, 1:42–50, 1994. [9] J.B. Kruskal. On the shortest spanning subtree of a graph and the travelling salesman problem. Preceedings of the American Mathematical Society, 7:48–50, 1956. [10] R. Montemanni, L.M. Gambardella, and A.V. Donati. A branch and bound algorithm for the robust shortest path problem with interval data. Operations Research Letters, to appear. [11] R.C. Prim. Shortest connection networks and some generalizations. Bell System Technical Journal, 36:1389–1401, 1957. [12] H. Yaman, O.E. Kara¸an, and M.C. Pinar. The robust spanning tree problem with s ¸ interval data. Operations Research Letters, 29:31–40, 2001. 11

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    Also, applying the original function that is preventing the loop, it is used as a means to secure redundancy of network to automatically switch the path in case of a network failure. There is various kind of spanning tree, including STP, RSTP, PVST, and MSTP. In this section, we will take a look at an implementation of the most basic of STP. Spanning Tree Protocol (STP: IEEE 802.1D) handles a network as a logical tree and by setting all ports for each switch (sometimes called a bridge in this section) to transfer frame or not it suppresses occurrence of broadcast streams packets in a network having a loop structure, figure…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETW204 Assignment 4

    • 691 Words
    • 4 Pages

    Routing problem where an advertised route between two nodes alternates (flaps) back and forth between two paths because of a network problem that causes intermittent interface failures.…

    • 691 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In this way, the assignment algorithm will converge faster without affecting the network performance. The edgetrimming strategy must follow these design objectives:…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Satisfactory Essays

    Pre-Lab Computer Questions

    • 6462 Words
    • 26 Pages

    The bridge on each LAN that provides the minimum path cost to the root bridge…

    • 6462 Words
    • 26 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    Stein, S. S., Gerding, E. H., Rogers, A. C., Larson, K. K., & Jennings, N. R. (2011). Algorithms…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    A network redundant topology where nodes are connected using two concentric rings with four branches.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Battle of Brandywine was fought in Philadelphia on September 11, 1777 during the American Revolution. The enemy was the British soldiers who sought to capture Philadelphia, the revolutionary state. The British came strong with 17,000 troops under the command of General Howe. The Americans, lead by General George Washington were outnumbers with 10,000 militia men. In analyzing this battle, I will discuss several key factors in terms of METT-TC, OAKOC, and the Principles of War that influenced the outcome of the British capturing Philadelphia (To emphasize these principles I will italicize METT-TC, OAKOC).…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    2- Graphical solution to linear programming problems can handle problems that involve any number of decision variables.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Veestel Case Summary

    • 2624 Words
    • 11 Pages

    Analysis of different scenarios yields to the conclusion that the lowest cost is achieved by:…

    • 2624 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Qwertyui

    • 17468 Words
    • 70 Pages

    References: [18] N. I. M. Gould. On practical conditions for the existence and uniqueness of solutions to the general equality quadratic programming problem. Math. Program., 32:90–99, 1985. [19] H. M. Huynh. A Large-Scale Quadratic Programming Solver Based on Block-LU Updates of the KKT System. PhD thesis, Program in Scientific Computing and Computational Mathematics, Stanford University, Stanford, CA, 2008. [20] A. Majthay. Optimality conditions for quadratic programming. Math. Programming, 1:359–365, 1971. [21] J. Nocedal and S. J. Wright. Numerical Optimization. Springer-Verlag, New York, 1999. [22] P. M. Pardalos and G. Schnitger. Checking local optimality in constrained quadratic programming is NP-hard. Oper. Res. Lett., 7(1):33–35, 1988. [23] P. M. Pardalos and S. A. Vavasis. Quadratic programming with one negative eigenvalue is NP-hard. J. Global Optim., 1(1):15–22, 1991. [24] M. J. D. Powell. On the quadratic programming algorithm of Goldfarb and Idnani. Math. Programming Stud., (25):46–61, 1985. [25] J. A. Tomlin. On pricing and backward transformation in linear programming. Math. Programming, 6:42–47, 1974.…

    • 17468 Words
    • 70 Pages
    Good Essays
  • Satisfactory Essays

    Mdmd

    • 786 Words
    • 4 Pages

    4. Graph data & identify best cost driver 5. Estimate cost function & relevant range…

    • 786 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. *13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. *28. *29. *30. 31. 32. 33. 34. Simplex short answer Simplex discussion short answer Simplex short answer Simplex short answer Simplex short answer Simplex short answer 4 tableaus 2 tableaus 3 tableaus 3 tableaus 2 tableaus 5 tableaus 5 tableaus 5 tableaus 6 tableaus 4 tableaus 3 tableaus 3 tableaus 3 tableaus Simplex short answer 3 tableaus 4 tableaus graphical analysis 2 tableaus 2 tableaus 6 tableaus 5 tableaus graphical analysis Mixed constraint model transformation Mixed constraint model transformation 5 tableaus 3 tableaus 3 tableaus 4 tableaus 50. 51. 52. 53. 54. *49. *47. *48. 46. 44. 45. 43. 35. 36. 37. 38. 39. 40. 41. *42. 3 tableaus, multiple optimal 4 tableaus 3 tableaus, multiple optimal 2 tableaus, infeasible 2 tableaus, unbounded 4 tableaus, pivot row and column ties, multiple optimal Infeasible problem Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Dual formation and interpretation, sensitivity analysis Sensitivity analysis, cj and qi Sensitivity analysis with duality Sensitivity analysis with duality Sensitivity analysis with duality…

    • 13392 Words
    • 54 Pages
    Powerful Essays
  • Good Essays

    Linear Programming

    • 1297 Words
    • 6 Pages

    The development of linear programming has been ranked among the most important scientific advances of the mid 20th century. Its impact since the 1950’s has been extraordinary. Today it is a standard tool used by some companies (around 56%) of even moderate size. Linear programming uses a mathematical model to describe the problem of concern. Linear programming involves the planning of activities to obtain an optimal result, i.e., a result that reaches the specified goal best (according to the mathematical model) among all feasible alternatives.…

    • 1297 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    The advantage of range is that it is very simple but the disadvantage is that it ignores the way in which data are distributed.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Problem Tree

    • 1558 Words
    • 7 Pages

    MDF (Editor) (2005): MDF Tool: Problem Tree Analysis. Ede: MDF Training and Consultancy. URL [Accessed: 10.08.2010]. PDF…

    • 1558 Words
    • 7 Pages
    Best Essays

Related Topics