1988
DOI: 10.1007/bf01580728
|View full text |Cite
|
Sign up to set email alerts
|

Layering strategies for creating exploitable structure in linear and integer programs

Abstract: The strategy of subdividing optimization problems into layers by splitting variables into multiple copies has proved useful as a method for inducing exploitable structure in a variety of applications, particularly those involving embedded pure and generalized networks. A framework is proposed in this paper which leads to new relaxation and restriction methods for linear and integer programming based on our extension of this strategy. This framework underscores the use of constructions that lead to stronger rel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

1990
1990
2013
2013

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 23 publications
1
13
0
Order By: Relevance
“…• This resuit was also proved independently by [Glover and Klingman (1984)] and [Jörnsten, Nàsberg and Smeds (1985)]. …”
Section: V(lr V O)supporting
confidence: 53%
“…• This resuit was also proved independently by [Glover and Klingman (1984)] and [Jörnsten, Nàsberg and Smeds (1985)]. …”
Section: V(lr V O)supporting
confidence: 53%
“…I personally think that that name describes only the first stage of the process, and hides the ensuing dualization, but I also must admit that Lagrangean Decomposition isn't a perfect name either, first because LR may yield decomposed subproblems even without the copying trick, for instance, when one dualizes all linking constraints, and second because one could make copies of variables and still not get a decomposable problem, as in the paper by Glover and Klingman (1988) that appeared in Mathematical Programming at roughly the same time as ours.…”
Section: Fig 1 Geometric Interpretation Of Lagrangean Decompositionmentioning
confidence: 95%
“…A growing body of research is dedicated to detecting network structures that may be hidden inside more complex models [Bixby 1984;Bixby and Wagner 1985;Brown, McBride and Wood 1985;Truemper 1983]. This has led more recently to research into creating these and other netform structures in problem settings where they may not otherwise be found [Glover and Klingman 1988a].…”
Section: Future Directionsmentioning
confidence: 99%