Wiley Encyclopedia of Operations Research and Management Science 2011
DOI: 10.1002/9780470400531.eorms0443
|View full text |Cite
|
Sign up to set email alerts
|

Klimov'sModel

Abstract: The Klimov model concerns the optimal dynamic scheduling of a multiclass M/G/1 queue with general Bernoulli feedback of jobs and linear holding costs. In his seminal 1974 paper, Klimov established the optimality of a static priority‐index rule for such a model under the average cost criterion and gave an adaptive‐greedy index algorithm, via a novel linear programming approach. The model has rich and insightful connections with stochastic scheduling and bandit problems, and has found use in a wide variety of ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 66 publications
0
1
0
Order By: Relevance
“…This has its early roots in Klimov's algorithm in [36] for calculating the optimal priority indices for scheduling a multiclass queue with Bernoulli feedback, which was extended in [37] to a framework of stochastic scheduling systems satisfying so-called generalized conservation laws, such as the classic (non-restless) multi-armed bandit problem and branching bandits. See also [38,39]. Yet, the aforementioned work has not addressed the efficient computational implementation of such an algorithm, which is necessary for its actual deployment and widespread application.…”
Section: Introductionmentioning
confidence: 99%
“…This has its early roots in Klimov's algorithm in [36] for calculating the optimal priority indices for scheduling a multiclass queue with Bernoulli feedback, which was extended in [37] to a framework of stochastic scheduling systems satisfying so-called generalized conservation laws, such as the classic (non-restless) multi-armed bandit problem and branching bandits. See also [38,39]. Yet, the aforementioned work has not addressed the efficient computational implementation of such an algorithm, which is necessary for its actual deployment and widespread application.…”
Section: Introductionmentioning
confidence: 99%