scispace - formally typeset
D

David Pisinger

Researcher at Technical University of Denmark

Publications -  175
Citations -  12726

David Pisinger is an academic researcher from Technical University of Denmark. The author has contributed to research in topics: Knapsack problem & Network planning and design. The author has an hindex of 45, co-authored 175 publications receiving 10799 citations. Previous affiliations of David Pisinger include University of Copenhagen & University of Copenhagen Faculty of Science.

Papers
More filters

Liner Shipping Revenue Management with Respositioning of Empty Containers

TL;DR: This paper presents a revenue management model for a liner shipping company where the repositioning of empty containers is taken into account and outperforms solving the LP relaxed arc flow model with the CPLEX barrier solver even for very small instances.
Journal ArticleDOI

Baggage Carousel Assignment at Airports: Model and Case Study

TL;DR: A static model is introduced that fulfills the different real-world requirements and balances the different objective criteria and is shown how the model can be used in the dynamic environment of an airport.

Separation and extension of cover inequalities for second-order conic knapsack constraints with GUBs

TL;DR: A number of separation and extension algorithms which make use of the extra structure implied by the generalized upper bound constraints in order to strengthen the second-order conic equivalent of the classic cover cuts are described and compared.
Journal ArticleDOI

Optimal wafer cutting in shuttle layout problems

TL;DR: An exact algorithm for solving the minimum cutting plan problem, given a floorplan of the dies, is presented, based on delayed column generation, where the pricing problem becomes a maximum vertex-weighted clique problem in which each clique consists of cutting compatible dies.
Journal ArticleDOI

Avoiding anomalies in the mt2 algorithm by Martello and Toth

TL;DR: It is shown that the anomalous behavior of the mt 2 algorithm is due to an a-priori identification of the so-called core, and by evading the solution of the core problem, the algorithm is able to avoid the anomalies.