scispace - formally typeset
Search or ask a question

Showing papers in "Electronic Notes in Discrete Mathematics in 2013"


Journal ArticleDOI
TL;DR: FCA explicitly formalises extension and intension of a concept, their mutual relationships, and the fact that increasing intent implies decreasing extent and vice versa, and allows to derive a concept hierarchy from a given dataset.

2,029 citations


Journal ArticleDOI
TL;DR: This work proposes an integer linear programming formulation (ILP) and develops a matheuristic based on the decomposition of the ILP formulation into two problems which are equivalent to a Multi-depot Traveling Salesman Problem with Time Windows.

76 citations


Journal ArticleDOI
TL;DR: This work takes as base model a Markovian formulation of a closed queuing network with finite buffer and time dependent service time, and discusses heuristics: a scenario approach, a fluid approximation, simplified stochastic models and asymptotic approximations.

49 citations


Journal ArticleDOI
TL;DR: This problem is here addressed by a simple, but efficient tabu search approach which had improved several upper bounds of the considered instances.

34 citations


Journal ArticleDOI
TL;DR: Lower bounds based on a Dantzig-Wolfe decomposition and column generation as well as upper bounds obtained by an evolutionary local search approach (ELS) are presented.

33 citations


Journal ArticleDOI
TL;DR: This paper outlines various procedures for estimating maximum likelihood (ML) via the expectation-maximization (EM) algorithm, the computationally efficient minimum discrepancy (MD) estimation as well as MDML, a hybrid method combining the two approaches.

33 citations


Journal ArticleDOI
TL;DR: An integrated approach, based on the column generation technique, is proposed to solve the planning and routing problem and preliminary results on real data show the effectiveness of the proposed approach.

27 citations


Journal ArticleDOI
TL;DR: Computational results on real instances show that pattern generation policies are crucial to address scheduling and routing in large Home Care instances.

25 citations


Journal ArticleDOI
TL;DR: Explicit constructions in Extremal graph theory give appropriate lower bound for Turan type problems as mentioned in this paper, and explicit constructions can be used in various problems of Information Security, such as cyber-attacks.

25 citations


Journal ArticleDOI
TL;DR: It is shown that several P 3 ⁎ -convexity parameters (hull number, convexity number, Caratheodory number, Radon number, interval number and percolation time) are NP-hard even on bipartite graphs.

23 citations


Journal ArticleDOI
TL;DR: This work proposes to model the resulting problem of balancing the load of the stations as a General Pickup and Delivery Problem, and discusses possible heuristic approaches both for the static (offline) and the dynamic (online) version of the problem, and gives approximation results.

Journal ArticleDOI
TL;DR: Some new ideas are presented which appear to significantly reduce computational times while solving to optimality even large instances.

Journal ArticleDOI
TL;DR: A game-theoretic approach to optimize the strategies of toll enforcement on a motorway network with an arbitrary topology is presented, and it is shown that a Nash equilibrium can be computed with an LP and a MIP for the computation of a Stackelberg equilibrium.

Journal ArticleDOI
TL;DR: A mixed-integer linear program (MILP), a cutting plane algorithm, and a column-and-cut algorithm that add constraints to repair vulnerabilities in partial network designs are presented.

Journal ArticleDOI
TL;DR: A Pareto local search algorithm is proposed for the biobjective version of the adjacent only quadratic minimum spanning tree problem where the costs of interaction effects between every pair of adjacent edges are included in the objective function.

Journal ArticleDOI
TL;DR: This paper presents a mathematical formulation based on a binary variable for each potential crew and aircraft route, and describes a column-generation algorithm for obtaining heuristic solutions, and gives computational results on real-world instances.

Journal ArticleDOI
TL;DR: This paper approximate the DRSSPP with a semidefinite programming problem, which is solvable in polynomial time and provides tight lower bounds and the objective is to minimize the sum of the path cost and the expected path delay penalty.

Journal ArticleDOI
TL;DR: An upper bound on the modularity of r-regular graphs as a function of the edge expansion (or isoperimetric number) under the restriction that each part in the authors' partition has a sub-linear numbers of vertices is given.

Journal ArticleDOI
TL;DR: Upper bounds are established on the number of all 2- and 3-dimensional simplices induced by a set of n points P ⊂ R 3 which satisfy the condition that the lengths of their sides belong to the set of k largest distances determined by P.

Journal ArticleDOI
TL;DR: This paper focuses on the class [⌞] (the edge intersection graphs of ⌞-shapes) and shows that testing for membership in [�OO�] is NP-complete, and gives a characterization and polytime recognition algorithm for special subclasses of Split ∩ [ �OO� ].

Journal ArticleDOI
TL;DR: This is the first work dedicated to the exact resolution of m-CTP, and preliminary computational experiments suggest that both the lower bounds provided by the formulation behind BP and the CGH upper bounds are of good quality.

Journal ArticleDOI
TL;DR: A reformulation that allows stronger linear programming bounds to be computed in a particular case of the quadratic minimum spanning tree problem in which interaction costs only apply for adjacent edges is introduced.

Journal ArticleDOI
TL;DR: This paper proves the Harary-Hill conjecture for monotone drawings of Kn, that is, drawings where all vertices have different x-coordinates and the edges are x-monotone curves.

Journal ArticleDOI
TL;DR: This work addresses the network routing problem where, given a graph with arc capacities and a set of origin-destination pairs with unknown demands, one must route each commodity over a single path so as to maximize the throughput, subject to the constraint that the flows are allocated according to the MMF principle.

Journal ArticleDOI
TL;DR: A new variant of the connected facility location problem that allows for modeling mixed deployment strategies (FTTC/FTTB/FTTH) in the design of local access telecommunication networks is introduced.

Journal ArticleDOI
TL;DR: A capacitated multiple allocation hub location problem, which arose from a network design problem in German wagonload traffic, is presented and heuristic solution approaches based on local improvements and CPLEX are developed.

Journal ArticleDOI
TL;DR: This work defines μ-density as a characteristic of quality for the kind of coverings codes called multiple coverings of the farthest-off points (MCF) in projective spaces P G ( N, q ) and proposes Constructions of small ( 1, μ ) -saturating sets improving the probabilistic bound.

Journal ArticleDOI
TL;DR: A mixed integer linear programming formulation stemming from network flow optimization is used to construct a heuristic based on limiting the total number of interconnecting paths when implementing fiber duct sharing, and a disintegration heuristic involving the construction of valid clusters from the output of a k means algorithm is proposed.

Journal ArticleDOI
TL;DR: A new type of upper bound for the smallest size t 2 ( 2 , q ) of a complete arc in the projective plane P G ( 2, q ) is proposed and an algorithm FOP using any fixed order of points in P G (-2, q) for constructing complete arcs is proposed.

Journal ArticleDOI
TL;DR: This work proposes a conjecture on combinatorial characterization of N + -perfect graphs and makes progress towards such a full combinatorsial characterization by establishing a new, close relationship among N +-perfect graphs, near-bipartite graphs and a newly introduced concept of full-support-perfect graph.