Skip to main content
Log in

Layering strategies for creating exploitable structure in linear and integer programs

  • Published:
Mathematical Programming Submit manuscript

Abstract

The strategy of subdividing optimization problems into layers by splitting variables into multiple copies has proved useful as a method for inducing exploitable structure in a variety of applications, particularly those involving embedded pure and generalized networks. A framework is proposed in this paper which leads to new relaxation and restriction methods for linear and integer programming based on our extension of this strategy. This framework underscores the use of constructions that lead to stronger relaxations and more flexible strategies than previous applications. Our results establish the equivalence of all layered Lagrangeans formed by parameterizing the equal value requirement of copied variables for different choices of the principal layers. It is further shown that these Lagrangeans dominate traditional Lagrangeans based on incorporating non-principal layers into the objective function. In addition a means for exploiting the layered Lagrangeans is provided by generating subgradients based on a simple averaging calculation. Finally, we show how this new layering strategy can be augmented by an integrated relaxation/restriction procedure, and indicate variations that can be employed to particular advantage in a parallel processing environment. Preliminary computational results on fifteen real world zero-one personnel assignment problems, comparing two layering approaches with five procedures previously found best for those problems, are encouraging. One of the layering strategies tested dominated all non-layering procedures in terms of both quality and solution time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. I. Ali, Jeffrey Kennington and Bala Shetty, “The equal flow problem,” Technical Report 85-OR-1, Southern Methodist University (Dallas, TX, 1985).

    Google Scholar 

  2. R.E. Bixby, “Recent algorithms for two versions of graph realization and remarks on applications to linear programming,” in: W.R. Pulleyblank, ed.,Progress in Combinatorial Optimization (1984) 39–67.

  3. R.E. Bixby and W.H. Cunningham, “Converting linear programs to network problems,”Mathematics of Operations Research 5, (1980) 321–357.

    Google Scholar 

  4. R.E. Bixby and Donald K. Wagner, “An almost linear-time algorithm for graph realization,” Technical Report 85-2, Dept. of Mathematical Sciences, Rice University (Houston, TX, 1985).

    Google Scholar 

  5. G.G. Brown, R.D. McBride and R.K. Wood, “Extracting embedded generalized networks from linear programming problems,”Mathematical Programming 32 (1985) 11–31.

    Google Scholar 

  6. C.-H. Chen and M. Enquist, “A primal simplex approach to pure processing networks,” Research Report CCS 496, Center for Cybernetic Studies, University of Texas (Austin, TX, 1985).

    Google Scholar 

  7. R. Crum, D. Klingman and L. Tavis, “An operational approach to integrated working capital planning,”Journal of Economics and Business 35 (1983) 343–378.

    Google Scholar 

  8. George Dantzig,Linear Programming and Extensions (Princeton University Press, Princeton, NJ, 1973).

    Google Scholar 

  9. M. Enquist and C.-H. Chen, “Efficient tree handling procedures for allocation/processing networks,” Research Report CCS 437, Center for Cybernetic Studies, The University of Texas (Austin, TX, 1982).

    Google Scholar 

  10. M. Enquist and C.-H. Chen, “Computational comparison of two solution procedures for allocation/processing networks,”Mathematical Programming Study 26 (1986) 218–220.

    Google Scholar 

  11. R. Farina and F. Glover, “Optimal development and allocation of Colorado's energy resources over the coming decade,”Energy Issues in Colorado's Future, Colorado Energy Research Institute (1980) 161–199.

  12. S. Fujishige, “An efficient PQ-graph algorithm for solving the graph realization problem,”Journal of Computer and System Science 21 (1980) 63–86.

    Google Scholar 

  13. Saul Gass,Linear Programming: Methods and Applications (McGraw-Hill, 1975).

  14. F. Glover, “Creating network structure in lp's,” in: Greenberg and Maybee, ed.,Computer-Assisted Analysis and Model Simplification (Academic Press, 1981) 361–368.

  15. F. Glover, “Surrogate constraints,”Operations Research 16 (1968) 741–749.

    Google Scholar 

  16. F. Glover, R. Glover and F. Martinson, “A netform system for resource planning in the U.S. Bureau of Land Management,”Journal of the Operational Research Society 35 (1984) 605–616.

    Google Scholar 

  17. F. Glover, J. Hultz and D. Klingman, “Improved computer-based planning techniques, part II,”Interfaces 9 (1979) 12–20.

    Google Scholar 

  18. F. Glover, J. Hultz, D. Klingman and J. Stutz, “Generalized networks: A fundamental computer-based planning tool,”Management Science 24 (1978) 1209–1220.

    Google Scholar 

  19. F. Glover, D. Karney and D. Klingman, “A policy evaluation model and prototype computer assisted policy evaluation system for naval personnel management,” Final Technical Report, NPRDC Contract N00123–74-C-2272 (1975).

  20. F. Glover, D. Karney and D. Klingman, “A study of alternative relaxation approaches for a manpower planning problem,” in: Ijiri and Whinston, ed.,Quantitative Planning and Control (Academic Press Inc., New York, NY, 1979).

    Google Scholar 

  21. F. Glover and D. Klingman, “Network applications in industry and government,”AIIE Transactions 9 (1977) 363–376.

    Google Scholar 

  22. F. Glover and F. Martinson, “Linear programming/netform model for vegetation allocation,” in: W. Lauenroth, G. Skogerboe and M. Flug, ed.,Analysis of Ecological Systems: State of the Art in Ecological Modeling (Elsevier Scientific Publishing Co., Denmark, 1982).

    Google Scholar 

  23. F. Glover, D. Klingman and J. Stutz, “Extensions of the augmented predecessor method to generalized network problems,”Transportation Science 7 (1973) 377–384.

    Google Scholar 

  24. F. Glover and J. Mulvey, “Equivalence of the 0-1 integer programming problem to discrete generalized and pure networks,”Operations Research 28 (1980) 829–835.

    Google Scholar 

  25. M. Guignard-Spielberg, “Lagrangean decomposition: An improvement over lagrangean and surrogate duals,” Technical report #62, Wharton School, University of Pennsylvania (Philadelphia, PA, 1984).

    Google Scholar 

  26. M. Guignard and S. Kim, “Lagrangean decomposition: A model yielding stronger lagrangean bounds,” to appear inMathematical Programming.

  27. M. Held, P. Wolfe and H.D. Crowder, “Validation of subgradient optimization,”Mathematical Programming 6 (1974) 62–88.

    Google Scholar 

  28. Paul Jensen and J. Wesley Barnes,Network Flow Programming (John Wiley and Sons, 1980).

  29. Ellis Johnson, “Flows in networks,” in: Elmaghraby and Moder, ed.,Handbook of Operations Research (Van Nostrand Rheinhold, 1979) 183–206.

  30. J. Koene, “Minimal cost flow in processing networks, a primal approach,” Ph.D. thesis, Eindhoven University of Technology (Eindhoven, The Netherlands, 1982).

    Google Scholar 

  31. A. Manne, R. Richels and J. Weynant, “Energy policy modeling: A survey,”Operations Research 27 (1979) 1–36.

    Google Scholar 

  32. R. McBride, “Solving generalized processing network problems,” Working paper, School of Business, University of California (Los Angeles, CA, 1982).

    Google Scholar 

  33. D. Phillips and A. Garcia-Diaz,Fundamentals of Network Analysis, Prentice-Hall (New York, NY, 1981).

    Google Scholar 

  34. F. Shepardson and R. Marsten, “A lagrangean relaxation algorithm for the two duty period scheduling problem,”Management Science 26 (1980) 274–281.

    Google Scholar 

  35. E. Steinberg and H. Napier, “Optimal multi-level lot sizing for requirements planning systems,”Management Science 26 (1980) 1258–1271.

    Google Scholar 

  36. K. Truemper, “How to detect hidden networks and totally-unimodular subsections of linear programs,” TIMS/ORSA Joint National Meeting (April 1983).

  37. D.K. Wagner, “An almost linear-time graph realization algorithm,” Ph.D. dissertation, Northwestern University (Evanston, II, 1983).

    Google Scholar 

  38. Harvey Wagner,Principles of Operations Research (Prentice-Hall, New York, NY, 1969).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

This research was supported in part by the Office of Naval Research Contract N00014-78-C-0222 with the Center for Business Decision Analysis and by the US Department of Agriculture Contract 51-3142-4020 with Management Science Software Systems.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Glover, F., Klingman, D. Layering strategies for creating exploitable structure in linear and integer programs. Mathematical Programming 40, 165–181 (1988). https://doi.org/10.1007/BF01580728

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01580728

Key words

Navigation