SlideShare a Scribd company logo
On Solving Covering Problems
33rd DAC, June 5, 1996
Olivier Coudert
Synopsys, Inc.
Summary
Introduction
Branch-and-bound
Lower Bound Computation
Experiments & Conclusion
Binate Covering Problem
Input:
Output:
 A Boolean function f(y1, ..., yn)
 A cost function Cost on the assignment of the yk’s
 A minimum cost n-tuple satisfying f
Binate Covering Problem
f = y2y3 + (y1 y4)⊕
Cost(yk = 0) = 0
Cost(yk = 1) = 1
y1 + y3 + y4
y2 + y3 + y4
y2 + y3 + y4
y1 + y2 + y4
y3y1 y2 y4
1
1
0
1
0
0
1
1
1
0
1
0
Minimum solutions:
y1 = 1, y2 = y3 = y4 = 0
y1 = y2 = y3 = 0, y4 = 1
Binate Covering Problem
 2-level Boolean function and relation minimization
 State minimization
 DAG covering
 Exact encoding
 3-level NAND minimization
 ....
Summary
Introduction
Branch-and-bound
Lower Bound Computation
Experiments & Conclusion
Branch-and-bound Resolution
y1 y2 y3 y4
0
1
1
0
1
1
0
1
x1
x2
x3
y1
0
1
y3 y4
1
0x1
x2
y2=0
y3
1x2
y1=0
y4
0x1
y1=1
y1
x3
1
y3 y4
1
1 1
x2
y2=1
y1
x3
1
y3
1
1
x2
y4=0
y1
1
y3
1x2
y4=1
Branch-and-bound Resolution

Pruning technique
Lower bound computation
Summary
Introduction
Branch-and-bound
Lower Bound Computation
Experiments & Conclusion
Independent Set Based Lower Bound
x4x1
x5
x2
x3
y1 y2 y3 y4
x1
x2
x3
x4
x5
1 1
1
0
0
1
10
0
1
1
1
0
1
Cost(yk = 0) = 2
Cost(yk = 1) = 3
Optimum Independent Set
x1
x2
x3
x4
x5
x6
1
1
1 1 1 1
1
1
1
1
1
1
1 1 1
1
1
1
1
1
1 1
1
1
1
1
1
1
1 1
x1
x2
x3
x4
x5
x6
Solution is n/2, while the lower bound is only 1
Optimum Ind. Set Based Lower Bound
The optimum independent set based lower bound
is NP-complete
… and can be arbitrary far from
the minimum covering solution

Greedy Independent Set
Select the minimum degree vertex
Greedy Independent Set
2n+1 vertices
1
n n
Independent set
(n)
(n+1)
(2n-1)
Greedy: 2
Maximum: n
Greedy Ind. Set Based Lower Bound
The greedy independent set based lower bound
can be arbitrary far from
the optimum independent set based lower bound

..., which itself
can be arbitrary far from
the minimum covering solution

1
x7 1 1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
x1
x2
x3
x4
x5
x6
1
1
1
1
1
1
1
11
x7 1 1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
x1
x2
x3
x4
x5
x6
1
1
1
1
1
1
1
1
Greedy
Log-approximation of Covering
Optimal≤ log(|X|) ∗≥Optimal
Greedy
log(|X|)
Which Lower Bound is Better?
Greedy Independent set based
Greedy solution based
arbitrary far from the optimal solution
within log(|X|) of the optimal solution
can take advantage of limit lower bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
Limit Lower Bound
further prune
Limit Lower Bound
Takes advantage of an independent set based lower bound
to the search spacefurther prune
Can reduce the search space
by 1000


Which Lower Bound is Better?
Greedy Independent set based
Greedy solution based
arbitrary far from the optimal solution
within log(|X|) of the optimal solution
can take advantage of limit lower bound
Summary
Introduction
Branch-and-bound
Lower Bound Computation
Experiments & Conclusion
1
10
100
1000
10000
100000
1000000
Standart
Scherzo
CPU improvement from x10 to x1000

More Related Content

What's hot

Constrained Maximization
Constrained MaximizationConstrained Maximization
Constrained Maximization
GlennAnthony7
 
LINEAR PROGRAMMING
LINEAR PROGRAMMINGLINEAR PROGRAMMING
LINEAR PROGRAMMING
Er Ashish Bansode
 
Math powerpoint- Polynomial equations and graph of polynomial functions
Math powerpoint- Polynomial equations and graph of polynomial functionsMath powerpoint- Polynomial equations and graph of polynomial functions
Math powerpoint- Polynomial equations and graph of polynomial functions
Jana Marie Aguilar
 
2.3 Operations that preserve convexity & 2.4 Generalized inequalities
2.3 Operations that preserve convexity & 2.4 Generalized inequalities2.3 Operations that preserve convexity & 2.4 Generalized inequalities
2.3 Operations that preserve convexity & 2.4 Generalized inequalities
RyotaroTsukada
 
5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...
5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...
5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...
RyotaroTsukada
 
Linear programming using the simplex method
Linear programming using the simplex methodLinear programming using the simplex method
Linear programming using the simplex methodShivek Khurana
 
5. advance topics in lp
5. advance topics in lp5. advance topics in lp
5. advance topics in lp
Hakeem-Ur- Rehman
 
Two phase method lpp
Two phase method lppTwo phase method lpp
Two phase method lpp
Anurag Srivastava
 
Simplex Method
Simplex MethodSimplex Method
Simplex MethodSachin MK
 
Rabbit challenge 3 DNN Day1
Rabbit challenge 3 DNN Day1Rabbit challenge 3 DNN Day1
Rabbit challenge 3 DNN Day1
TOMMYLINK1
 
23 industrial engineering
23 industrial engineering23 industrial engineering
23 industrial engineeringmloeb825
 
Bounded variables new
Bounded variables newBounded variables new
Bounded variables newSamo Alwatan
 
4.1 implicit differentiation
4.1 implicit differentiation4.1 implicit differentiation
4.1 implicit differentiationdicosmo178
 
Ece3075 a 8
Ece3075 a 8Ece3075 a 8
Ece3075 a 8
Aiman Malik
 
Simplex method - Maximisation Case
Simplex method - Maximisation CaseSimplex method - Maximisation Case
Simplex method - Maximisation CaseJoseph Konnully
 
How good are interior point methods? Klee–Minty cubes tighten iteration-compl...
How good are interior point methods? Klee–Minty cubes tighten iteration-compl...How good are interior point methods? Klee–Minty cubes tighten iteration-compl...
How good are interior point methods? Klee–Minty cubes tighten iteration-compl...
SSA KPI
 

What's hot (19)

Constrained Maximization
Constrained MaximizationConstrained Maximization
Constrained Maximization
 
LINEAR PROGRAMMING
LINEAR PROGRAMMINGLINEAR PROGRAMMING
LINEAR PROGRAMMING
 
Math powerpoint- Polynomial equations and graph of polynomial functions
Math powerpoint- Polynomial equations and graph of polynomial functionsMath powerpoint- Polynomial equations and graph of polynomial functions
Math powerpoint- Polynomial equations and graph of polynomial functions
 
Jejemon
JejemonJejemon
Jejemon
 
2.3 Operations that preserve convexity & 2.4 Generalized inequalities
2.3 Operations that preserve convexity & 2.4 Generalized inequalities2.3 Operations that preserve convexity & 2.4 Generalized inequalities
2.3 Operations that preserve convexity & 2.4 Generalized inequalities
 
Dual simplexmethod
Dual simplexmethodDual simplexmethod
Dual simplexmethod
 
5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...
5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...
5.4 Saddle-point interpretation, 5.5 Optimality conditions, 5.6 Perturbation ...
 
Simplex two phase
Simplex two phaseSimplex two phase
Simplex two phase
 
Linear programming using the simplex method
Linear programming using the simplex methodLinear programming using the simplex method
Linear programming using the simplex method
 
5. advance topics in lp
5. advance topics in lp5. advance topics in lp
5. advance topics in lp
 
Two phase method lpp
Two phase method lppTwo phase method lpp
Two phase method lpp
 
Simplex Method
Simplex MethodSimplex Method
Simplex Method
 
Rabbit challenge 3 DNN Day1
Rabbit challenge 3 DNN Day1Rabbit challenge 3 DNN Day1
Rabbit challenge 3 DNN Day1
 
23 industrial engineering
23 industrial engineering23 industrial engineering
23 industrial engineering
 
Bounded variables new
Bounded variables newBounded variables new
Bounded variables new
 
4.1 implicit differentiation
4.1 implicit differentiation4.1 implicit differentiation
4.1 implicit differentiation
 
Ece3075 a 8
Ece3075 a 8Ece3075 a 8
Ece3075 a 8
 
Simplex method - Maximisation Case
Simplex method - Maximisation CaseSimplex method - Maximisation Case
Simplex method - Maximisation Case
 
How good are interior point methods? Klee–Minty cubes tighten iteration-compl...
How good are interior point methods? Klee–Minty cubes tighten iteration-compl...How good are interior point methods? Klee–Minty cubes tighten iteration-compl...
How good are interior point methods? Klee–Minty cubes tighten iteration-compl...
 

Similar to On Solving Covering Problems

Integer Programming PPt.ernxzamnbmbmspdf
Integer Programming PPt.ernxzamnbmbmspdfInteger Programming PPt.ernxzamnbmbmspdf
Integer Programming PPt.ernxzamnbmbmspdf
Raja Manyam
 
Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research
Derbew Tesfa
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower bounds
Rajendran
 
LP special cases and Duality.pptx
LP special cases and Duality.pptxLP special cases and Duality.pptx
LP special cases and Duality.pptx
Snehal Athawale
 
Bayseian decision theory
Bayseian decision theoryBayseian decision theory
Bayseian decision theorysia16
 
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Yandex
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
Dr. C.V. Suresh Babu
 
Unit-2 Branch & Bound Design of Algorithms.ppt
Unit-2 Branch & Bound Design of Algorithms.pptUnit-2 Branch & Bound Design of Algorithms.ppt
Unit-2 Branch & Bound Design of Algorithms.ppt
HarjotDhillon8
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function
홍배 김
 
lecture on support vector machine in the field of ML
lecture on support vector machine in the field of MLlecture on support vector machine in the field of ML
lecture on support vector machine in the field of ML
AkashVerma639361
 
Mathematical linear programming notes
Mathematical linear programming notesMathematical linear programming notes
Mathematical linear programming notes
Tarig Gibreel
 
Chapter 2. Constrained Optimization lecture note.pdf
Chapter 2. Constrained Optimization lecture note.pdfChapter 2. Constrained Optimization lecture note.pdf
Chapter 2. Constrained Optimization lecture note.pdf
almazwmbashira
 
Special Cases in Simplex Method
Special Cases in Simplex MethodSpecial Cases in Simplex Method
Special Cases in Simplex Method
Divyansh Verma
 
CiE 2010 talk
CiE 2010 talkCiE 2010 talk
CiE 2010 talkilyaraz
 
super vector machines algorithms using deep
super vector machines algorithms using deepsuper vector machines algorithms using deep
super vector machines algorithms using deep
KNaveenKumarECE
 
Matematika ekonomi slide_optimasi_dengan_batasan_persamaan
Matematika ekonomi slide_optimasi_dengan_batasan_persamaanMatematika ekonomi slide_optimasi_dengan_batasan_persamaan
Matematika ekonomi slide_optimasi_dengan_batasan_persamaanUfik Tweentyfour
 
2D1431 Machine Learning
2D1431 Machine Learning2D1431 Machine Learning
2D1431 Machine Learningbutest
 
bv_cvxslides (1).pdf
bv_cvxslides (1).pdfbv_cvxslides (1).pdf
bv_cvxslides (1).pdf
SantiagoGarridoBulln
 

Similar to On Solving Covering Problems (20)

Integer Programming PPt.ernxzamnbmbmspdf
Integer Programming PPt.ernxzamnbmbmspdfInteger Programming PPt.ernxzamnbmbmspdf
Integer Programming PPt.ernxzamnbmbmspdf
 
Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research
 
Divide and conquer surfing lower bounds
Divide and conquer  surfing lower boundsDivide and conquer  surfing lower bounds
Divide and conquer surfing lower bounds
 
LP special cases and Duality.pptx
LP special cases and Duality.pptxLP special cases and Duality.pptx
LP special cases and Duality.pptx
 
Bayseian decision theory
Bayseian decision theoryBayseian decision theory
Bayseian decision theory
 
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
Dynamic pgmming
Dynamic pgmmingDynamic pgmming
Dynamic pgmming
 
Unit-2 Branch & Bound Design of Algorithms.ppt
Unit-2 Branch & Bound Design of Algorithms.pptUnit-2 Branch & Bound Design of Algorithms.ppt
Unit-2 Branch & Bound Design of Algorithms.ppt
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function
 
lecture on support vector machine in the field of ML
lecture on support vector machine in the field of MLlecture on support vector machine in the field of ML
lecture on support vector machine in the field of ML
 
Mathematical linear programming notes
Mathematical linear programming notesMathematical linear programming notes
Mathematical linear programming notes
 
Chapter 2. Constrained Optimization lecture note.pdf
Chapter 2. Constrained Optimization lecture note.pdfChapter 2. Constrained Optimization lecture note.pdf
Chapter 2. Constrained Optimization lecture note.pdf
 
Special Cases in Simplex Method
Special Cases in Simplex MethodSpecial Cases in Simplex Method
Special Cases in Simplex Method
 
CiE 2010 talk
CiE 2010 talkCiE 2010 talk
CiE 2010 talk
 
super vector machines algorithms using deep
super vector machines algorithms using deepsuper vector machines algorithms using deep
super vector machines algorithms using deep
 
Matematika ekonomi slide_optimasi_dengan_batasan_persamaan
Matematika ekonomi slide_optimasi_dengan_batasan_persamaanMatematika ekonomi slide_optimasi_dengan_batasan_persamaan
Matematika ekonomi slide_optimasi_dengan_batasan_persamaan
 
2D1431 Machine Learning
2D1431 Machine Learning2D1431 Machine Learning
2D1431 Machine Learning
 
bv_cvxslides (1).pdf
bv_cvxslides (1).pdfbv_cvxslides (1).pdf
bv_cvxslides (1).pdf
 
Lec37
Lec37Lec37
Lec37
 

More from Olivier Coudert

Exact coloring of real-life graphs is easy
Exact coloring of real-life graphs is easyExact coloring of real-life graphs is easy
Exact coloring of real-life graphs is easy
Olivier Coudert
 
A Performance Study of BDD-Based Model Checking
A Performance Study of BDD-Based Model CheckingA Performance Study of BDD-Based Model Checking
A Performance Study of BDD-Based Model Checking
Olivier Coudert
 
Timing and Design Closure in Physical Design Flows
Timing and Design Closure in Physical Design Flows Timing and Design Closure in Physical Design Flows
Timing and Design Closure in Physical Design Flows
Olivier Coudert
 
An Efficient Algorithm to Verify Generalized False Paths
An Efficient Algorithm to Verify Generalized False PathsAn Efficient Algorithm to Verify Generalized False Paths
An Efficient Algorithm to Verify Generalized False Paths
Olivier Coudert
 
Model checking in the cloud
Model checking in the cloudModel checking in the cloud
Model checking in the cloud
Olivier Coudert
 
Chip design and cloud computing
Chip design and cloud computingChip design and cloud computing
Chip design and cloud computingOlivier Coudert
 

More from Olivier Coudert (6)

Exact coloring of real-life graphs is easy
Exact coloring of real-life graphs is easyExact coloring of real-life graphs is easy
Exact coloring of real-life graphs is easy
 
A Performance Study of BDD-Based Model Checking
A Performance Study of BDD-Based Model CheckingA Performance Study of BDD-Based Model Checking
A Performance Study of BDD-Based Model Checking
 
Timing and Design Closure in Physical Design Flows
Timing and Design Closure in Physical Design Flows Timing and Design Closure in Physical Design Flows
Timing and Design Closure in Physical Design Flows
 
An Efficient Algorithm to Verify Generalized False Paths
An Efficient Algorithm to Verify Generalized False PathsAn Efficient Algorithm to Verify Generalized False Paths
An Efficient Algorithm to Verify Generalized False Paths
 
Model checking in the cloud
Model checking in the cloudModel checking in the cloud
Model checking in the cloud
 
Chip design and cloud computing
Chip design and cloud computingChip design and cloud computing
Chip design and cloud computing
 

Recently uploaded

Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 

Recently uploaded (20)

Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 

On Solving Covering Problems

Editor's Notes

  1. - What’s the problem? Why is it useful? - An approach: Branch-and-bound resolution - Depend on the quality of a lower bound
  2. - A function - A cost function - Decompose the function as a product of sum - Put in regards the variables of the function - Build the covering matrix - Solve the covering matrix
  3. - Exact method are important to evaluate the performances of polynomial heuristics algorithms
  4. - Choose a branching column y - Assume that y=0 or y=1, and consequently simplify the matrix - Exponential search space
  5. - Prevent from exploring unsuccessful branches that do not yield a better solution - Relies on lower bound computation
  6. - From the matrix, one build a graph such that two rows are connected by an edge iff there is an assignment of a variable that covers both of these rows. - An independent set of this graph produces a lower bound of the optimal solution
  7. -How far the optimum independent set based lower bound can be from the cost of the optimal solution? - Well, as far as one wants… - If the rows are connected to all (clique) or most (dense graph) of the other, the independent set is small, and thus the lower bound is of poor quality.
  8. - Not only the maximum independent set is NP-complete, but the lower bound it produces can be arbitrary far from the optimal solution.
  9. - Need a polynomial independent set algorithm - Greedy: select a node according to some criterion, put it in the independent set, remove all edges and nodes connected to the chosen node, and iterate. - Simple criterion: take the node of minimal degree - Here, it yields the optimal independent set - But in general, what can we expect from such a greedy algorithm?
  10. - Here, the greedy produces an independent set that is arbitrary far from the maximum independent set - One can change the criterion selection, but likely, if the criterion is polynomial, one can build a counter expample that still produces an arbitrary large gap between the greedy and the maximum independet sets.
  11. - General status of the Greedy independent set based lower bound: there are 2 arbitrary large gap between the computed lower bound and the cost of the optimal solution.
  12. - Consider a unate covering matrix (I.e., a set covering problem) - It is log-approximable by a greedy algorithm - Indeed, the log-ratio is the best possible one (except if P = NP) - Only the multiplicative constant may be improved - The upper bound on the solution yields a lower bound as well…. -…and this lower bound is no further than log(|X|) from the cost of the optimal solution.
  13. - So the greedy solution based lower bound looks much better than the (greedy or maximum) independent set lower bound. - But the independent set lower bound can take advantage of the limit lower bound to further prune the search.
  14. - This set covering problem has several optimum solution of cost 6.
  15. - This set covering problem has several optimum solution of cost 6.
  16. - This set covering problem has several optimum solution of cost 6.
  17. - This set covering problem has several optimum solution of cost 6.
  18. - Let’s build an independent set. It consists in selecting an element, putting it in the independent set, and deleting the sets covering this element as well as the elements covered by these sets. - At the end, we got an independent set of cost 5. - Assuming that we already found a solution 6 (which is optimal), it’s impossible to prune the recursion since the lower bound is only 5.
  19. - Let’s build an independent set. It consists in selecting an element, putting it in the independent set, and deleting the sets covering this element as well as the elements covered by these sets. - At the end, we got an independent set of cost 5. - Assuming that we already found a solution 6 (which is optimal), it’s impossible to prune the recursion since the lower bound is only 5.
  20. - Let’s build an independent set. It consists in selecting an element, putting it in the independent set, and deleting the sets covering this element as well as the elements covered by these sets. - At the end, we got an independent set of cost 5. - Assuming that we already found a solution 6 (which is optimal), it’s impossible to prune the recursion since the lower bound is only 5.
  21. - Let’s build an independent set. It consists in selecting an element, putting it in the independent set, and deleting the sets covering this element as well as the elements covered by these sets. - At the end, we got an independent set of cost 5. - Assuming that we already found a solution 6 (which is optimal), it’s impossible to prune the recursion since the lower bound is only 5.
  22. - Let’s build an independent set. It consists in selecting an element, putting it in the independent set, and deleting the sets covering this element as well as the elements covered by these sets. - At the end, we got an independent set of cost 5. - Assuming that we already found a solution 6 (which is optimal), it’s impossible to prune the recursion since the lower bound is only 5.
  23. - Let’s build an independent set. It consists in selecting an element, putting it in the independent set, and deleting the sets covering this element as well as the elements covered by these sets. - At the end, we got an independent set of cost 5. - Assuming that we already found a solution 6 (which is optimal), it’s impossible to prune the recursion since the lower bound is only 5.
  24. - But the sets that do not contain any elements selected for the independent set cannot be used to build a better solution. So we can delete them...
  25. -And if we do so, we create essential sets, I.e., sets that must be taken as belonging to the minimum solution since they are the only one to cover some elements. - Consequenly simplifying the matrix yield a unique solution, whose cost is 6 - So it is impossible to improve upon the solution, and the search is complete
  26. - Thus the limit lower bound uses an independent set based lower bound that is close enough to the current best solution to further prune the search spaceee - Indeed, in examples coming from logic minimizatiuon, the reduction of the search space range from 50 to 1000.
  27. - Thus the independent set based lower bound is, from the practical point of view, more effective than the theoritically better greedy solution based lower bound. - But for high density covering matrix (e.g., some examples coming from operating research), the second can be more effective than the first one.