Network-Design with Degree Constraints
نویسندگان
چکیده
We study several network design problems with degree constraints. For the degree-constrained 2-connected subgraph problem we obtain a factor 6 violation for the degrees with 4 approximation for the cost. This improves upon the logarithmic degree violation and no cost guarantee obtained by Feder, Motwani, and Zhu (2006). Then we consider the problem of finding an arborescence with at least k terminals and with minimum maximum outdegree. We show that the natural LP-relaxation has a gap of Ω “
منابع مشابه
Supply chain network design with multi- mode demand based on acceptance degree of fuzzy constraints violated
This paper designs a mathematical model for supply chain network design problem including plants, distributors and customers in fuzzy environment. Each plant and distributor has several levels capacities. A multi-mode demand strategy is considered for the customers where only one of the modes is to be selected for each customer. Considering the acceptance degree of fuzzy constraints violated, a...
متن کاملA New Comprehensive Sensor Network Design Methodology for Complex Nonlinear Process Plants
This paper presents an optimal integrated instrumentation sensor network design methodology for complex nonlinear chemical process plants using a Combinatorial Particle Swarm Optimiazation (CPSO) engine. No comprehensive sensor network design approach has been addressed yet in the literature to simultaneously incorporate cost, precision and reliability requirements for nonlinear plant...
متن کاملA hybrid solution approach for a multi-objective closed-loop logistics network under uncertainty
The design of closed-loop logistics (forward and reverse logistics) has attracted growing attention with the stringent pressures of customer expectations, environmental concerns and economic factors. This paper considers a multi-product, multi-period and multi-objective closed-loop logistics network model with regard to facility expansion as a facility location–allocation problem, which more cl...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملDesign of a reliable supply chain network with responsiveness considerations under uncertainty: case study of an Iranian tire manufacturer
This paper proposes a bi-objective reliable supply chain network design that immunizes the network against different sources of uncertainties. In this regard, scenario based stochastic programming method is applied to model different disruption scenarios affecting accurate performance of network stages. Also, reliable and unreliable facilities are suggested for lessening vulnerability of networ...
متن کاملDeveloping a New Algorithm for a Utility-based Network Design Problem with Elastic Demand
Developing the infrastructures for preventing non-communicable diseases is one of the most important goals of healthcare context in recent years. In this regard, the number and capacity of preventive healthcare facilities as well as assignment of customers to facilities should be determined for each region. Besides the accessibility, the utility of customers is a determinative factor in partici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011