A practical primal-dual interior-point algorithm for nonsymmetric - - PowerPoint PPT Presentation

a practical primal dual interior point algorithm for
SMART_READER_LITE
LIVE PREVIEW

A practical primal-dual interior-point algorithm for nonsymmetric - - PowerPoint PPT Presentation

A practical primal-dual interior-point algorithm for nonsymmetric conic optimization September 8, 2020 Erling D. Andersen (joint work with Joachim Dahl) MOSEK ApS, Email: e.d.andersen@mosek.com Personal WWW: https://erling.andersens.name


slide-1
SLIDE 1

A practical primal-dual interior-point algorithm for nonsymmetric conic optimization

September 8, 2020 Erling D. Andersen (joint work with Joachim Dahl) MOSEK ApS, Email: e.d.andersen@mosek.com Personal WWW: https://erling.andersens.name Company WWW: https://mosek.com www.mosek.com

slide-2
SLIDE 2

Outline

Conic optimization The problem The two nonsymmetric cones A primal-dual interior-point algorithm Survey of algorithms Preliminaries Motivation The algorithm Computational results Summary

1 / 47

slide-3
SLIDE 3

Section 1 Conic optimization

slide-4
SLIDE 4

Generic conic optimization problem

Primal form

minimize

  • k

(ck)T xk st

  • k

Akxk = b, xk ∈ Kk, ∀k, where

  • ck ∈ Rnk,
  • Ak ∈ Rm×nk,
  • b ∈ Rm,
  • Kk are convex cones.

3 / 47

slide-5
SLIDE 5

The 5 cones

3 symmatric cones:

  • Linear.
  • Quadratic.
  • Semidefinite.

2 nonsymmetric cones:

  • Exponential.
  • Power.

Observation:

  • Almost all convex optimization problems appearing in

practice can be formulated using those 5 cones.

4 / 47

slide-6
SLIDE 6

The power cone

The power cone: Kpow (α) :=   (x, z) :

n

  • j=1

x|αj|

j

≥ z

n

j=1 |αj|, x ≥ 0

   . Examples (α ∈ (0, 1)): (t, 1, x) ∈ Kpow (α, 1 − α) ⇔ t ≥ |x|1/α, t ≥ 0, (x, 1, t) ∈ Kpow (α, 1 − α) ⇔ xα ≥ |t|, x ≥ 0, (x, t) ∈ Kpow (e) ⇔  

n

  • j=1

xj  

1/n

≥ |t|, x ≥ 0. See also Chares [2] and the Mosek modelling cookbook [5].

5 / 47

slide-7
SLIDE 7

The exponential cone

The exponential cone Kexp := {(x1, x2, x3) : x1 ≥ x2e

x3 x2 , x2 ≥ 0}

∪{(x1, x2, x3) : x1 ≥ 0, x2 = 0, x3 ≤ 0} Applications: (t, 1, x) ∈ Kexp ⇔ t ≥ ex, (t, 1, ln(a)x) ∈ Kexp ⇔ t ≥ ax, (x, 1, t) ∈ Kexp ⇔ t ≤ ln(x), (1, x, t) ∈ Kexp ⇔ t ≤ −x ln(x), (y, x, −t) ∈ Kexp ⇔ t ≥ x ln(x/y), (relative entropy). Geometric programming + many more [2, 5].

6 / 47

slide-8
SLIDE 8

Section 2 A primal-dual interior-point algorithm

slide-9
SLIDE 9

Survey

  • Lesson learned from the linear case: Solve the primal and dual

problem simultaneously.

  • Symmetric cones: Employ the Nesterov-Todd (NT) algorithm

[10, 12].

  • Nonsymmetric cones: How to generalize the NT algorithm?
  • Nesterov [8, 9], Skajaa and Ye [15], Serrano [14]:

Computational results available

  • Tuncel [16], Myklebust [6], Tuncel and Myklebust [7]: No

computational results.

Present work:

  • Follows Myklebust and Tuncel.

8 / 47

slide-10
SLIDE 10

Primal and dual problem

Primal problem minimize cT x st Ax = b, x ∈ K and the dual maximize bT y st AT y + s = c, s ∈ (K)∗ where K = K1 × K2 × · · · Kk and K∗ is the corresponding dual cone. Known for the 5 cone types.

9 / 47

slide-11
SLIDE 11

Barrier functions

Define a 3 times differentiable function F such that F : int(K) → R then it is a ν-logarithmically homogeneouos self-concordant barrier (ν-LHSCB) for int(K) if |F ′′′(x)[u, u, u]| ≤ 2(F ′′(x)[u, u])3/2 and F(τx) = F(x) − ν log τ. See [10, 12].

10 / 47

slide-12
SLIDE 12

The dual barrier

If F is a ν-self-concordant barrier for K, then the Fenchel conjugate F∗(s) = sup

x∈int(K)

{−s, x − F(x)}. (1) is a ν-self-concordant barrier for K∗. Let ˜ x := −F ′

∗(s),

˜ s := −F ′(x), µ := x, s ν , ˜ µ := ˜ x, ˜ s ν . Then ˜ x ∈ int(K), ˜ s ∈ int(K∗) and µ˜ µ ≥ 1 (2) with equality iff x = −µ˜ x (and s = µ˜ s).

11 / 47

slide-13
SLIDE 13

The homogeneous model

Generalized Goldman-Tucker homogeneous model: (H) Ax − bτ = 0, AT y + s − cτ = 0, −cT x + bT y − κ = 0, (x; τ) ∈ ¯ K, (s; κ) ∈ ¯ K∗ where ¯ K := K × R+ and ¯ K∗ := K∗ × R+.

  • K is Cartesian product of k + 1 convex cones.
  • The homogeneous model always has a solution.
  • Partial list of references:
  • Linear case: [4], [3], [17].
  • Nonlinear case: [11].

12 / 47

slide-14
SLIDE 14

Investigating the homogeneous model

Lemma

Let (x∗, τ ∗, y∗, s∗, κ∗) be any feasible solution to (H), then i) (x∗)T s∗ + τ ∗κ∗ = 0. ii) If τ ∗ > 0, then (x∗, y∗, s∗)/τ ∗ is an optimal solution. iii) If κ∗ > 0, then at least one of the strict inequalities bT y∗ > 0 (3) and cT x∗ < 0 (4)

  • holds. If the first inequality holds, then (P) is
  • infeasible. If the second inequality holds, then (D) is

infeasible.

13 / 47

slide-15
SLIDE 15

The central path

The central path: Ax − bτ = γ(Aˆ x − bˆ τ), AT y + s − cτ = γ(AT ˆ y + ˆ s − cˆ τ), −cT x + bT y − κ = γ(−cT ˆ x + bT ˆ y − ˆ κ), s + γˆ µF ′(x) = 0, τκ − γˆ µ = 0, where ˆ µ := (ˆ x)T ˆ s + ˆ τ ˆ κ ν + 1 and (ˆ x, ˆ τ, ˆ y, ˆ s, ˆ κ) is an “interior” solution for γ = 1. The central path is the solutions parameterised by γ ∈ [0, 1].

14 / 47

slide-16
SLIDE 16

Tracing the central path

  • Idea: Trace the central path using Newton’s method.
  • Question: Should we use the primal or dual barrier i.e.

s + γˆ µF ′(x) = s + γˆ µ˜ s = 0

  • r

x + γˆ µF ′

∗(s) = x + γˆ

µ˜ x = 0 where ˜ x := −F ′

∗(s) and ˜

s := −F ′(x).

15 / 47

slide-17
SLIDE 17

Primal-dual scaling

A nonsingular matrix W is called a primal-dual scaling if it satisfies v := Wx = W −T s, ˜ v := W ˜ x = W −T ˜ s. The primal or dual centrality conditions are equivalent to v = γˆ µ˜ v.

  • Result: The centrality conditions have become symmetric!

16 / 47

slide-18
SLIDE 18

The search direction

Affine direction: Ada

x − bda τ

= −(Ax0 − bτ 0), AT da

y + da s − cda τ

= −(AT y0 + s0 − cτ 0), −cT da

x + bT da y − da κ

= −(−cT x0 + bT y0 − κ0), Wda

x + W −T da s

= −v0, τ 0da

τ + κ0da τ

= −τ 0κ0. Centering direction: Adc

x − bdc τ

= (Ax0 − bτ 0), AT dc

y + da s − cdc τ

= (AT y0 + s0 − cτ 0), −cT dc

x + bT dc y − dc κ

= (−cT x0 + bT y0 − κ0), Wdc

x + W −T dc s

= µ0˜ v0, τ 0dc

τ + κ0dc τ

= µ0.

17 / 47

slide-19
SLIDE 19

Updating the solution

For a given γ ∈ [0, 1] then define dx := da

x + γdc x,

dτ := da

τ + γdc τ,

dy := da

y + γdc y,

ds := da

s + γdc s,

dκ := da

κ + γdc κ,

and hence for a step size α ∈ [0, 1] we have x+ := x0 + αdx, τ + := τ 0 + αdτ, y+ := y0 + αdy, s+ := s0 + αds, κ+ := κ0 + αdκ.

18 / 47

slide-20
SLIDE 20

Basic but important properties

Ax+ − bτ + = (1 − α(1 − γ))(Ax0 − bτ 0), AT y+ + s+ − cτ + = (1 − α(1 − γ))(AT y0 + s0 − cτ 0), −cT x+ + bT y+ − κ+ = (1 − α(1 − γ))(−cT x0 + bT y0 − κ0), (x+)T (s+) + τ +κ+ = (1 − α(1 − γ))((x0)T s0 + τ 0κ0).

  • Equal decrease in infeasibility and complementarity for

γ ∈ [0, 1).

  • If α ∈]0, 1], then “convergence”.
  • No merit function is needed. Yahooooo!

19 / 47

slide-21
SLIDE 21

Choice of the primal-dual scaling

Our method inspired by (Tuncel, Tuncel and Myklebust): W T W ≈ µ0F ′′(x0), Wx = W −T s, W ˜ x = W −T ˜ s. Employ the quasi Newton idea to compute W.

20 / 47

slide-22
SLIDE 22

Computing the scaling matrix

Theorem (Schnabel [13])

Let ¯ X, ¯ S ∈ Rn×p have full rank p. Then there exists H ≻ 0 such that H ¯ X = ¯ S if and only if ¯ ST ¯ X ≻ 0. As a consequence H = ¯ S( ¯ ST ¯ X)−1 ¯ ST + ZZT where ¯ XT Z = 0, rank(Z) = n − p. We have n = 3, p = 2 and ¯ X :=

  • x

˜ x

  • ,

¯ S :=

  • s

˜ s

  • ,

with det( ¯ ST ¯ X) = ν2(µ˜ µ − 1) ≥ 0 vanishing only on the central path.

21 / 47

slide-23
SLIDE 23

Computing the scaling matrix

Any scaling with n = 3 satisfies W T W = ¯ S( ¯ ST ¯ X)−1 ¯ ST + zzT where

  • x

˜ x T z = 0, z = 0. Expanding the BFGS update [13] H+ = H + ¯ S( ¯ ST ¯ X)−1 ¯ ST − H ¯ X( ¯ XT H ¯ X)−1 ¯ XT H, for H ≻ 0 gives the scaling by Tun¸ cel [16] and Myklebust [7], i.e., zzT = H − H ¯ X( ¯ XT H ¯ X)−1 ¯ XT H, with H = µF ′′(x).

22 / 47

slide-24
SLIDE 24

A high-order corrector term

A high-order correction: Adco

x − bdco τ

= 0, AT dco

y + dco s − cdco τ

= 0, −cT dco

x + bT dco y − dco κ

= 0, Wdco

x + W −T dco s

= −1 2W −T F ′′′(x)[da

x, F ′′(x)−1da s],

τ 0dco

κ + κ0dco τ

= −da

τda κ.

For motivation see paper. Finally dx := da

x + γdc x + dco x ,

dτ := da

τ + γdc τ + dco τ ,

dy := da

y + γdc y + dco y ,

ds := da

s + γdc s + dco s ,

dκ := da

κ + γdc κ + dco κ .

23 / 47

slide-25
SLIDE 25

The power cone case

A 3-self-concordant barrier for the 3 dimensional primal power cone: F(x) = − log(x2α

1 x2−2α 2

− x2

3) − (1 − α) log x1 − α log x2.

(5) suggest by Chares [2]. Generalized in [1]. Is self-dual using redefined inner product. However,

  • The conjugate barrier F∗(x) or its derivatives cannot be

evaluated on closed-form.

  • Can be evaluated numerically to high accuracy based of an

idea of Nesterov.

24 / 47

slide-26
SLIDE 26

The exponential cone case

A 3-self-concordant barrier for the primal exponential cone: F(x) = − log(x2 log(x1/x2) − x3) − log x1 − log x2. (6) The dual exponential cone is K∗

e = cl{z ∈ R3 | e · z1 ≥ −z3 exp(z2/z3), z1 > 0, z3 < 0}.

(7) However,

  • The conjugate barrier F∗(x) or its derivatives cannot be

evaluated on closed-form.

  • Can be evaluated numerically to high accuracy based of an

idea of Nesterov.

25 / 47

slide-27
SLIDE 27

The starting point

Easy to compute (ˆ x, ˆ s) such that ˆ s + F ′(ˆ x) = 0. Next compute ρ =

  • min((1.0 + c)(1.0 + b), 1e6)

then let x0 = ρˆ x, τ 0 = ρ, y0 = 0, s0 = ρˆ s, κ0 = ρ.

26 / 47

slide-28
SLIDE 28

Computing the search direction

  • First compute the affine direction and then compute γ.
  • Second compute final direction with centering and corrector.
  • Reuse matrix factorization of the Newton equations for the

two solves.

27 / 47

slide-29
SLIDE 29

Step size computations

Define the one sided neighborhood N(β) =

  • (x, s, τ, κ) | τκ ≥ βµ, νiF ′(xi), F ′

∗(si)−1 ≥ βµ, ∀i

  • ,

for some β ∈]0, 1]. This bounds µ˜ µ ≥ 1 from above. We use bisection to compute a step size α ∈]0, 1] so

  • New point is feasible
  • and in the neighborhood.

28 / 47

slide-30
SLIDE 30

The termination criteria

Let (xk, yk, sk, τ k, κk) the k’th interior-point iterate to the homogeneous model. Since, xk ∈ K, sk ∈ K∗ and τ k, κk > 0 then compute ρk

p = min

  • ρ |
  • Axk

τ k − b

≤ ρεp(1 + b∞)

  • ,

ρk

d = min

  • ρ |
  • AT yk

τ k + sk τ k − c

≤ ρεd(1 + c∞)

  • ,

29 / 47

slide-31
SLIDE 31

ρk

g = min{

ρ | min (xk)T sk (τ k)2 , |cT xk τ k − bT yk τ k |

  • ≤ ρεg max
  • 1, min
  • cT xk

,

  • bT yk
  • τ k
  • },

ρk

pi = min

  • ρ |
  • AT yk + sk
  • ∞ ≤ ρεibT yk, bT yk > 0
  • ,

ρk

di = min

  • ρ |
  • Axk
  • ∞ ≤ −ρεicT xk, cT xk < 0
  • , and

ρk

ip = min

  ρ |

  • AT yk + sk

Axk

≤ ρεi

  • yk

sk xk

,

  • yk

sk xk

> 0    .

slide-32
SLIDE 32

Optimality certificate

Note εp, εd, εg, εi are nonnegative user specified tolerances. Observe if for instance max(ρk

p, ρk d, ρk g) ≤ 1

then

  • Axk

τ k − b

≤ εp(1 + b∞),

  • AT yk

τ k + sk τ k − c

≤ εd(1 + c∞), min (xk)T sk (τ k)2 , |cT xk τ k − bT yk τ k |

εg max

  • 1, min
  • cT xk

,

  • bT yk
  • τ k
  • and hence (xk, yk, sk))/τ k is an almost primal and dual feasible

solution with small complementarity gap.

31 / 47

slide-33
SLIDE 33

Primal infeasibility certificate

If ρpi ≤ 1 then

  • AT yk + sk
  • ∞ ≤ εibT yk, bT yk > 0

and define ¯ y := yk bT yk and ¯ s := sk bT yk and hence bT ¯ y ≥ 1,

  • AT ¯

y + ¯ s

εi, ¯ s ∈ K∗ i.e. an approximate certificate of primal infeasibility has been computed.

32 / 47

slide-34
SLIDE 34

Dual infeasibility certificate

If ρdi ≤ 1 then an approximate certificate of dual infeasibility has been computed.

33 / 47

slide-35
SLIDE 35

Ill-posed certificate

Ifq ρip ≤ 1 then

  • AT yk + sk

Axk

≤ εi

  • yk

sk xk

,

  • yk

sk xk

> 0 i.e. an approximate certificate of ill-posedness. Observe if for instance

  • yk
  • ∞ ≫ 0 then a tiny perturbation in b

will make the problem infeasible. Try add εyk/

  • yk
  • ∞ to b.

34 / 47

slide-36
SLIDE 36

Implemention

The algorithm has been integrated in Mosek v9.

  • Problems is dualized if believed beneficial for lin. alg.
  • A presolve is performed.
  • A scaling is performed.
  • Symmetric cones are handled with NT scaling.
  • Simple bounds and fixed variables are handled efficiently in

the linear algebra.

  • Employs highly tuned linear algebra to solve the Newton

equations.

35 / 47

slide-37
SLIDE 37

Section 3 Computational results

slide-38
SLIDE 38

Exponential/power cone optimization

  • Hardware: AMD EPYC 7402P 2.80GHz, 24C/48T, 128M

Cache (180W) (virum).

  • MOSEK: Version 9.2.21.
  • Threads: 8 threads is used in test to simulate a typical user

environment.

  • All timing results t are in wall clock seconds.
  • Test problems: Public (e.g cblib.zib.de) and customer

supplied.

37 / 47

slide-39
SLIDE 39

Exponential/power cone optimization

Optimized problems

Name # con. # cone # var. # mat. var. C Table5 POW T12 1086456 1328602 3991646 WassersteinReg 2img 972 1229312 3687936 dump Prostate VMAT 308 26872 14649 126320 logistic mip-8-1000-bayes 326 237 1007 c-diaz test c47 164404 160000 519810 x20565-3over2pow 7932 2482 20320 z17926 2 75000 225000 task dopt16 1600 26 376 2 entolib ento2 26 4695 14085 entolib a 56 37 9702 29106 exp-ml-scaled-20000 19999 20000 79998 exp-ml-20000 19999 20000 79998 patil3 conv 418681 413547 1264340 c-diaz test c47 164404 160000 519810 utkarsh robust 29012019 1228800 819201 2867301 varun conv 333 328 1009 z19841 160767 160766 483856 z19502 2354679 524286 6546535 udomsak 97653 97653 294519 relentr25000 1 25000 75000 cbf mra02 3739 3620 11105 log-utility-200-5000 10003 5001 25206 cbf cx02-100 5247 5149 15645 elmore delay 16 conv 830 762 2375 gp dave 3 conv 568 373 2052 fsparc 6 075 10 942 432 1806 c-260209-1 2238 1424 10079 38 / 47

slide-40
SLIDE 40

Exponential/power cone optimization

Result

Name

  • P. obj.

# sig. fig. # iter time(s) C Table5 POW T12 5.3368368447e-02 7 29 172.0 WassersteinReg 2img

  • 1.9199622575e+01

6 76 255.7 dump Prostate VMAT 308 5.6828282708e+04 8 58 752.9 logistic mip-8-1000-bayes 6.6082723985e+01 9 42 0.1 c-diaz test c47 1.8880303425e-02 9 69 78.2 x20565-3over2pow 2.3137374801e+02 8 34 1.7 z17926 1.7942114183e-01 9 45 7.7 task dopt16 1.3214504598e+01 9 12 0.6 entolib ento2

  • 1.1354764143e+01

9 31 0.3 entolib a 56

  • 8.2834853287e+00

8 89 4.0 exp-ml-scaled-20000

  • 3.3125859649e+00

9 139 11.0 exp-ml-20000

  • 1.9795438202e+04

11 110 4.6 patil3 conv

  • 1.0539216061e+00

9 88 115.7 c-diaz test c47 1.8880303425e-02 9 69 78.2 utkarsh robust 29012019 1.6172995191e+00 7 83 699.4 varun conv

  • 2.3527295782e+01

9 50 0.2 z19841

  • 2.6100556412e+00

9 85 275.6 z19502 5.1527196039e+06 10 68 398.2 udomsak 7.6466584697e-02 10 206 616.5 relentr25000 6.3511190583e-02 9 22 1.3 cbf mra02 4.3179836838e+00 9 170 3.4 log-utility-200-5000

  • 1.8520357724e+03

9 27 1.5 cbf cx02-100 7.7292742788e+00 8 21 0.7 elmore delay 16 conv 4.6571224035e+00 8 26 0.2 gp dave 3 conv 6.1849199940e+00 9 27 0.1 fsparc 6 075 10 4.6989895076e+02 9 20 0.0 c-260209-1

  • 6.8419351593e-02

9 38 4.1 39 / 47

slide-41
SLIDE 41

Section 4 Summary

slide-42
SLIDE 42

Summary

  • Presented a primal-dual algorithm for nonsymmetric conic
  • ptimization.
  • Makes it easy to extend the Nesterov-Todd algorithm to

nonsymmetric cones.

  • No polynomial complexity proof is provided.
  • Good computational results are presented(only 3 dimensional

though!).

  • Possible improvements:
  • Handle more cone types.
  • Better primal-dual scaling.
  • High accuracy computations in scaling matrix computations.
  • Achieve fast convergence.
  • A multiple corrector.

41 / 47

slide-43
SLIDE 43

References I

[1] Scott Roy amd Lin Xioa. On self-concordant barriers for generalized power cones. 2018. [2] Peter Robert Chares. Cones and interior-point algorithms for structed convex

  • ptimization involving powers and exponentials.

PhD thesis, Ecole polytechnique de Louvain, Universitet catholique de Louvain, 2009. [3]

  • A. J. Goldman and A. W. Tucker.

Polyhedral convex cones. In H. W. Kuhn and A. W. Tucker, editors, Linear Inequalities and related Systems, pages 19–40, Princeton, New Jersey,

  • 1956. Princeton University Press.

42 / 47

slide-44
SLIDE 44

References II

[4]

  • A. J. Goldman and A. W. Tucker.

Theory of linear programming. In H. W. Kuhn and A. W. Tucker, editors, Linear Inequalities and related Systems, pages 53–97, Princeton, New Jersey,

  • 1956. Princeton University Press.

[5] MOSEK ApS. MOSEK Modeling Cookbook. MOSEK ApS, Fruebjergvej 3, Boks 16, 2100 Copenhagen O, 2012. Last revised September 2018. [6]

  • T. Myklebust.

On primal-dual interior-point algorithms for convex

  • ptimisation.

PhD thesis, University of Waterloo, 2015.

43 / 47

slide-45
SLIDE 45

References III

[7]

  • T. Myklebust and L. Tun¸

cel. Interior-point algorithms for convex optimization based on primal-dual metrics. Technical report, University of Waterloo, 2014. [8]

  • Yu. Nesterov.

Constructing self-concordant barriers for convex cones. Technical report, CORE, Lovain-la-Neuve, 2006. Discussion paper 2006/30. [9]

  • Yu. Nesterov.

Towards nonsymmetric conic optimization. Technical report, CORE, Lovain-la-Neuve, 2006. Discussion paper 2006/38.

44 / 47

slide-46
SLIDE 46

References IV

[10] Yu. Nesterov and M. J. Todd. Self-scaled barriers and interior-point methods for convex programming.

  • Math. Oper. Res., 22(1):1–42, February 1997.

[11] Yu. Nesterov, M. J. Todd, and Y. Ye. Infeasible-start primal-dual methods and infeasibility detectors for nonlinear programming problems.

  • Math. Programming, 84(2):227–267, February 1999.

[12] Yu. E Nesterov and M. J. Todd. Primal-dual interior-point methods for self-scaled cones. SIAM J. on Optim., 8:324–364, 1998.

45 / 47

slide-47
SLIDE 47

References V

[13] R. B. Schnabel. Quasi-newton methods using multiple secant equations. Technical report, Colorado Univ., Boulder, Dept. Comp. Sci., 1983. [14] Santiago Akle Serrano. Algorithms for unsymmetric cone optimization and an implementation for problems with the exponential cone. PhD thesis, Stanford University, 2015. [15] Anders Skajaa and Yinye Ye. A homogeneous interior-point algorithm for nonsymmetric convex conic optimization.

  • Math. Programming, 150:391–422, May 2015.

46 / 47

slide-48
SLIDE 48

References VI

[16] L. Tun¸ cel. Generalization of primal-dual interior-point methods to convex

  • ptimization problems in conic form.

Foundations of Computational Mathematics, 1:229–254, 2001. [17] Y. Ye, M. J. Todd, and S. Mizuno. An O(√nL) - iteration homogeneous and self-dual linear programming algorithm.

  • Math. Oper. Res., 19:53–67, 1994.

47 / 47