標(biāo)題: Titlebook: Redundancy in Mathematical Programming; A State-of-the-Art S Mark H. Karwan,Vahid Lotfi,Jan Telgen Conference proceedings 1983 Springer-Ver [打印本頁] 作者: lumbar-puncture 時間: 2025-3-21 17:56
書目名稱Redundancy in Mathematical Programming影響因子(影響力)
書目名稱Redundancy in Mathematical Programming影響因子(影響力)學(xué)科排名
書目名稱Redundancy in Mathematical Programming網(wǎng)絡(luò)公開度
書目名稱Redundancy in Mathematical Programming網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Redundancy in Mathematical Programming被引頻次
書目名稱Redundancy in Mathematical Programming被引頻次學(xué)科排名
書目名稱Redundancy in Mathematical Programming年度引用
書目名稱Redundancy in Mathematical Programming年度引用學(xué)科排名
書目名稱Redundancy in Mathematical Programming讀者反饋
書目名稱Redundancy in Mathematical Programming讀者反饋學(xué)科排名
作者: forager 時間: 2025-3-21 20:21
A Method for Identifying Redundant Constraints and Extraneous Variables in Linear Programming,he method can solve five related problems, one of these problems being the redundant constraint problem. This paper develops the method fully for identifying redundant constraints and extraneous variables.作者: 用樹皮 時間: 2025-3-22 00:51 作者: Encapsulate 時間: 2025-3-22 05:53
Finding Redundant Constraints in Sets of Linear Inequalities,ining S and the nonnegativity constraints in the definition of S.. Hence, the statements, “The .th constraint of S is redundant (nonredundant)” and “The constraint x. ≥ 0 is redundant (nonredundant) in defining S.” are equivalent. We let S. be obtained from S by deleting the .th constraint.作者: fiction 時間: 2025-3-22 09:43
A Method for Determining Redundant Constraints,ining redundant constraints, the results of Gal (1978) can be used. They are incorporated in the algorithm presented in Section 4.3. The polytope in the illustrative example in Section 4.4 is appropriately degenerate.作者: 馬賽克 時間: 2025-3-22 13:54
An Introduction to Redundancy,the desire on the part of the problem formulator not to omit essential elements of the formulation. Over the past twenty years numerous papers have been written on redundancy. In those papers methods have been presented for identifying redundancies. This volume presents an up-to-date survey of metho作者: 開玩笑 時間: 2025-3-22 17:35
Mathematical Foundations and Notation,consider their interrelationships. We then attempt to categorize the methods. Finally, we present some theory common to certain of the methods. The emphasis of the chapter is on linear inequalities and linear programming, but many of the results are readily extendable to more general mathematical pr作者: mechanism 時間: 2025-3-22 23:25
A Method for Identifying Redundant Constraints and Extraneous Variables in Linear Programming,m the method of Zionts (1965) (see also Thompson, Tonge and Zionts (1966)) which identified redundant constraints and extraneous variables either prior to or during the solution of linear programming problems. In earlier work (Zionts and Wallenius (1976)) we had to solve a problem that is closely re作者: STELL 時間: 2025-3-23 01:41 作者: 清楚說話 時間: 2025-3-23 06:23
Identifying Redundancy in Systems of Linear Constraints,ental to the method is the possibility to recognize redundancy of a constraint by determining the minimum value of the associated slack variable. This property was first mentioned by Lisy (1971) and exploited in Gal (1975b). By defining the structural variables as the slack variables of the nonnegat作者: GOAD 時間: 2025-3-23 13:03
Finding Redundant Constraints in Sets of Linear Inequalities,tural constraints, Ax ≤ b, we can also consider the polyhedral set S. = {x|Hx = b, x ≥ 0}, where H = (A, I). S. is an embedding of S in R.. Each variable in the definition of S. can be viewed as a slack variable for one of the constraints defining S, since the “structural variables” (x.,...,x.) can 作者: kindred 時間: 2025-3-23 14:41 作者: PLIC 時間: 2025-3-23 19:30
,Preduce — A Probabilistic Algorithm Identifying Redundancy by a Random Feasible Point Generator (RFoperties of a given feasible region, by performing a random walk through the region. PREDUCE is mainly designed for redundancy identification. PREDUCE also provides information (at little additional cost) concerning the boundedness, convexity and dimensionality of the feasible region as well as some作者: 任命 時間: 2025-3-24 01:12 作者: EWER 時間: 2025-3-24 02:58 作者: keloid 時間: 2025-3-24 07:15 作者: 招募 時間: 2025-3-24 13:47
Conference proceedings 1983er of us (Telgen) who was then in the process of completing a dissertation on redundancy in linear programming. At that time, Telgen proposed an extended visit to Buffalo, during which time he and Zionts would do an extensive study on redundancy. Redundancy, hardly an exciting or new topic, does hav作者: LIEN 時間: 2025-3-24 17:23
An Introduction to Redundancy,ds for identifying and removing redundancy and presents the results of extensive empirical tests on these methods. Based on the results of these tests, recommendations for improvements to the methods are made and some of the improvements are tested.作者: Osteoarthritis 時間: 2025-3-24 21:07 作者: 東西 時間: 2025-3-25 02:45
Some Reduction of Linear Programs Using Bounds on Problem Variables,Consider the linear programming problem (LPP) . and its dual . with A∈R., b∈R., c∈R. and y∈R., x∈R.. Assume that both (8.1) and (8.2) have optimal solutions.作者: 搜尋 時間: 2025-3-25 05:08
A Reduction Procedure for Linear and Integer Programming Models,A procedure is described for simplifying linear and integer programming models. The procedure performs tests which may:作者: granite 時間: 2025-3-25 10:34
The Noncandidate Constraint Method,Thompson, Tonge, and Zionts (1966) defined a . in a linear programming problem as one which could be dropped without changing the feasible region. Most linear programs have some redundant constraints, and it would be desirable to be able to identify them. However, the discovery of redundant constraints is computationally extremely costly.作者: Introduction 時間: 2025-3-25 14:46
Programming the Methods and Experimental Design,Using the size-reduction techniques presented in Chapters 3 through 11 as a base together with the insights presented in Chapter 12, we programmed and tested all the methods on the CDC Cyber-174 computer system at the State University of New York at Buffalo.作者: AGOG 時間: 2025-3-25 17:04
Results of the Sign Test Methods,In this chapter we present the results of the sign test methods on randomly generated problems as well as on structured problems. The results of the remaining methods will be presented in the next chapter.作者: GLEAN 時間: 2025-3-25 20:18
Improvements and Extensions,In Chapters 14 and 15 we presented results of size-reduction techniques on sets of randomly generated and structured problems. In presenting the results, we suggested some changes which have promise for improving the performance of these techniques.作者: 遣返回國 時間: 2025-3-26 00:51 作者: 清晰 時間: 2025-3-26 06:16 作者: 過度 時間: 2025-3-26 09:51
Redundancy in Mathematical Programming978-3-642-45535-3Series ISSN 0075-8442 Series E-ISSN 2196-9957 作者: conifer 時間: 2025-3-26 15:15 作者: 試驗 時間: 2025-3-26 17:55 作者: Cerebrovascular 時間: 2025-3-26 21:09 作者: 不適 時間: 2025-3-27 01:14 作者: Lymphocyte 時間: 2025-3-27 07:08 作者: 指耕作 時間: 2025-3-27 13:15 作者: tolerance 時間: 2025-3-27 13:41 作者: PANEL 時間: 2025-3-27 18:02 作者: constellation 時間: 2025-3-27 23:03
e program. Situations are discussed in which returning home upon discharge might be recommended. Suggestions are offered for wilderness therapists and home providers regarding how to support parents making difficult aftercare decisions. And lastly, the importance of the wilderness therapy interventi作者: 討人喜歡 時間: 2025-3-28 05:37 作者: Obsequious 時間: 2025-3-28 08:21 作者: ANTE 時間: 2025-3-28 14:15
Jan Telgenence theory argues that firms use board ties to manage their resource interdependencies (Pfeffer and Salancik, 1978), for instance, when banks directors sit on the boards of the companies to which they have lent financial resources (Davis and Mizruchi, 1999; Mizruchi, 1996). However, most studies on作者: 異端 時間: 2025-3-28 17:47
David S. Rubinence theory argues that firms use board ties to manage their resource interdependencies (Pfeffer and Salancik, 1978), for instance, when banks directors sit on the boards of the companies to which they have lent financial resources (Davis and Mizruchi, 1999; Mizruchi, 1996). However, most studies on作者: Biomarker 時間: 2025-3-28 19:38
Theodore H. Mattheissence theory argues that firms use board ties to manage their resource interdependencies (Pfeffer and Salancik, 1978), for instance, when banks directors sit on the boards of the companies to which they have lent financial resources (Davis and Mizruchi, 1999; Mizruchi, 1996). However, most studies on作者: INCUR 時間: 2025-3-29 02:09 作者: dagger 時間: 2025-3-29 03:24 作者: instate 時間: 2025-3-29 10:02 作者: FILTH 時間: 2025-3-29 13:22
Awanti P. Sethi,Gerald L. Thompsonns involved with older people, adjustments were still being made to the various other forms of family violence identified in the 1960s and 1970s (notably child abuse and violence to women). Set in this context, the problems of ‘battered grannies’ (a term which hardly promoted the cause) struggled to作者: 身體萌芽 時間: 2025-3-29 15:36
Gordon H. Bradley,Gerald G. Brown,Glenn W. Gravesns involved with older people, adjustments were still being made to the various other forms of family violence identified in the 1960s and 1970s (notably child abuse and violence to women). Set in this context, the problems of ‘battered grannies’ (a term which hardly promoted the cause) struggled to作者: NIL 時間: 2025-3-29 23:07 作者: 集聚成團(tuán) 時間: 2025-3-30 03:26 作者: GRIPE 時間: 2025-3-30 04:09
Mark H. Karwan,Vahid Lotfi,Stanley Zionts,Jan Telgenns involved with older people, adjustments were still being made to the various other forms of family violence identified in the 1960s and 1970s (notably child abuse and violence to women). Set in this context, the problems of ‘battered grannies’ (a term which hardly promoted the cause) struggled to作者: cylinder 時間: 2025-3-30 10:49
Mark H. Karwan,Vahid Lotfi,Stanley Zionts,Jan Telgenhidden as “shame” in the home (as discussed in Chap. . of the current anthology). Family members did not want to tell anything that is shameful about their family, so the number of reports was small. However, after World War II, the “abuse” against older adults has been found out of the home because作者: 頂點 時間: 2025-3-30 13:46 作者: sleep-spindles 時間: 2025-3-30 19:16 作者: 歌劇等 時間: 2025-3-30 21:53 作者: avulsion 時間: 2025-3-31 02:00 作者: 健談 時間: 2025-3-31 05:03 作者: 歡樂中國 時間: 2025-3-31 10:18
0075-8442 ng-early Summer of 1981. As the project took shape, we decided that we had more than enough for an article, or even several articles. Accordingly, not wanting t978-3-540-11552-6978-3-642-45535-3Series ISSN 0075-8442 Series E-ISSN 2196-9957 作者: COWER 時間: 2025-3-31 15:34