Solving Two-stage Robust Optimization Problems by A Constraint-and-Column Generation Method

We present a constraint-and-column generation algorithm to solve two-stage robust optimization problems. Compared with existing Benders style cutting plane methods, it is a general procedure with a unified approach to deal with optimality and feasibility. A computational study on a two-stage robust location-transportation problem shows that it performs an order of magnitude faster. Also, it … Read more

Immunizing conic quadratic optimization problems against implementation errors

We show that the robust counterpart of a convex quadratic constraint with ellipsoidal implementation error is equivalent to a system of conic quadratic constraints. To prove this result we first derive a sharper result for the S-lemma in case the two matrices involved can be simultaneously diagonalized. This extension of the S-lemma may also be … Read more

Distributionally robust workforce scheduling in call centers with uncertain arrival rates

Call center scheduling aims to set-up the workforce so as to meet target service levels. The service level depends on the mean rate of arrival calls, which fluctuates during the day and from day to day. The staff scheduling must adjust the workforce period per period during the day, but the flexibility in so doing … Read more

On the Robust Knapsack Problem

We consider an uncertain variant of the knapsack problem that arises when the exact weight of each item is not exactly known in advance but belongs to a given interval, and the number of items whose weight differs from the nominal value is bounded by a constant. We analyze the worsening of the optimal solution … Read more

A Robust Robust Optimization Result

We study the loss in objective value when an inaccurate objective is optimized instead of the true one, and show that “on average” this loss is very small, for an arbitrary compact feasible region. Citation Technical Report 1479, School of Operations Research and Information Engineering, Cornell University, Ithaca, NY 14853, April 2011 Article Download View … Read more

Inner approximations for polynomial matrix inequalities and robust stability regions

Following a polynomial approach, many robust fixed-order controller design problems can be formulated as optimization problems whose set of feasible solutions is modelled by parametrized polynomial matrix inequalities (PMI). These feasibility sets are typically nonconvex. Given a parametrized PMI set, we provide a hierarchy of linear matrix inequality (LMI) problems whose optimal solutions generate inner … Read more

A Chance-Constrained Model & Cutting Planes for Fixed Broadband Wireless Networks

In this paper, we propose a chance-constrained mathematical program for fixed broadband wireless networks under unreliable channel conditions. The model is reformulated as integer linear program and valid inequalities are derived for the corresponding polytope. Computational results show that by an exact separation approach the optimality gap is closed by 42 % on average. Article … Read more

Planning Wireless Networks with Demand Uncertainty using Robust Optimization

An optimal planning of future wireless networks is fundamental to satisfy rising traffic demands jointly with the utilization of sophisticated techniques, such as OFDMA. Current methods for this task require a static model of the problem. However, uncertainty of data arises frequently in wireless networks, e. g., fluctuat- ing bit rate requirements. In this paper, … Read more

Recoverable Robust Knapsacks: $\GammahBcScenarios

In this paper, we investigate the recoverable robust knapsack problem, where the uncertainty of the item weights follows the approach of Bertsimas and Sim (2003,2004). In contrast to the robust approach, a limited recovery action is allowed, i.e., upto k items may be removed when the actual weights are known. This problem is motivated by … Read more

Recoverable Robust Knapsack: the Discrete Scenario Case

Admission control problems have been studied extensively in the past. In a typical setting, resources like bandwidth have to be distributed to the different customers according to their demands maximizing the profit of the company. Yet, in real-world applications those demands are deviating and in order to satisfy their service requirements often a robust approach … Read more