An improved binary programming formulation for the secure domination problem

The secure domination problem, a variation of the domination problem with some important real-world applications, is considered. Very few algorithmic attempts to solve this problem have been presented in literature, and the most successful to date is a binary programming formulation which is solved...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Annals of operations research 2020-12, Vol.295 (2), p.561-573
Hauptverfasser: Burdett, Ryan, Haythorpe, Michael
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 573
container_issue 2
container_start_page 561
container_title Annals of operations research
container_volume 295
creator Burdett, Ryan
Haythorpe, Michael
description The secure domination problem, a variation of the domination problem with some important real-world applications, is considered. Very few algorithmic attempts to solve this problem have been presented in literature, and the most successful to date is a binary programming formulation which is solved using CPLEX. A new binary programming formulation is proposed here which requires fewer constraints and fewer binary variables than the existing formulation. It is implemented in CPLEX, and tested on certain families of graphs that have previously been considered in the context of secure domination. It is shown that the runtime required for the new formulation to solve the instances is significantly less than that of the existing formulation. An extension of our formulation that solves the related, but further constrained, secure connected domination problem is also given; to the best of the authors’ knowledge, this is the first such formulation in literature.
doi_str_mv 10.1007/s10479-020-03810-6
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2473380450</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A651172347</galeid><sourcerecordid>A651172347</sourcerecordid><originalsourceid>FETCH-LOGICAL-c423t-82a60ee64b5298fd4c0c61ea9db3ff5eb4517f7b6a7e5f5626ba0a2f684437b83</originalsourceid><addsrcrecordid>eNp9kUtr3DAURkVpoZNp_0BWhm7rydXbsxyG5gED2aRrIdlXHg1jOZXsQv99lTiQBkIR6HmOLtJHyCWFDQXQV5mC0NsaGNTAGwq1-kBWVGpWbzlvPpIVMClqyTl8Jhc5nwCA0kauyGEXqzA8pvE3dpUL0aY_VVn1yQ5DiH3lxzTMZzuFMT7Nq-mIVcZ2Tlh1YyGWk2K4Mw5fyCdvzxm_voxr8vP6x8P-tj7c39ztd4e6FYxPdcOsAkQlnGTbxneihVZRtNvOce8lOiGp9topq1F6qZhyFizzqhGCa9fwNfm23Fvq_poxT-Y0zimWkoYJXR4MQsIr1dszmhD9OCXbDiG3ZqckpZrxAq_J5h2qtA6H0I4RfSj7b4Tv_whuziFiLl0O_XHKvZ1zfouzBW_TmHNCbx5TGMo3GwrmKTuzZGdKduY5O6OKxBcpFzj2mF4f-B_rL1udmxI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2473380450</pqid></control><display><type>article</type><title>An improved binary programming formulation for the secure domination problem</title><source>Business Source Complete</source><source>SpringerLink Journals - AutoHoldings</source><creator>Burdett, Ryan ; Haythorpe, Michael</creator><creatorcontrib>Burdett, Ryan ; Haythorpe, Michael</creatorcontrib><description>The secure domination problem, a variation of the domination problem with some important real-world applications, is considered. Very few algorithmic attempts to solve this problem have been presented in literature, and the most successful to date is a binary programming formulation which is solved using CPLEX. A new binary programming formulation is proposed here which requires fewer constraints and fewer binary variables than the existing formulation. It is implemented in CPLEX, and tested on certain families of graphs that have previously been considered in the context of secure domination. It is shown that the runtime required for the new formulation to solve the instances is significantly less than that of the existing formulation. An extension of our formulation that solves the related, but further constrained, secure connected domination problem is also given; to the best of the authors’ knowledge, this is the first such formulation in literature.</description><identifier>ISSN: 0254-5330</identifier><identifier>EISSN: 1572-9338</identifier><identifier>DOI: 10.1007/s10479-020-03810-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Business and Management ; Combinatorics ; Constraints ; Graph theory ; Graphs ; Mathematical research ; Neighborhoods ; Operations research ; Operations Research/Decision Theory ; Original Research ; Programming ; Theory of Computation</subject><ispartof>Annals of operations research, 2020-12, Vol.295 (2), p.561-573</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>COPYRIGHT 2020 Springer</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c423t-82a60ee64b5298fd4c0c61ea9db3ff5eb4517f7b6a7e5f5626ba0a2f684437b83</citedby><cites>FETCH-LOGICAL-c423t-82a60ee64b5298fd4c0c61ea9db3ff5eb4517f7b6a7e5f5626ba0a2f684437b83</cites><orcidid>0000-0001-8143-6583</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10479-020-03810-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10479-020-03810-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41466,42535,51296</link.rule.ids></links><search><creatorcontrib>Burdett, Ryan</creatorcontrib><creatorcontrib>Haythorpe, Michael</creatorcontrib><title>An improved binary programming formulation for the secure domination problem</title><title>Annals of operations research</title><addtitle>Ann Oper Res</addtitle><description>The secure domination problem, a variation of the domination problem with some important real-world applications, is considered. Very few algorithmic attempts to solve this problem have been presented in literature, and the most successful to date is a binary programming formulation which is solved using CPLEX. A new binary programming formulation is proposed here which requires fewer constraints and fewer binary variables than the existing formulation. It is implemented in CPLEX, and tested on certain families of graphs that have previously been considered in the context of secure domination. It is shown that the runtime required for the new formulation to solve the instances is significantly less than that of the existing formulation. An extension of our formulation that solves the related, but further constrained, secure connected domination problem is also given; to the best of the authors’ knowledge, this is the first such formulation in literature.</description><subject>Algorithms</subject><subject>Business and Management</subject><subject>Combinatorics</subject><subject>Constraints</subject><subject>Graph theory</subject><subject>Graphs</subject><subject>Mathematical research</subject><subject>Neighborhoods</subject><subject>Operations research</subject><subject>Operations Research/Decision Theory</subject><subject>Original Research</subject><subject>Programming</subject><subject>Theory of Computation</subject><issn>0254-5330</issn><issn>1572-9338</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kUtr3DAURkVpoZNp_0BWhm7rydXbsxyG5gED2aRrIdlXHg1jOZXsQv99lTiQBkIR6HmOLtJHyCWFDQXQV5mC0NsaGNTAGwq1-kBWVGpWbzlvPpIVMClqyTl8Jhc5nwCA0kauyGEXqzA8pvE3dpUL0aY_VVn1yQ5DiH3lxzTMZzuFMT7Nq-mIVcZ2Tlh1YyGWk2K4Mw5fyCdvzxm_voxr8vP6x8P-tj7c39ztd4e6FYxPdcOsAkQlnGTbxneihVZRtNvOce8lOiGp9topq1F6qZhyFizzqhGCa9fwNfm23Fvq_poxT-Y0zimWkoYJXR4MQsIr1dszmhD9OCXbDiG3ZqckpZrxAq_J5h2qtA6H0I4RfSj7b4Tv_whuziFiLl0O_XHKvZ1zfouzBW_TmHNCbx5TGMo3GwrmKTuzZGdKduY5O6OKxBcpFzj2mF4f-B_rL1udmxI</recordid><startdate>20201201</startdate><enddate>20201201</enddate><creator>Burdett, Ryan</creator><creator>Haythorpe, Michael</creator><general>Springer US</general><general>Springer</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope><scope>3V.</scope><scope>7TA</scope><scope>7TB</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>KR7</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M2P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-8143-6583</orcidid></search><sort><creationdate>20201201</creationdate><title>An improved binary programming formulation for the secure domination problem</title><author>Burdett, Ryan ; Haythorpe, Michael</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c423t-82a60ee64b5298fd4c0c61ea9db3ff5eb4517f7b6a7e5f5626ba0a2f684437b83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Business and Management</topic><topic>Combinatorics</topic><topic>Constraints</topic><topic>Graph theory</topic><topic>Graphs</topic><topic>Mathematical research</topic><topic>Neighborhoods</topic><topic>Operations research</topic><topic>Operations Research/Decision Theory</topic><topic>Original Research</topic><topic>Programming</topic><topic>Theory of Computation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Burdett, Ryan</creatorcontrib><creatorcontrib>Haythorpe, Michael</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><collection>ProQuest Central (Corporate)</collection><collection>Materials Business File</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Science Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><jtitle>Annals of operations research</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Burdett, Ryan</au><au>Haythorpe, Michael</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An improved binary programming formulation for the secure domination problem</atitle><jtitle>Annals of operations research</jtitle><stitle>Ann Oper Res</stitle><date>2020-12-01</date><risdate>2020</risdate><volume>295</volume><issue>2</issue><spage>561</spage><epage>573</epage><pages>561-573</pages><issn>0254-5330</issn><eissn>1572-9338</eissn><abstract>The secure domination problem, a variation of the domination problem with some important real-world applications, is considered. Very few algorithmic attempts to solve this problem have been presented in literature, and the most successful to date is a binary programming formulation which is solved using CPLEX. A new binary programming formulation is proposed here which requires fewer constraints and fewer binary variables than the existing formulation. It is implemented in CPLEX, and tested on certain families of graphs that have previously been considered in the context of secure domination. It is shown that the runtime required for the new formulation to solve the instances is significantly less than that of the existing formulation. An extension of our formulation that solves the related, but further constrained, secure connected domination problem is also given; to the best of the authors’ knowledge, this is the first such formulation in literature.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10479-020-03810-6</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-8143-6583</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0254-5330
ispartof Annals of operations research, 2020-12, Vol.295 (2), p.561-573
issn 0254-5330
1572-9338
language eng
recordid cdi_proquest_journals_2473380450
source Business Source Complete; SpringerLink Journals - AutoHoldings
subjects Algorithms
Business and Management
Combinatorics
Constraints
Graph theory
Graphs
Mathematical research
Neighborhoods
Operations research
Operations Research/Decision Theory
Original Research
Programming
Theory of Computation
title An improved binary programming formulation for the secure domination problem
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T09%3A28%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20improved%20binary%20programming%20formulation%20for%20the%20secure%20domination%20problem&rft.jtitle=Annals%20of%20operations%20research&rft.au=Burdett,%20Ryan&rft.date=2020-12-01&rft.volume=295&rft.issue=2&rft.spage=561&rft.epage=573&rft.pages=561-573&rft.issn=0254-5330&rft.eissn=1572-9338&rft_id=info:doi/10.1007/s10479-020-03810-6&rft_dat=%3Cgale_proqu%3EA651172347%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2473380450&rft_id=info:pmid/&rft_galeid=A651172347&rfr_iscdi=true