Applications and efficient algorithms for integer programming problems on monotone constraints

We present here classes of integer programming problems that are solvable efficiently and with combinatorial flow algorithms. The problems are characterized by constraints that have either at most two variables per inequality that appear with opposite sign coefficients, or have in addition a third v...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Networks Ročník 77; číslo 1; s. 21 - 49
Hlavní autor: Hochbaum, Dorit S.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Hoboken, USA John Wiley & Sons, Inc 01.01.2021
Wiley Subscription Services, Inc
Témata:
ISSN:0028-3045, 1097-0037
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract We present here classes of integer programming problems that are solvable efficiently and with combinatorial flow algorithms. The problems are characterized by constraints that have either at most two variables per inequality that appear with opposite sign coefficients, or have in addition a third variable that appears only in one constraint. Such integer programs, referred to here as monotone IP2 or IP3, are shown to be solvable in polynomial time for polynomially bounded variables. This article demonstrates the vast applicability of IP2 and IP3 as models for integer programs in multiple scenarios. Since the problems are easily recognized, the knowledge of their structure enables one to determine easily that they are efficiently solvable. The variety of applications, that previously were not known to be solved as efficiently, underlies the importance of recognizing this structure and, if appropriate, formulating problems as monotone IP2 or IP3. Additionally, if there is flexibility in the modeling of an integer programming problem, the formulation choice as monotone IP2 or IP3 leads to efficient algorithms, whereas slightly different modeling choices would lead to NP‐hard problems.
AbstractList We present here classes of integer programming problems that are solvable efficiently and with combinatorial flow algorithms. The problems are characterized by constraints that have either at most two variables per inequality that appear with opposite sign coefficients, or have in addition a third variable that appears only in one constraint. Such integer programs, referred to here as monotone IP2 or IP3, are shown to be solvable in polynomial time for polynomially bounded variables. This article demonstrates the vast applicability of IP2 and IP3 as models for integer programs in multiple scenarios. Since the problems are easily recognized, the knowledge of their structure enables one to determine easily that they are efficiently solvable. The variety of applications, that previously were not known to be solved as efficiently, underlies the importance of recognizing this structure and, if appropriate, formulating problems as monotone IP2 or IP3. Additionally, if there is flexibility in the modeling of an integer programming problem, the formulation choice as monotone IP2 or IP3 leads to efficient algorithms, whereas slightly different modeling choices would lead to NP‐hard problems.
Author Hochbaum, Dorit S.
Author_xml – sequence: 1
  givenname: Dorit S.
  orcidid: 0000-0002-2498-0512
  surname: Hochbaum
  fullname: Hochbaum, Dorit S.
  email: hochbaum@ieor.berkeley.edu
  organization: University of California
BookMark eNp1kEtPAyEUhYmpiW114T8gceViWh7zYJZNUx9Jo5u6lQDDjDQzUAFj-u-lj5VRNpeE7xzOPRMwss5qAG4xmmGEyNzqOCO4ZvQCjDGqqwwhWo3AOL2xjKK8uAKTELYIYVxgNgbvi92uN0pE42yAwjZQt61RRtsIRd85b-LHEGDrPDQ26k57uPOu82IYjO0Od9nrBDgLB2ddTGmgSlbRi8SHa3DZij7om_OcgreH1Wb5lK1fH5-Xi3WmSF3RrCWCtQRJ2SKhmGaqyIUWVUNUTWQhqZA6xyjPZVkKLVlTUSIZk4KKhpWlqukU3J18U6DPLx0i37ovb9OXnORlTQpC05mC-YlS3oXgdcuVicfVD3F7jhE_lMhTifxYYlLc_1LsvBmE3__Jnt2_Ta_3_4P8ZbU5KX4AeV-GLw
CitedBy_id crossref_primary_10_1002_net_22011
Cites_doi 10.1287/mnsc.22.11.1268
10.1137/0214016
10.1109/CVPR.2006.91
10.1109/34.868688
10.1523/ENEURO.0304-18.2019
10.1007/s10479-009-0643-z
10.1287/ijoc.1120.0546
10.1137/0218003
10.1109/ICCV.2009.5459261
10.1007/s00453-004-1085-2
10.1093/bioinformatics/bts232
10.1016/S0377-2217(02)00071-1
10.1016/j.ejor.2018.07.009
10.1109/ICPR.1996.546886
10.1145/502090.502093
10.4208/nmtma.2013.mssvm09
10.1007/s10479-019-03464-z
10.1287/opre.1120.1126
10.1109/TPAMI.2009.80
10.1007/3-540-69346-7_25
10.1007/s13675-012-0002-8
10.1109/34.969114
10.1038/nature04977
10.1287/opre.1080.0524
10.1137/S0097539793251876
10.4153/CJM-1956-045-5
ContentType Journal Article
Copyright 2020 Wiley Periodicals LLC.
2021 Wiley Periodicals LLC.
Copyright_xml – notice: 2020 Wiley Periodicals LLC.
– notice: 2021 Wiley Periodicals LLC.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/net.21983
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1097-0037
EndPage 49
ExternalDocumentID 10_1002_net_21983
NET21983
Genre article
GrantInformation_xml – fundername: National Science Foundation
  funderid: CMMI‐1760102
GroupedDBID -~X
.3N
.DC
.GA
.Y3
05W
0R~
10A
123
1L6
1OB
1OC
1ZS
31~
33P
3SF
3WU
4.4
4ZD
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5VS
66C
6TJ
6TU
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABDPE
ABEFU
ABEML
ABIJN
ABTAH
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACRPL
ACSCC
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADZMN
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ARCSS
ASPBG
ATUGU
AUFTA
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BNHUX
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
EJD
F00
F01
F04
FEDTE
FSPIC
G-S
G.N
GODZA
H.T
H.X
HBH
HF~
HGLYW
HHY
HHZ
HVGLF
HZ~
H~9
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
M6L
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MVM
MXFUL
MXSTM
N04
N05
N9A
NF~
NHB
NNB
O66
O9-
OIG
P2P
P2W
P2X
P4D
PALCI
PQQKQ
Q.N
Q11
QB0
QRW
R.K
RIWAO
RJQFR
ROL
RWI
RX1
RXW
SAMSI
SUPJJ
TAE
TN5
TUS
TWZ
UB1
V2E
W8V
W99
WBKPD
WH7
WIB
WIH
WIK
WJL
WOHZO
WQJ
WRC
WWM
WXSBR
WYISQ
XBAML
XG1
XPP
XV2
ZCA
ZY4
ZZTAW
~IA
~WT
AAMMB
AAYXX
ADMLS
AEFGJ
AEYWJ
AGHNM
AGQPQ
AGXDD
AGYGG
AIDQK
AIDYY
AIQQE
AMVHM
CITATION
O8X
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2973-f2a8f20bbf0ac8e8c54aea7d2c92b5b3abe41044b66aeb8d732b88ba3ad866c93
IEDL.DBID DRFUL
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000567487800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0028-3045
IngestDate Fri Jul 25 12:13:30 EDT 2025
Tue Nov 18 22:37:41 EST 2025
Sat Nov 29 04:29:58 EST 2025
Wed Jan 22 16:31:07 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2973-f2a8f20bbf0ac8e8c54aea7d2c92b5b3abe41044b66aeb8d732b88ba3ad866c93
Notes Funding information
National Science Foundation, CMMI‐1760102
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-2498-0512
PQID 2469252333
PQPubID 1016413
PageCount 57
ParticipantIDs proquest_journals_2469252333
crossref_citationtrail_10_1002_net_21983
crossref_primary_10_1002_net_21983
wiley_primary_10_1002_net_21983_NET21983
PublicationCentury 2000
PublicationDate January 2021
2021-01-00
20210101
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – month: 01
  year: 2021
  text: January 2021
PublicationDecade 2020
PublicationPlace Hoboken, USA
PublicationPlace_xml – name: Hoboken, USA
– name: New York
PublicationTitle Networks
PublicationYear 2021
Publisher John Wiley & Sons, Inc
Wiley Subscription Services, Inc
Publisher_xml – name: John Wiley & Sons, Inc
– name: Wiley Subscription Services, Inc
References 2010; 32
1998; 1412
2013; 26
2013; 1
2019; 6
1976; 22
2013; 61
2000; 22
1994; 23
2008; 58
2009
2008
1996
2006
2001; 48
2020; 289
2001; 23
2013; 6
2002; 140
2004; 39
1956; 8
1984
2012; 28
2019; 272
2006; 442
1968
2011; 187
1989; 18
1985; 14
e_1_2_12_4_1
e_1_2_12_3_1
e_1_2_12_6_1
e_1_2_12_5_1
e_1_2_12_18_1
e_1_2_12_2_1
e_1_2_12_17_1
e_1_2_12_16_1
e_1_2_12_20_1
e_1_2_12_21_1
e_1_2_12_22_1
e_1_2_12_23_1
e_1_2_12_24_1
Johnson T.B. (e_1_2_12_25_1) 1968
e_1_2_12_26_1
Hochbaum D.S. (e_1_2_12_19_1) 2009
Goldberg A.V. (e_1_2_12_9_1) 1984
e_1_2_12_27_1
e_1_2_12_28_1
e_1_2_12_29_1
e_1_2_12_30_1
e_1_2_12_31_1
e_1_2_12_32_1
e_1_2_12_15_1
e_1_2_12_14_1
e_1_2_12_13_1
e_1_2_12_12_1
e_1_2_12_8_1
e_1_2_12_11_1
e_1_2_12_7_1
e_1_2_12_10_1
References_xml – start-page: 269
  year: 2009
  end-page: 276
– volume: 22
  start-page: 1268
  year: 1976
  end-page: 1272
  article-title: Maximal closure of a graph and applications to combinatorial problems
  publication-title: Manag. Sci.
– year: 1968
– volume: 289
  start-page: 5
  year: 2020
  end-page: 32
  article-title: HNCcorr: Combinatorial optimization for neuron identification
  publication-title: Ann. Oper. Res.
– volume: 442
  start-page: 810
  issue: 7104
  year: 2006
  end-page: 813
  article-title: Hierarchy and adaptivity in segmenting visual scenes
  publication-title: Nature
– start-page: 389
  year: 2009
  end-page: 399
– volume: 28
  start-page: i106
  issue: 12
  year: 2012
  end-page: i114
  article-title: Ranking of multidimensional drug profiling data by fractional‐adjusted bi‐partitional scores
  publication-title: Bioinformatics
– volume: 18
  start-page: 30
  issue: 1
  year: 1989
  end-page: 55
  article-title: A fast parametric maximum flow algorithm and applications
  publication-title: SIAM J. Comput.
– volume: 23
  start-page: 1222
  issue: 11
  year: 2001
  end-page: 1239
  article-title: Fast approximate energy minimization via graph cuts
  publication-title: IEEE Trans Pattern Anal. Mach. Intell.
– volume: 23
  start-page: 1179
  issue: 6
  year: 1994
  end-page: 1192
  article-title: Simple and fast algorithms for linear and integer programs with two variables per inequality
  publication-title: SIAM J. Comp.
– volume: 1412
  start-page: 325
  year: 1998
  end-page: 337
  article-title: . Proc. of IPCO 98
  publication-title: Lecture Notes Comput. Sci.
– volume: 39
  start-page: 189
  issue: 3
  year: 2004
  end-page: 208
  article-title: A cut‐based algorithm for the nonlinear dual of the minimum cost network flow problem
  publication-title: Algorithmica
– volume: 14
  start-page: 196
  year: 1985
  end-page: 209
  article-title: The computational complexity of simultaneous diophantine approximation problems
  publication-title: SIAM J. Comput.
– volume: 272
  start-page: 1041
  issue: 3
  year: 2019
  end-page: 1057
  article-title: A comparative study of the leading machine learning techniques and two new optimization algorithms
  publication-title: Eur. J. Oper. Res.
– volume: 32
  start-page: 889
  issue: 5
  year: 2010
  end-page: 898
  article-title: Polynomial time algorithms for ratio regions and a variant of normalized cut
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
– year: 1984
– volume: 8
  start-page: 399
  year: 1956
  end-page: 404
  article-title: Maximal flow through a network
  publication-title: Can. J. Math.
– volume: 187
  start-page: 45
  issue: 1
  year: 2011
  end-page: 63
  article-title: Nuclear threat detection with mobile distributed sensor networks
  publication-title: Ann. Oper. Res.
– year: 2008
– start-page: 557
  year: 1996
  end-page: 564
– start-page: 993
  year: 2006
  end-page: 1000
– volume: 26
  start-page: 45
  issue: 1
  year: 2013
  end-page: 58
  article-title: The supervised normalized cut method for detecting, classifying, and identifying special nuclear materials
  publication-title: INFORMS J. Comput.
– volume: 61
  start-page: 184
  issue: 1
  year: 2013
  end-page: 198
  article-title: A polynomial time algorithm for Rayleigh ratio on discrete variables: Replacing spectral techniques for expander ratio, normalized cut, and Cheeger constant
  publication-title: Oper. Res.
– volume: 6
  start-page: 2
  year: 2019
  article-title: HNCcorr: A novel combinatorial approach for cell identification in calcium‐imaging movies
  publication-title: eNeuro
– volume: 58
  start-page: 992
  issue: 4
  year: 2008
  end-page: 1009
  article-title: The pseudoflow algorithm: A new algorithm for the maximum flow problem
  publication-title: Oper. Res.
– volume: 140
  start-page: 291
  issue: 2
  year: 2002
  end-page: 321
  article-title: Solving integer programs over monotone inequalities in three variables: A framework for half integrality and good approximations
  publication-title: Eur. J. Oper. Res.
– volume: 6
  start-page: 169
  issue: 1
  year: 2013
  end-page: 198
  article-title: Multi‐label Markov random fields as an efficient and effective tool for image segmentation, total variations and regularization
  publication-title: Numer. Math. Theory Meth. Appl.
– volume: 22
  start-page: 888
  issue: 8
  year: 2000
  end-page: 905
  article-title: Normalized cuts and image segmentation
  publication-title: IEEE Trans. Pattern. Anal. Mach. Intell.
– volume: 1
  start-page: 155
  issue: 1–2
  year: 2013
  end-page: 180
  article-title: Evaluating performance of image segmentation criteria and techniques
  publication-title: EURO J. Comput. Optim.
– volume: 48
  start-page: 686
  issue: 4
  year: 2001
  end-page: 701
  article-title: An efficient algorithm for image segmentation, Markov random fields and related problems
  publication-title: J. ACM (JACM)
– ident: e_1_2_12_27_1
  doi: 10.1287/mnsc.22.11.1268
– ident: e_1_2_12_26_1
  doi: 10.1137/0214016
– ident: e_1_2_12_28_1
  doi: 10.1109/CVPR.2006.91
– ident: e_1_2_12_31_1
  doi: 10.1109/34.868688
– ident: e_1_2_12_29_1
  doi: 10.1523/ENEURO.0304-18.2019
– ident: e_1_2_12_18_1
– ident: e_1_2_12_10_1
  doi: 10.1007/s10479-009-0643-z
– ident: e_1_2_12_32_1
  doi: 10.1287/ijoc.1120.0546
– ident: e_1_2_12_8_1
  doi: 10.1137/0218003
– ident: e_1_2_12_24_1
  doi: 10.1109/ICCV.2009.5459261
– ident: e_1_2_12_2_1
  doi: 10.1007/s00453-004-1085-2
– start-page: 389
  volume-title: Operations Research and Cyber‐Infrastructure
  year: 2009
  ident: e_1_2_12_19_1
– ident: e_1_2_12_11_1
  doi: 10.1093/bioinformatics/bts232
– ident: e_1_2_12_16_1
  doi: 10.1016/S0377-2217(02)00071-1
– volume-title: Optimum Open Pit Mine Production Technology. PhD Thesis, Operations Research Center
  year: 1968
  ident: e_1_2_12_25_1
– ident: e_1_2_12_4_1
  doi: 10.1016/j.ejor.2018.07.009
– ident: e_1_2_12_6_1
  doi: 10.1109/ICPR.1996.546886
– ident: e_1_2_12_15_1
  doi: 10.1145/502090.502093
– ident: e_1_2_12_23_1
– volume-title: Finding a maximum density subgraph. Technical Report UCB/CSD‐84‐171, EECS Department
  year: 1984
  ident: e_1_2_12_9_1
– ident: e_1_2_12_21_1
  doi: 10.4208/nmtma.2013.mssvm09
– ident: e_1_2_12_3_1
  doi: 10.1007/s10479-019-03464-z
– ident: e_1_2_12_22_1
  doi: 10.1287/opre.1120.1126
– ident: e_1_2_12_20_1
  doi: 10.1109/TPAMI.2009.80
– ident: e_1_2_12_14_1
  doi: 10.1007/3-540-69346-7_25
– ident: e_1_2_12_12_1
  doi: 10.1007/s13675-012-0002-8
– ident: e_1_2_12_5_1
  doi: 10.1109/34.969114
– ident: e_1_2_12_30_1
  doi: 10.1038/nature04977
– ident: e_1_2_12_17_1
  doi: 10.1287/opre.1080.0524
– ident: e_1_2_12_13_1
  doi: 10.1137/S0097539793251876
– ident: e_1_2_12_7_1
  doi: 10.4153/CJM-1956-045-5
SSID ssj0011518
Score 2.263851
Snippet We present here classes of integer programming problems that are solvable efficiently and with combinatorial flow algorithms. The problems are characterized by...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 21
SubjectTerms Algorithms
Combinatorial analysis
image segmentation
Integer programming
Modelling
monotone inequalities
network flow
parametric cut
Polynomials
ratio problems
Title Applications and efficient algorithms for integer programming problems on monotone constraints
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fnet.21983
https://www.proquest.com/docview/2469252333
Volume 77
WOSCitedRecordID wos000567487800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1097-0037
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011518
  issn: 0028-3045
  databaseCode: DRFUL
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fS8MwED7m5oM--FucTgniw17qtjRrU3wa6vBhDJEN9mTJpakOtk7W6t9vkrWzgoLgW6GXNlzucl9yyXcAVxRplwdKz35SocOUrxzsxB0n1rGdR4wrJS1l_sAfDvlkEjxW4Ka4C7Pih1hvuBnPsPO1cXCBaatEGqqya-1u3N2AGtV2y6pQu3vqjwfrJIIOZrwgYTYJwYJYqE1b68bfw9EXxiwjVRtq-rv_6uQe7OQIk_RWJrEPFZUcwHaJd_AQnnultDURSUSUZZLQAYiI2ctiOc1e5ynReJZYOgm1JPk5rrluT_IiNClZJERb8cLweRNpgKapN5GlRzDu349uH5y80IIjTekqJ6aCx7SNGLeF5IrLLhNK-BGVAcUuugIV08s2hp4nFPLIdylyjsIVEfc8GbjHUE30r06AsAjjgEqMJWfMRYaB9LFtYIUnfR55dWgW-g5lzkJuOjcLV_zJNNQqC63K6nC5Fn1bUW_8JNQoBi3MvS8NqV7zU73CdvXrph2e3z8QDu9H9uH076JnsEXN0Ra7E9OAarZ8V-ewKT-yabq8yM3wE9iR5Bc
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED_mJqgPfovTqUF88KU606xNwZehjolziGzgkyWXpjrYh7TVv98ka-cEBcG3Qi9tuNzlvpLfAZxQpA0eKL37SYUOU75y8CK-cGJt23nEuFLSQuZ3_G6XPz0FDyW4LO7CTPEhZgk3oxl2vzYKbhLS53OooSo70_rG3QWoMC1GjTJUrh9b_c6siqCtGS9QmE1FsEAWqtPz2eDv9ujLyZx3Va2taa39b5brsJr7mKQ5FYoNKKnxJqzMIQ9uwXNzrnBNxDgiymJJaBNExPBlkgyy11FKtEdLLKCESkh-kmukx5O8DU1KJmOi5XhiEL2JNK6m6TiRpdvQb930rtpO3mrBkaZ5lRNTwWNaR4zrQnLFZYMJJfyIyoBiA12BiunAjaHnCYU88l2KnKNwRcQ9TwbuDpTH-le7QFiEcUAlxpIz5iLDQPpYN46FJ30eeVU4LRgeyhyH3ExuGE4RlGmoWRZallXheEb6NgXf-ImoVqxamOtfGlId9VMdY7v69aldn98_EHZvevZh7--kR7DU7t13ws5t924flqk56GLzMjUoZ8m7OoBF-ZEN0uQwl8lPey7oBw
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED_mJqIPfovfBvFhL3VbmrUp-DJ0RXGMIQp7suTSVAe6yVr9-02ytk5QEHwr9NKGy13ul1zyO4AzirTNA6VnP6nQYcpXDraSlpPo2M5jxpWSljK_5_f7fDgMBhW4KO7CzPghyg034xl2vjYOrt7ipDHHGqqyc-1v3F2AGmsHnnbL2tVd-NArswg6mvGChdlkBAtmoSZtlI2_x6MvkDkPVW2sCdf-18t1WM0xJunMjGIDKmq8CStzzINb8NiZS1wTMY6JslwSOgQR8fI0mY6y59eUaERLLKGEmpL8JNerbk_yMjQpmYyJtuOJYfQm0kBNU3EiS7fhIezeX147eakFR5riVU5CBU9oEzFpCskVl20mlPBjKgOKbXQFKqYXbgw9Tyjkse9S5ByFK2LueTJwd6A61r_aBcJiTAIqMZGcMRcZBtLHpgEWnvR57O1BvVB4JHMectO5l2jGoEwjrbLIqmwPTkvRtxn5xk9Ch8WoRbn_pRHVq36q19iufl234_P7B6J-994-7P9d9ASWBldh1Lvp3x7AMjXnXOy2zCFUs-m7OoJF-ZGN0ulxbpKfKzfngg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Applications+and+efficient+algorithms+for+integer+programming+problems+on+monotone+constraints&rft.jtitle=Networks&rft.au=Hochbaum%2C+Dorit+S.&rft.date=2021-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=0028-3045&rft.eissn=1097-0037&rft.volume=77&rft.issue=1&rft.spage=21&rft.epage=49&rft_id=info:doi/10.1002%2Fnet.21983&rft.externalDBID=10.1002%252Fnet.21983&rft.externalDocID=NET21983
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0028-3045&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0028-3045&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0028-3045&client=summon