-
作者:Gupta, Shivam; Wang, Shouqiang; Dawande, Milind; Janakiraman, Ganesh
作者单位:University of Nebraska System; University of Nebraska Lincoln; University of Texas System; University of Texas Dallas
摘要:A buyer faces a two-dimensional mechanism design problem for awarding a project to one among a set of contractors, each of whom is privately informed about the contractor's cost and the contractor's estimate of an a priori random noncost attribute. The winning contractor realizes the noncost attribute upon the project's completion and may manipulate it in a costless manner (if such a manipulation is beneficial to the contractor). The noncost attribute inflicts a disutility cost on the buyer. T...
-
作者:Wu, Tao
作者单位:Tongji University
摘要:Shi and acute accent Olafsson [(2000) Nested Partitions Method for Global Optimization. Operations Research. 48(3):390-407] proposed the Nested Partitions (NP) method with two different NP backtracking rules-namely, NP I and NP II-for solving global optimization problems. Two of their main results are the properties of the global convergence of the NP method stated in theorems 3 and 4 on pages 398 and 399, respectively. In particular, theorem 3 provides a hitting-probability-based formula to r...
-
作者:McLennan-Smith, Timothy A.; Kalloniatis, Alexander C.; Jovanoski, Zlatko; Sidhu, Harvinder S.; Roberts, Dale O.; Watt, Simon; Towers, Isaac N.
作者单位:University of New South Wales Sydney; Defence Science & Technology; Australian National University
摘要:Traditional combat models, such as Lanchester's equations, are typically limited to two competing populations and exhibit solutions characterized by exponential decay-and growth if logistics are included. We enrich such models to account for modern and future complexities, particularly around the role of interagency engagement in operations as often displayed in counterinsurgency operations. To address this, we explore incorporation of nontrophic effects from ecological modeling. This provides...
-
作者:Abdallah, Tarek; Asadpour, Arash; Reed, Josh
作者单位:Northwestern University; City University of New York (CUNY) System; Baruch College (CUNY); New York University
摘要:Bundle-size pricing (BSP) is a multidimensional selling mechanism where the firm prices the size of the bundle rather than the different possible combinations of bundles. In BSP, the firm offers the customer a menu of different sizes and prices. The customer then chooses the size that maximizes her surplus and customizes her bundle given her chosen size. Although BSP is commonly used across several industries, little is known about the optimal BSP policy in terms of sizes and prices, along wit...
-
作者:Russo, Daniel
作者单位:Columbia University
摘要:This note gives a short, self-contained proof of a sharp connection between Gittins indices and Bayesian upper confidence bound algorithms. I consider a Gaussian multiarmed bandit problem with discount factor.. The Gittins index of an arm is shown to equal the gamma-quantile of the posterior distribution of the arm's mean plus an error term that vanishes as gamma -> 1. In this sense, for sufficiently patient agents, a Gittins index measures the highest plausible mean-reward of an arm in a mann...
-
作者:Li, Xiaocheng; Ye, Yinyu
作者单位:Imperial College London; Stanford University
摘要:We study an online linear programming (OLP) problem under a random input model in which the columns of the constraint matrix along with the corresponding coefficients in the objective function are independently and identically drawn from an unknown distribution and revealed sequentially over time. Virtually all existing online algorithms were based on learning the dual optimal solutions/prices of the linear programs (LPs), and their analyses were focused on the aggregate objective value and so...
-
作者:Ma, Qingyin; Stachurski, John
作者单位:Capital University of Economics & Business; Australian National University
摘要:Some approaches to solving challenging dynamic programming problems, such as Q-learning, begin by transforming the Bellman equation into an alternative functional equation to open up a new line of attack. Our paper studies this idea systematically with a focus on boosting computational efficiency. We provide a characterization of the set of valid transformations of the Bellman equation, for which validity means that the transformed Bellman equation maintains the link to optimality held by the ...
-
作者:Das, Bikramjit; Dhara, Anulekha; Natarajan, Karthik
作者单位:Singapore University of Technology & Design
摘要:Since the seminal work of Scarf (A min-max solution of an inventory problem) in 1958 on the newsvendor problem with ambiguity in the demand distribution, there has been a growing interest in the study of the distributionally robust newsvendor problem. The model is criticized at times for being conservative because the worst-case distribution is discrete with a few support points. However, it is the order quantity prescribed by the model that is of practical relevance. Interestingly, the order ...
-
作者:Gong, Xiting; Wang, Tong
作者单位:Chinese University of Hong Kong; Shanghai Jiao Tong University
摘要:In this paper, we establish two preservation results of additive convexity for a class of optimal transformation problems and a class of optimal disposal problems. For both classes of problems, there are multiple resources; our results show that if these resources have different priorities to be transformed/disposed under the optimal policy, then the additive convexity and bounded monotonicity of the objective function are preserved to the value function after optimization. A key observation i...
-
作者:Lin, Kyle Y.
作者单位:United States Department of Defense; United States Navy; Naval Postgraduate School
摘要:A defender dispatches patrollers to circumambulate a perimeter to guard against potential attacks. The defender decides on the time points to dispatch patrollers and each patroller's direction and speed, as long as the long-run rate at which patrollers are dispatched is capped at some constant. An attack at any point on the perimeter requires the same amount of time, during which it will be detected by each passing patroller independently with the same probability. The defender wants to maximi...