Roberto Cordone’s research while affiliated with University of Milan and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (102)


PN of Example 1
PN of Example 2
Branching tree for Example 2: only feasible nodes are represented and arcs are labeled with the transition inducing the branch (label “nm” indicates the optional branching rule for non-minimal solutions). Nodes corresponding to non-minimal solutions are colored in gray
Optimization-based computation of bounded sequences to reach target states in DESs
  • Article
  • Full-text available

April 2025

·

3 Reads

Discrete Event Dynamic Systems

Roberto Cordone

·

·

The enumeration of legal transition paths leading to a target state (or set of states) is of paramount importance in the control of discrete event systems, but is hindered by the state explosion problem. A method is proposed in this paper, in the context of Petri nets, to calculate and enumerate firing count vectors for which there exists at least an admissible transition sequence leading to a given target marking. The method is shown to improve the approach based on singular complementary transition invariants proposed by Kostin and combines an integer linear programming formulation that finds the shortest minimal solution and a branching procedure that realizes a partition of the solution set. The enumeration can be restricted to minimal solutions or extended to non-minimal ones. Moreover, the approach is extended by adding a further constraint that the target transition sequences should pass by intermediate markings (in a specific order or not). Finally, source, target and via markings can be replaced by sets of markings. Some analytical examples are discussed in detail to show the effectiveness of the proposed approach.

Download

On the completeness of several fortification-interdiction games in the Polynomial Hierarchy

June 2024

·

13 Reads

Fortification-interdiction games are tri-level adversarial games where two opponents act in succession to protect, disrupt and simply use an infrastructure for a specific purpose. Many such games have been formulated and tackled in the literature through specific algorithmic methods, however very few investigations exist on the completeness of such fortification problems in order to locate them rigorously in the polynomial hierarchy. We clarify the completeness status of several well-known fortification problems, such as the Tri-level Interdiction Knapsack Problem with unit fortification and attack weights, the Max-flow Interdiction Problem and Shortest Path Interdiction Problem with Fortification, the Multi-level Critical Node Problem with unit weights, as well as a well-studied electric grid defence planning problem. For all of these problems, we prove their completeness either for the Σ2p\Sigma^p_2 or the Σ3p\Sigma^p_3 class of the polynomial hierarchy. We also prove that the Multi-level Fortification-Interdiction Knapsack Problem with an arbitrary number of protection and interdiction rounds and unit fortification and attack weights is complete for any level of the polynomial hierarchy, therefore providing a useful basis for further attempts at proving the completeness of protection-interdiction games at any level of said hierarchy.


A Revisited Branch and Bound Method for the Weighted Safe Set Problem

January 2024

·

1 Read

The Weighted Safe Set Problem requires to partition an undirected graph into two families of connected components, respectively denoted as safe and unsafe, in such a way that each safe component dominates the unsafe adjacent components with respect to a weight function. We introduce some improvements to an existing exact approach that produce a significant reduction in the effort required to find the optimum or in the gap between the optimum and the best solution obtained within a given time limit. The first improvement consists of a relaxation that is weaker than the original one, but allows to adopt a more effective branching strategy and stronger variable fixing procedures. The second one is the integration of a dedicated heuristic in the exact approach. The experimental results show a strong average reduction of the computational time and the number of branching nodes. This also mitigates the anticipated termination of the algorithm due to the exhaustion of the memory on the larg est benchmark instances.



Fig. 2 Average percent gap and computational time required by the constructive and destructive approaches on the MaxMinSum problem: the basic destructive approach D and the rollout destructive approaches D-fRO and D-cRO dominate the other ones
Fig. 5 Profile of the percent gap obtained for the MaxSum problem with different numbers of Tabu Search iterations (starting with the constructive approaches on the left, with the destructive approaches on the right)
Constructive and Destructive Methods in Heuristic Search

July 2023

·

47 Reads

·

3 Citations

Constructive methods are one of the main families of heuristic approaches to combinatorial optimization problems. They usually start from an empty set and subsequently add elements until a promising feasible solution is found. Their advantages are simplicity in design, analysis and implementation, and an intuitive structure. In general, though not always, they also have a limited computational complexity. An obvious counterpart is offered by destructive methods, which start from the whole ground set in which the solutions are embedded, and subsequently remove elements until they reach a promising feasible solution. This chapter describes the systematic development of a number of constructive and destructive methods for the MaxSum and the MaxMinSum diversity problems and their application, both as stand-alone approaches and to initialize an improvement metaheuristic.


Constructive-destructive heuristics for the Safe Set Problem

June 2023

·

3 Reads

·

5 Citations

Computers & Operations Research

The Weighted Safe Set Problem aims to determine in an undirected graph a subset of vertices such that the weights of the connected components they induce exceed the weights of the adjacent components induced by the complementary subset. We tackle the problem with various approaches based on randomised constructive and destructive procedures, comparing them with each other and with the only other existing heuristic approach, that is a randomised destructive heuristic. The experiments concern all the available benchmark instances (random graphs up to 60 vertices), but also new benchmark instances with larger size and different topologies, namely random, small-world, regular, planar, grid and real-world graphs up to 300 vertices. Dense random graphs, in fact, appear to become progressively easier to solve as their size grows. On the other instances, the best performance is obtained by combining a randomised constructive procedure, a deterministic destructive procedure, and delayed termination conditions that allow a deeper exploration of the feasible region.


A combinatorial branch and bound for the safe set problem

December 2022

·

13 Reads

·

3 Citations

Networks

The Weighted Safe Set Problem requires to partition an undirected graph into two families of connected components, respectively denoted as safe and unsafe, in such a way that each safe component dominates the unsafe adjacent components with respect to a weight function. We introduce a combinatorial branch and bound approach, whose main strength is a refined relaxation that combines graph manipulations and the solution of an auxiliary problem. We also propose fixing procedures to reduce the number of branching nodes. The algorithm solves all weighted instances available in the literature and most unweighted ones, up to 50 vertices, with computational times orders of magnitude smaller than the competing algorithms. In order to investigate the limits of the approach, we introduce a benchmark of graphs with 60 vertices, solving to optimality the denser instances.


Cardinality constrained connected balanced partitions of trees under different criteria

November 2022

·

8 Reads

·

4 Citations

Discrete Optimization

In this paper we study the problem of partitioning a tree with n weighted vertices into p connected components. For each component, we measure its gap, that is, the difference between the maximum and the minimum weight of its vertices, with the aim of minimizing the sum of such differences. We present an O(n3p2) time and O(n3p) space algorithm for this problem. Then, we generalize it, requiring a minimum of ϵ≥1 nodes in each connected component, and provide an O(n3p2ϵ2) time and O(n3pϵ) space algorithm to solve this new problem version. We provide a refinement of our analysis involving the topology of the tree and an improvement of the algorithms for the special case in which the weights of the vertices have a heap structure. All presented algorithms can be straightforwardly extended to other similar objective functions. Actually, for the problem of minimizing the maximum gap with a minimum number of nodes in each component, we propose an algorithm which is independent of ϵ and requires O(n2lognp2) time and O(n2p) space.


Realization of tiny obtained using sBB compared with a correct reference realization (left). The systematic error (center). Error derived from a wrong partial reflection (right). The scaling on the axes is arbitrary
Maximum feasible subsystems of distance geometry constraints

May 2022

·

25 Reads

·

2 Citations

Journal of Global Optimization

We study the problem of satisfying the maximum number of distance geometry constraints with minimum experimental error. This models the determination of the shape of proteins from atomic distance data which are obtained from nuclear magnetic resonance experiments and exhibit experimental and systematic errors. Experimental errors are represented by interval constraints on Euclidean distances. Systematic errors occur from a misassignment of distances to wrong atomic pairs: we represent such errors by maximizing the number of satisfiable distance constraints. We present many mathematical programming formulations, as well as a “matheuristic” algorithm based on reformulations, relaxations, restrictions and refinement. We show that this algorithm works on protein graphs with hundreds of atoms and thousands of distances.


On finding connected balanced partitions of trees

August 2021

·

14 Reads

·

4 Citations

Discrete Applied Mathematics

Maurizio Bruglieri

·

Roberto Cordone

·

·

[...]

·

Graph partitioning is a widely studied problem in the literature with several applications in real life contexts. In this paper we study the problem of partitioning a graph, with weights at its vertices, into p connected components. For each component of the partition we measure the difference between the maximum and the minimum weight of a vertex in the component. We consider two objective functions to minimize, one measuring the maximum of such differences among all the components in the partition, and the other measuring the sum of the differences between the maximum and the minimum weight of a vertex in each component. We focus our analysis on tree graphs and provide polynomial time algorithms for solving these optimization problems on such graphs. In particular, we present an O(n2logn) time algorithm for the min–max version of the problem on general trees and several, more efficient polynomial algorithms for some trees with a special structure, such as spiders and caterpillars. Finally, we present NP-hardness and approximation results on general graphs for both the objective functions.


Citations (67)


... The former (Scattered Mandatory (SM)) selects the mandatory nodes in such a way to maximise the sum of distances between all the pairs of selected nodes while the latter (Clustered Mandatory (CM)) selects the mandatory nodes in the opposite way, that is minimising the sum of distances between all the pairs of selected nodes. To do this, we adapted the algorithms recently reported in Aringhieri et al. 2023 for the Maximum Diversity Problem (Kuo et al. n.d.). We set as mandatory 5% of the total number of customers as Assunção and Mateus 2019 for the Steiner TOP. ...

Reference:

The Team Orienteering Problem with Service Times and Mandatory & Incompatible Nodes
Constructive and Destructive Methods in Heuristic Search

... Moreover, the authors in [11] said a graph G has stable structure, if equality holds for weighted safe set number (WSN) and connected weighted safe number (CWSN) for every weight function on V (G). See [17,18,21] for more study on WSS problem. ...

Constructive-destructive heuristics for the Safe Set Problem
  • Citing Article
  • June 2023

Computers & Operations Research

... Heuristic approaches have been presented by Macambira et al. (2019) andBoggio Tomasaz et al. (2023b). Finally, exact (non-polynomial) approaches have been presented by Macambira et al. (2019), Hosteins (2020), Malaguti and Pedrotti (2023) and Boggio Tomasaz et al. (2023a). The last one solves instances up to 60 vertices in a time limit of one hour. ...

A combinatorial branch and bound for the safe set problem
  • Citing Article
  • December 2022

Networks

... Then, one such path is selected according to the criterion of interest (which could be related e.g. to cost, time, or efficiency) and enforced by an agent acting as controller, scheduler or supervisor. Since in various applications of interest such decisions have to be taken in real time (Basile et al. 2022), it is crucial to employ efficient algorithms to solve such reachability problems. ...

Supervisory Control of Timed Discrete Event Systems with Logical and Timed Specifications
  • Citing Article
  • June 2021

IEEE Transactions on Automatic Control

... Wu et al. [29] introduced a deterministic annealing neural network algorithm that attempts to obtain a high-quality solution by following a path of minimum points of a barrier problem. Recently, Bruglieri and Cordone [30] proposed a two-level tabu search algorithm and an adaptive large neighborhood search algorithm to solve the minimum gap graph partitioning problem on instances of large-size. These methods have been tested on large-scale graphs providing good solutions in a reasonable time. ...

Metaheuristics for the Minimum Gap Graph Partitioning Problem
  • Citing Article
  • April 2021

Computers & Operations Research

... Following the survey paper of Shabtay et al. [35], an important application of scheduling with rejection arises in make-to-order production systems with limited production capacity and tight delivery requirements. Numerous papers have been published on scheduling with job-rejection, and in order to emphasize the popularity of this topic we provide in the following a number of them published recently: Agnetis and Mosheiov [1], Fiszman and Mosheiov [6], Li and Cui [18], Mor and Mosheiov [23], Wang et al. [39], Zhang et al. [41], Cordone and Hosteins [3], Dabiri et al. [4], Hermelin et al. [11], Li et al. [17], Mor et al. [25], Mor and Shapira [27], Zuo et al. [43], Chen and Li [2], Kong et al. [14], Liu and Lu [20], Mor and shapira [28], Mosheiov et al. [31], Oron [33], Zou and Yuan [42], de Weerdt et al. [5], Koulamas and Kyparisis [12], Mor et al. [26], Mor and Shapira [29] and Wang et al. [38]. The most relevant papers are those dealing with jobrejection and a Just-In-Time scheduling measures (involving both earliness and tardiness costs): Koulamas and Panwalkar [13] studied the equivalence of single machine scheduling problems with job-rejection and earliness measures to those with tardiness measures, Thevenin, Zufferey and Widmer [37] studied a single machine scheduling problem with rejection, earliness and tardiness costs and position-dependent setup times, Li and Chen [15] focused on the setting of a deteriorating maintenance activity on a single machine, when job-rejection is allowed and the goal is to minimize a function of earliness, tardiness and due-date costs, Thevenin and Zufferey [36] introduced learning variable neighborhood search for a scheduling problem with time windows and job-rejection, Mor and Mosheiov [24] considered the single machine problem of maximizing the weighted number of on-time jobs with job-rejection, and Geng et al. [7] solved the setting of scheduling on proportionate flow shop with job rejection and common due date assignment. ...

A bi-objective model for the single-machine scheduling problem with rejection cost and total tardiness minimization
  • Citing Article
  • October 2018

Computers & Operations Research

... Indeed, Wolsey (1990) and Van Den Akker et al. (1999) show that TI formulation has a strong linear relaxation relative to other formulations and provides better lower bounds, generating more robust cutting plane algorithms. Some researchers (Van Den Akker et al., 1999, 2000Bigras et al., 2008;Cordone et al., 2018) have used time-indexed formulations for single machine or parallel machines using column generation. ...

A Branch-and-Bound Algorithm for the Prize-Collecting Single-Machine Scheduling Problem with Deadlines and Total Tardiness Minimization
  • Citing Article
  • January 2018

INFORMS Journal on Computing

... The mathematical analysis presented in [12] was explicitly referring to random paths, since these were also used in the original Retinex algorithm. In order to investigate the effect of the spatial information on color sensation, subsequent Milano Retinex algorithms proposed new sampling schemes, where the random paths were replaced with Brownian paths [38] or by edge-dependent paths of [39], [40], [41], or even substituted with 2D sets [13], randomly or deterministically defined [42], [43], [44], [45], [46], [47]. The sampling schemes of [12] and [42], were also analyzed and formalized from a statistical point of view respectively in [48] and [49], [50]. ...

On edge-aware path-based color spatial sampling for Retinex: From Termite Retinex to Light Energy-driven Termite Retinex
  • Citing Article
  • May 2017