Next Article in Journal
A New Geometric Algebra-Based Classification of Hand Bradykinesia in Parkinson’s Disease Measured Using a Sensory Glove
Previous Article in Journal
Examining the Neurophysiology of Attentional Habituation to Repeated Presentations of Food and Non-Food Visual Stimuli
Previous Article in Special Issue
Epileptic Seizure Prediction Using a Combination of Deep Learning, Time–Frequency Fusion Methods, and Discrete Wavelet Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Solving the Minimum Spanning Tree Problem with Conflicting Edge Pairs

by
Roberto Montemanni
1,* and
Derek H. Smith
2
1
Department of Sciences and Methods for Engineering, University of Modena and Reggio Emilia, 42122 Reggio Emilia, Italy
2
Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, UK
*
Author to whom correspondence should be addressed.
Algorithms 2025, 18(8), 526; https://doi.org/10.3390/a18080526
Submission received: 14 July 2025 / Revised: 7 August 2025 / Accepted: 14 August 2025 / Published: 18 August 2025
(This article belongs to the Special Issue 2024 and 2025 Selected Papers from Algorithms Editorial Board Members)

Abstract

The Minimum Spanning Tree with Conflicting Edge Pairs is a generalization that adds conflict constraints to a classical optimization problem on graphs used to model several real-world applications. In recent years, several heuristic and exact approaches have been proposed to tackle this problem. In this paper, we present a mixed-integer linear program not previously applied to this problem, and we solve it with an open-source solver. Computational results for the benchmark instances commonly adopted in the literature of the problem are reported. The results indicate that the approach we propose obtains results aligned with those of the much more sophisticated approaches available, notwithstanding it being much simpler to implement. During the experimental campaign, six instances were closed for the first time, with nine improved best-known lower bounds and sixteen improved best-known upper bounds over a total of two hundred thirty instances considered.

1. Introduction

The Minimum Spanning Tree Problem with Conflicting Edge Pairs (MSTC) is a variant of the classical minimum spanning tree (MST) problem recently introduced [1]. Given a connected undirected graph with costs on the edges and a set of edge pairs in conflict with each other, the MSTC consists of finding the spanning tree with the minimum total cost that uses at most one of the edges of each conflicting pair. The MSTC was first introduced by Darmann et al. [2]. It was shown that under general settings, the problem cannot be solved in polynomial time, although some special cases are shown to be polynomially solvable. Several heuristic methods were subsequently proposed in [3], while a branch-and-cut based on a mathematical programming model and some valid inequalities was presented in [4]. More recently, a metaheuristic method was designed and presented in [5], while some new methods based on Lagrangian relaxations, able to produce high-quality lower bounds and heuristic solutions, were introduced in [6]. Finally, a new branch-and-cut approach based on some new valid inequalities was discussed in [7] and shown to represent the current state-of-the-art exact solving methods.
In the literature of graph theory and algorithms, several classic optimization problems have been studied in one or more variants involving conflict constraints, witnessing increasing popularity of the topic due to the number of related real-world applications. For example, for the Assignment Problem with Conflicts, theoretical results on the computational complexity, together with some approximation results, can be found in [2]. Further results for special polynomially solvable settings were presented in [8], together with some heuristics and lower-bounding schema. More contributions can be found in [9,10], where some Mixed-Integer Linear Programming models, exact Branch-and-Bound methods, and heuristic ideas are introduced. The concepts of the last two papers were later summarized and extended in [11]. For the Knapsack Problem with Conflicts, a local-search heuristic and a branch-and-bound method based on Lagrangian relaxation are discussed in [12]. In [13], the authors proposed some preprocessing techniques and a different branch-and-bound algorithm. Heuristic methods for this problem were discussed in [14,15]. Metaheuristic approaches were finally presented in [16,17]. Finally, a branch-and-bound exact method, based on binary branching, was proposed in [18], while another branch-and-bound schema, based on n-ary branching, was developed and tested in [19]. Different Set-Covering Problems with Conflicts were proposed in [20,21], together with approximation algorithms and computational complexity results. Different families of valid inequalities for a model representing the problem were presented in [22], together with some preprocessing and speed-up routines. A specialization of the same problem in geometric settings was discussed in [23], where some approximation results were presented. The Shortest Path Problem with Conflicts can be found in [24], where critical variants of the shortest path problem arising in the automatic generation of test paths for programs were introduced, and in [25], where the first definition of conflict pairs was presented, although nodes instead of arcs were a part of the conflicts. A procedure to solve the problem was discussed in [26]. A polyhedral study of the problem was presented in [27], while branch-and-bound and dynamic programming approaches were recently proposed in [28,29]. The Maximum Flow Problem with Conflicts was first studied in [30], where the NP-hardness of the problem is shown. Later, some mixed-integer linear programming formulations and exact methods, such as a Benders Decomposition, a Branch-and-Bound, and a Russian Doll Search were presented in [31]. More recently, the authors of [32] proposed a heuristic approach for the problem called Kernousel, obtained by merging two metaheuristic approaches, one based on Carousel Greedy [33] and the other on Kernel Search [34].
The MSTC can be used to represent real applications arising in different domains. For example, the design of an offshore wind farm network, where the wind turbines have to be connected together, and the different possible point-to-point connections are characterized by different costs. Technical reasons prevent the use of overlapped cables in such a context [35], and this generates conflict constraints. Other practical applications are in the design and installation of long-distance pipelines, where conflicts typically represent the impossibility of using infrastructures owned by competitor service providers or, alternatively, the impossibility of crossing countries with reciprocal political issues with the same line [36].
In this paper, a compact mixed-integer linear programming model for the MSTC is introduced in the context of the MSTC. It is based on multi-commodity flow concepts and extends known formulations for the MST problem ([37,38]) to the case with conflicts. Notice that multi-commodity flow models are common for problems related to the MST problem (see, for example, [39] for the Min-degree Constrained MST and [40] for the Diameter-Constrained MST). The model we propose is solved by the open-source solver CP-SAT, which is a part of the Google OR-Tools [41] optimization suite. Normally, models based on multi-commodity flow are not very effective in the context of integer programming, due to the poor linear relaxation, but we believe such a formulation might perform well when solved with CP-SAT. Successful application of this solver on optimization problems with characteristics similar to the problem under investigation, such as the Parallel Drone-Scheduling Traveling Salesman Problem and Vehicle Routing Problems [42,43], the Maximum Flow Problem with Conflict Constraints [44], and the Home Healthcare-Routing and Scheduling Problem [45], motivated this study. A comprehensive experimental campaign is conducted and reported on the benchmark instances previously used in the literature.
The overall organization of the paper can be summarized as follows: Section 2 is dedicated to the formal introduction and definition of the Minimum Spanning Tree Problem with Conflicting Edge Pairs. Section 3 presents a compact mixed-integer linear programming model to represent the problem. In Section 4, the new model is validated through an extensive experimental perspective. After the description of the benchmark instances considered and of the methods used for comparison purposes, the detailed results obtained by solving the new model are reported. Some conclusions about the work presented and the results achieved are drawn in Section 5 to close the paper.

2. Problem Description

The Minimum Spanning Tree Problem with Additional Conflicts can be defined on an undirected graph ( G = ( V , E ) ), with V denoting the set of nodes and E the set of edges. Each edge ( { i , j } E ) is associated with a cost ( u i j N + ). The following feature differentiates the problem from the classic Minimum Spanning Tree Problem and increases the theoretical computational complexity of the problem to NP –hard [2]: Two edges ( { i , j } , { k , l } E ) are said to be in conflict if, at most, one of them can be included in a feasible solution. The set of edges in conflict with the edge ( { i , j } E ) is contained in the set δ i j . The goal of the MSTC is to find the minimum-cost-spanning tree that satisfies all the conflict constraints.
An example of an MFPC instance and the optimal solution for the same instance are provided in Figure 1.

3. A Mixed-Integer Linear Programming Model

In this section, a model for the MSTC—obtained by extending a classical model for the Minimum Spanning Tree Problem [37]—is proposed. The compact model is based on multi-commodity flow, characterized by the number of variables in the order of O( | V | 2 ) and the number of constraints in the order of O( | V | 2 ), making it compact and suitable to be attacked directly by a solver. Conversely, the approaches previously considered in the literature rely on models with an exponential number of constraints [4,7], which require a more complex implementation of dynamic and iterative mechanisms to generate violated constraints during the solving process. Our approach is expected to have a weaker linear relaxation than the exponential models, but we believe it has potential when approached with solvers able to do logical inferences, as is done herein. The new model uses a set (A) of (directed) arcs, obtained by including the two arcs ( ( i , j ) and ( j , i ) ) for each edge ( { i , j } E ). A node (s) is arbitrarily selected as the root (node 0 in our implementation), and the model aims to send one unit of flow from the source to each other node.
The new model can be formally defined as follows: A variable ( x i j Z 0 + ) is introduced for each ( i , j ) A and takes the value of the flow transiting the arc ( ( i , j ) A ). An additional set of variables is introduced to link the multi-commodity flow formulation to the MSTC. Then, a binary variable ( y i j ) is defined for each edge ( { i , j } E ). It takes a value of 1 if the edge is a part of the solution and 0 otherwise. The resulting compact model, characterized by a polynomial number of variables and constraints, is as follows:
min { i , j } E u i j y i j
s . t . ( j , i ) A x j i ( i , j ) A x i j = | V | + 1 if i = s + 1 if i s     i V
x i j ( | V | 1 ) y i j     { i , j } E
x j i ( | V | 1 ) y i j     { i , j } E
y i j + y k l 1       { i , j } E , ( k , l ) δ i j
x i j 0        ( i , j ) A
y i j { 0 , 1 }       { i , j } E
The objective function (1) minimizes the cost of the spanning tree. Constraints (2) implement a classical multi-commodity flow model on the directed network and impose that one unit of the commodity has to exit the source (s) for each other node of V (case i = s ) and that each node different from s has to retain exactly one unit of the commodity (case i s ). An example of the flow associated with the solution reported in Figure 1 is available in Figure 2.
Inequalities (3) and (4) connect the x and y variables by imposing that y i j has to take a value of 1 as soon as either x i j or x j i takes a positive value. Constraints (5) encode conflict constraints by ensuring that conflicting edges are not selected simultaneously. Finally, the domains of the variables are specified in constraints (6) and (7) for the x and y variables, respectively.

4. Computational Experiments

This section is devoted to the experimental validation of the new compact model introduced in Section 3. The model’s results are compared to those of existing methods for the standard benchmark instances from the literature. In detail, Section 4.1 is devoted to the description of the benchmark instances previously introduced in the literature and used in the present study. An extensive comparison between the results achieved in this work and the results previously published is presented in Section 4.2.

4.1. Benchmark Instances

The benchmark sets originally proposed in [3,7], which have been widely used in the previous literature to validate and compare solving methods, are adopted for the experiments reported in the present work.
From the benchmark set proposed in [3], the 50 most challenging instances are considered, since the other ones can easily be solved to optimality by any recent method. The instances are generated at random and have a number of nodes that ranges between 50 and 300 and a number of edges between 200 and 1000. The edge costs are between 0 and 500, and different densities for the conflict graph are considered. We refer the interested reader to [3] for full details on instance generation.
A newer set of benchmark instances was recently introduced in [7] and is formed by random instances with the number of nodes between 25 and 100 and the edge density equal to 0.2, 0.3, or 0.4 (notice that the previous set of benchmarks was characterized by lower densities). Costs are between 1 and 30, and the density of the conflict graph is 0.01, 0.04, or 0.07. All 180 instances of the set are considered for the experiments reported in the present work. We refer the reader interested in the generation process of the instances to [7] for full details.

4.2. Experimental Results

The model discussed in Section 3 has been solved with the Google OR-Tools CP-SAT solver [41] version 9.12. The CP-SAT solver is designed to work in a multi-thread environment (compatible with all new processors) and implements a portfolio strategy with effective data exchange among the different threads. The main process runs a Constraint-Programming Solver based on Lazy Clause Generation (LCG) [46]. The concept behind LCG involves the (incremental) transformation of the problem to an SAT formula, subsequently employing an SAT solver to seek a solution (or prove bounds for infeasibility). The input model is also linearized, the corresponding linear program is (partially) solved with the (dual) simplex algorithm, and other classical MILP techniques are run to enhance bounds and retrieve new solutions, aiming at supporting the satisfiability model. Finally, instances of metaheuristic methods, seeking high-quality feasible solutions, are executed.
We believe a compact model heavily based on binary variables, like those discussed in Section 3, might be very suitable to be attacked with a solver with the characteristics of CP-SAT.
The experiments have been run on a computer equipped with an Intel Core i7 12700F CPU, but the computational times were normalized using the Intel Core i7-3770 CPU used for the experiments reported in [5,6,7], as a baseline. This ensures fair comparisons across methods. The normalization of the computation times has been carried out according to the conversion ratios inferred from [47]. Notice that ref. [47] is commonly used in the community to compare results obtained on different machines (see, for example, [32,44]). In accordance with the tests previously reported in [7], a maximum computation time of 5010 s is allowed for all the methods for which a computation time is reported in the tables that follow.
The first experiments have been carried out on the instances proposed in [3] and are summarized in Table 1. The first columns identify each instance (n is the number of nodes, m is the number of edges, and p is the number of conflicts, following the parameters used to generate the instances), while the rest of the table summarizes all the relevant results presented in the previous literature. The (not necessarily) optimal results obtained by solving a Mixed-Integer Linear Programming (MILP) model and two lower-bounding procedures (LB-MST and LB-MI) are taken from [3] (with no computation time). The lower and upper bounds (HDA and HDA+, respectively) from [6] are reported together with the upper bounds obtained with the multi-ethnic genetic metaheuristic method that appeared in [5] (Mega) and the lower and upper bounds obtained by the two branch-and-cut approaches discussed in [4] (unfortunately, without computation times) and [7], respectively (BC). Finally, the results obtained by the method presented in this paper are presented in the last five columns (CP-SAT). On top of the lower and upper bounds obtained and the relative computation time, the percentage deviation (Dev%) against the best lower and upper bounds is also reported to better position the new approach. These deviations are calculated as 100 · B K L B L B B K L B and 100 · U B B K U B B K U B , respectively, where B K L B and B K U B are the best-known lower and upper bounds available from the previous literature, and L B and U B are the values provided by CP-SAT. Negative deviations (corresponding to improved best-known results) are highlighted in bold.
The results in Table 1 suggest that the approach we propose (CP-SAT) is particularly effective in identifying infeasible instances: Five such instances were identified for the first time in this study by the powerful feasibility checker provided by the adopted solver (notice that infeasible instances are marked as Infeas in the table). This corroborates the intuition that the logical inference carried out by CP-SAT can be effective on the compact model we propose. Moreover, another best-known upper bound has been improved. In general, the new approach has a performance comparable with those of the other state-of-the-art methods available, with deviation gaps remaining below 8.5% (and, in general, substantially below) from best-known bounds (taken as the best of the results obtained by several different algorithms). We observe that the average deviations reported are not very significant because they are heavily affected by the figures for the infeasibility proofs. Notably, CP-SAT consistently provides meaningful lower and upper bounds, demonstrating a level of robustness—especially on the upper bounds—that is uncommon among other methods. On the other hand, the lower bounds found by CP-SAT appear sometimes worse than those of BC (from [7]) in some of the most challenging instances. This might indicate scalability issues. When observing computation times, CP-SAT often appears slower than the other methods. This likely depends on the model we propose, which is characterized by a poor linear relaxation, which, in turn, means that no strong lower bound from linear programming is available to the solver. CP-SAT effectively compensates for this lack of information by applying logical inference, although this takes a longer time, showing that the solver is suitable for the new model, and the combination leads to very good results.
The percentage deviations from the best-known (before the present study) lower and upper bounds are plotted for all the methods considered and for each instance of the first benchmark set in Figure 3 and Figure 4. The plots help to position the new approach even more clearly. A plot representing the computation times required to close each instance by the two exact methods for which such information is available (BC [7] and CP-SAT) is provided in Figure 5. A negative value is plotted when no result is available for the solver BC. The plot suggests how CP-SAT is often generally slower in the instances solved by the two methods, but, on the other hand, the number of instances solved by such an approach is higher.
A second set of experiments has been carried out on the instances proposed in [7], and the results are summarized in Table 2. The meaning of the column matches that of the column in Table 1, with the addition of parameter s, which is the seed used to generate the instances and helps to distinguish among instances with the same characteristics. The results of all the methods for which results are available in this dataset (namely, the most recent approaches) are reported. Computational times are available for all the methods reported.
The comparison proposed in Table 2 shows that the approach we propose (CP-SAT) also performs well in this second set of benchmark instances, with average deviations from the previously best-known results of 0.4% concerning the lower bounds and 0.8% concerning the upper bounds. These figures are very good, considering the abundance of methods considered while calculating the (previous) best-known results. The maximum deviation is negligible for most of the instances, with only a few cases above 10% for upper bounds and never above 2.2% for lower bounds. Notice that for some of the instances of this benchmark set, CP-SAT suffers on the heuristic solution side (upper bounds). This indicates that several tailored heuristics presented for the problem were well motivated. A total of four new best-known lower bounds and ten new best-known upper bounds have been produced during the experimental campaign, with one instance (50-245-2093-349) closed for the first time during this experimental campaign. The same conclusion drawn for computation times in Table 1 also applies to these experiments too.
Analogous to what was done for the first benchmark set, the percentage deviations from the best-known (before the present study) lower and upper bounds are plotted for all the methods considered and for each instance of the first benchmark set in Figure 6 and Figure 7. The plots help to position the new approach even more clearly, although the dominance of CP-SAT here is not as clear as in Figure 3 and Figure 4. We plot the computation times required to close each instance by the two exact methods for which such information is available in Figure 8. The plot suggests that for the second benchmark set, BS converges faster (and closes a few more instances) than CP-SAT.
As a general conclusion, the proposed model closely matches or improves upon the best-known results available prior to this work. The proposed method also demonstrates consistent robustness across the entire dataset, although its convergence times appear slower than those of some of the methods previously proposed.

5. Conclusions

A compact mixed-integer linear formulation for the Minimum Spanning Tree Problem with Conflicting Edge Pairs was proposed for the first time in the context of this problem and solved via an open-source solver.
The results of a vast experimental campaign run on the benchmark instances adopted in the previous literature are reported. The results indicate that the proposed approach achieves computational results comparable with the best of those achieved by the substantially more complex methods that appeared in the prior literature, although, sometimes, the computation times are longer due to the mechanics of the solver. A total of six instances were closed for the first time, with nine best-known lower bounds and sixteen best-known upper bounds improved out of the two hundred thirty instances considered. In some of the instances, the new approach still performs slightly worse than some among the other methods it is compared against, but overall, it guarantees robust results, with improvements in instances attacked and solved in the research community for more than a decade.
Future research directions might be twofold. On the one hand, compact models, like the one we propose, might be employed on problems with conflicts similar to the one treated in this paper or employ soft constraints (that can be violated at the price of a penalty), which, by their nature, would pose new challenges. On the other hand, variants of the Minimum Spanning Tree, characterized by soft constraints, with penalties to be paid if violated, might be considered.

Author Contributions

Conceptualization, R.M. and D.H.S.; methodology, R.M.; software, R.M.; validation, R.M. and D.H.S.; formal analysis, R.M. and D.H.S.; investigation, R.M.; resources, R.M.; data curation, R.M.; writing—original draft preparation, R.M.; writing—review and editing, R.M. and D.H.S.; visualization, R.M. and D.H.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the Google Cloud Research Credits Program.

Data Availability Statement

The instances used for the experiments, originally introduced in [3,7], are available upon request to the corresponding author.

Acknowledgments

The authors have reviewed and edited the output and take full responsibility for the content of this publication.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Prim, R.C. Shortest connection networks and some generalizations. Bell Syst. Tech. J. 1957, 6, 1389–1401. [Google Scholar] [CrossRef]
  2. Darmann, A.; Pferschy, U.; Schauer, J.; Woeginger, G.J. Paths, trees and matchings under disjunctive constraints. Discret. Appl. Math. 2011, 16, 1726–1735. [Google Scholar] [CrossRef]
  3. Zhang, R.; Kabadi, S.; Punnen, A. The minimum spanning tree problem with conflict constraints and its variations. Discret. Optim. 2011, 2, 191–205. [Google Scholar] [CrossRef]
  4. Samer, P.; Urrutia, S. A branch and cut algorithm for minimum spanning trees under conflict constraints. Optim. Lett. 2014, 1, 41–55. [Google Scholar] [CrossRef]
  5. Carrabs, F.; Cerrone, C.; Pentangelo, R. A multi-ethnic genetic approach for the minimum conflict weighted spanning tree problem. Networks 2019, 2, 134–147. [Google Scholar] [CrossRef]
  6. Carrabs, F.; Gaudioso, M. A Lagrangian approach for the minimum spanning tree problem with conflicting edge pairs. Networks 2021, 1, 32–45. [Google Scholar] [CrossRef]
  7. Carrabs, F.; Cerulli, R.; Pentangelo, R.; Raiconi, A. Minimum spanning tree with conflicting edge pairs: A branch-and-cut approach. In Annals of Operations Research; Springer: Berlin/Heidelberg, Germany, 2019; pp. 65–78. [Google Scholar]
  8. Öncan, T.; Zhang, R.; Punnen, A.P. The minimum cost perfect matching problem with conflict pair constraints. Comput. Oper. Res. 2013, 40, 920–930. [Google Scholar] [CrossRef]
  9. Öncan, T.; Altınel, I.K. Iterated exact and heuristic algorithms for the minimum cost bipartite perfect matching problem with conflict constraints. In Proceedings of the 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, 10–13 December 2017; pp. 1032–1036. [Google Scholar]
  10. Öncan, T.; Altınel, I.K. A Branch-and-Bound Algorithm for the Minimum Cost Bipartite Perfect Matching Problem with Conflict Pair Constraints. Electron. Notes Discret. Math. 2018, 64, 5–14. [Google Scholar] [CrossRef]
  11. Öncan, T.; Şuvak, Z.; Akyüz, M.H.; Altınel, I.K. Assignment problem with conflicts. Comput. Oper. Res. 2019, 111, 214–229. [Google Scholar] [CrossRef]
  12. Yamada, T.; Kataoka, S.; Watanabe, K. Heuristic and exact algorithms for the disjunctively constrained knapsack problem. Informs J. Comput. 2002, 43, 2864–2870. [Google Scholar]
  13. Hifi, M.; Michrafy, M. Reduction strategies and exact algorithms for the disjunctively constrained knapsack problem. Comput. Oper. Res. 2007, 34, 2657–2673. [Google Scholar] [CrossRef]
  14. Hifi, M.; Michrafy, M. A reactive local search-based algorithm for the disjunctively constrained knapsack problem. J. Oper. Res. Soc. 2006, 57, 718–726. [Google Scholar] [CrossRef]
  15. Akeb, H.; Hifi, M.; Ould Ahmed Mounir, M.E. Local branching-based algorithms for the disjunctively constrained knapsack problem. Comput. Ind. Eng. 2011, 60, 811–820. [Google Scholar] [CrossRef]
  16. Hifi, M.; Omani, N. An algorithm for the disjunctively constrained knapsack problem. Int. J. Oper. Res. 2012, 13, 22–43. [Google Scholar] [CrossRef]
  17. Hifi, M. An iterative rounding search-based algorithm for the disjunctively constrained knapsack problem. Eng. Optim. 2014, 46, 1109–1122. [Google Scholar] [CrossRef]
  18. Bettinelli, A.; Cacchiani, V.; Malaguti, E. A Branch-and-Bound Algorithm for the Knapsack Problem with Conflict Graph. INFORMS J. Comput. 2017, 29, 457–473. [Google Scholar] [CrossRef]
  19. Coniglio, S.; Furini, F.; San Segundo, P. A new combinatorial branch-and-bound algorithm for the Knapsack Problem with Conflicts. Eur. J. Oper. Res. 2021, 289, 435–455. [Google Scholar] [CrossRef]
  20. Carrabs, F.; Cerulli, R.; Mansini, R.; Moreschini, L.; Serra, D. Solving the Set Covering Problem with Conflicts on Sets: A new parallel GRASP. Comput. Oper. Res. 2024, 166, 106620. [Google Scholar] [CrossRef]
  21. Jacob, A.; Majumdar, D.; Raman, V. Parameterized complexity of conflict-free set cover. Lect. Notes Comput. Sci. 2019, 11532, 191–202. [Google Scholar]
  22. Saffari, S.; Fathi, Y. Set covering problem with conflict constraints. Comput. Oper. Res. 2022, 143, 105763. [Google Scholar] [CrossRef]
  23. Banik, A.; Panolan, F.; Raman, V.; Sahlot, V.; Saurabh, S. Parameterized Complexity of Geometric Covering Problems Having Conflicts. Algorithmica 2020, 82, 1–19. [Google Scholar] [CrossRef]
  24. Gabow, H.; Maheshwari, S.; Osterweil, L. On Two Problems in the Generation of Program Test Paths. IEEE Trans. Softw. Eng. 1976, SE-2, 227–231. [Google Scholar] [CrossRef]
  25. Krause, K.W.; Goodwin, M.A.; Smith, R.W. Optimal Software Test Planning Through Automated Network Analysis; TRW Systems Group: Redondo Beach, CA, USA, 1973; pp. 18–22. [Google Scholar]
  26. Srimani, P.K.; Sinha, B.P. Impossible pair constrained test path generation in a program. Inf. Sci. 1982, 28, 87–103. [Google Scholar] [CrossRef]
  27. Blanco, M.; Borndörfer, R.; Brückner, M.; Hoàng, N.D.; Schlechte, T. On the Path Avoiding Forbidden Pairs Polytope. Electron. Notes Discret. Math. 2015, 50, 343–348. [Google Scholar] [CrossRef]
  28. Ferone, D.; Festa, P.; Salani, M. Branch and Bound and Dynamic Programming Approaches for the Path Avoiding Forbidden Pairs Problem. In Optimization and Decision Science: ODS, Virtual Conference, November 19, 2020; Cerulli, R., Dell’Amico, M., Guerriero, F., Pacciarelli, D., Sforza, A., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 227–235. [Google Scholar]
  29. Cerulli, R.; Guerriero, G.; Scalzo, E.; Sorgente, C. Shortest paths with exclusive-disjunction arc pairs conflicts. Comput. Oper. Res. 2023, 152, 106158. [Google Scholar] [CrossRef]
  30. Pferschy, U.; Schauer, J. The maximum flow problem with disjunctive constraints. J. Comb. Optim. 2013, 26, 109–119. [Google Scholar] [CrossRef]
  31. Şuvak, Z.; Altınel, I.K.; Aras, N. Exact solution algorithms for the maximum flow problem with additional conflict constraints. Eur. J. Oper. Res. 2020, 287, 410–437. [Google Scholar] [CrossRef]
  32. Carrabs, F.; Cerulli, R.; Mansini, R.; Serra, D.; Sorgente, C. Hybridizing Carousel Greedy and Kernel Search: A new approach for the maximum flow problem with conflict constraints. Eur. J. Oper. Res. 2025, 324, 414–435. [Google Scholar] [CrossRef]
  33. Cerrone, C.; Cerulli, R.; Golden, B. Carousel greedy: A generalized greedy algorithm with applications in optimization. Comput. Oper. Res. 2017, 85, 97–112. [Google Scholar] [CrossRef]
  34. Angelelli, E.; Mansini, R.; Speranza, M.G. Kernel search: A new heuristic framework for portfolio selection. Comput. Optim. Appl. 2012, 51, 345–361. [Google Scholar] [CrossRef]
  35. Klein, A.; Haugland, D.; Bauer, J.; Mommer, M. An integer programming model for branching cable layouts in offshore wind farms. In Advances in Intelligent Systems and Computing; Springer: Berlin/Heidelberg, Germany, 2015; pp. 27–36. [Google Scholar]
  36. Darmann, A.; Pferschy, U.; Schauer, J. Determining a minimum spanning tree with disjunctive constraints. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; pp. 414–423. [Google Scholar]
  37. Magnanti, T.L.; Wolsey, L. Optimal trees. In Handbook in Operations Research and Management Science; Ball, M.O., Magnanti, T.L., Monma, C.L., Nemhauser, G.L., Eds.; North Holland Publishing: Amsterdam, The Netherlands, 1995; pp. 503–615. [Google Scholar]
  38. Abdelmaguid, T.F. An Efficient Mixed Integer Linear Programming Model for the Minimum Spanning Tree Problem. Mathematics 2018, 6, 183. [Google Scholar] [CrossRef]
  39. de Almeida, A.M.; Martins, P.; de Souza, M.C. Min-degree constrained minimum spanning tree problem: Complexity, properties, and formulations. Int. Trans. Oper. Res. 2012, 19, 323–352. [Google Scholar] [CrossRef]
  40. Gouveia, L.; Magnanti, T.L. Network flow models for designing diameter-constrained minimum-spanning and Steiner trees. Networks 2003, 41, 159–173. [Google Scholar] [CrossRef]
  41. Perron, L.; Didier, F. Google OR-Tools-CP-SAT. 2025. Available online: https://developers.google.com/optimization/cp/cp_solver/ (accessed on 9 July 2025).
  42. Montemanni, R.; Dell’Amico, M. Solving the parallel drone scheduling traveling salesman problem via constraint programming. Algorithms 2023, 16, 40. [Google Scholar] [CrossRef]
  43. Montemanni, R.; Dell’Amico, M.; Corsini, A. Parallel drone scheduling vehicle routing problems with collective drones. Comput. Oper. Res. 2024, 163, 106514. [Google Scholar] [CrossRef]
  44. Montemanni, R.; Smith, D.H. On Solving the Maximum Flow Problem with Conflict Constraints. In Proceedings of the 2025 Industrial Electronics and Applications Conference, Sabah, Malaysia, 8–9 September 2025. [Google Scholar]
  45. Montemanni, R. Solving a Home Healthcare Routing and Scheduling Problem with Real-World Features. In Machine Learning and Soft Computing, Proceedings of International Conference on Machine Learning and Soft Computing, Tokyo, Japan, 24–26 January 2025; Springer: Singapore, 2025; pp. 111–119. [Google Scholar]
  46. Stuckey, P.J. Lazy Clause Generation: Combining the Power of SAT and CP (and MIP?) Solving. In Proceedings of the International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming (CPAIOR), Bologna, Italy, 14–18 June 2010; pp. 5–9. [Google Scholar]
  47. GEne Network Expansion. CPU Performance. 2025. Available online: https://gene.disi.unitn.it/test/cpu_list.php (accessed on 9 July 2025).
Figure 1. (Top) An example of a small MSTC instance is shown, where the edge costs are placed by the edges. Edges in black are not affected by conflicts, while any two edges sharing the same red, cyan, blue, or green color are in conflict. According to the notation δ a b = δ a c = δ a f = δ c e = = δ c g = , δ a d = { c , d } , δ b c = { b , e } , δ b e = { b , c } , { d , g } , δ b f = { e , g } , δ c d = { a , d } , δ d g = { b , e } , and δ e g = { b , f } . (Bottom) the optimal solution that does not violate any conflict is reported. Note that no edge of the green conflict is included.
Figure 1. (Top) An example of a small MSTC instance is shown, where the edge costs are placed by the edges. Edges in black are not affected by conflicts, while any two edges sharing the same red, cyan, blue, or green color are in conflict. According to the notation δ a b = δ a c = δ a f = δ c e = = δ c g = , δ a d = { c , d } , δ b c = { b , e } , δ b e = { b , c } , { d , g } , δ b f = { e , g } , δ c d = { a , d } , δ d g = { b , e } , and δ e g = { b , f } . (Bottom) the optimal solution that does not violate any conflict is reported. Note that no edge of the green conflict is included.
Algorithms 18 00526 g001
Figure 2. Assignment of flow variables (f) for the solution reported in Figure 1, assuming node a is designed to be the source node (s).
Figure 2. Assignment of flow variables (f) for the solution reported in Figure 1, assuming node a is designed to be the source node (s).
Algorithms 18 00526 g002
Figure 3. Percentage deviations from the best-known lower bounds in the instances of the first benchmark set.
Figure 3. Percentage deviations from the best-known lower bounds in the instances of the first benchmark set.
Algorithms 18 00526 g003
Figure 4. Percentage deviations from the best-known upper bounds in the instances of the first benchmark set.
Figure 4. Percentage deviations from the best-known upper bounds in the instances of the first benchmark set.
Algorithms 18 00526 g004
Figure 5. Computation times for two exact methods in the instances of the first benchmark set.
Figure 5. Computation times for two exact methods in the instances of the first benchmark set.
Algorithms 18 00526 g005
Figure 6. Percentage deviations from the best-known lower bounds in the instances of the second benchmark set.
Figure 6. Percentage deviations from the best-known lower bounds in the instances of the second benchmark set.
Algorithms 18 00526 g006
Figure 7. Percentage deviations from the best-known upper bounds in the instances of the second benchmark set.
Figure 7. Percentage deviations from the best-known upper bounds in the instances of the second benchmark set.
Algorithms 18 00526 g007
Figure 8. Computation times for two exact methods in the instances of the second benchmark set.
Figure 8. Computation times for two exact methods in the instances of the second benchmark set.
Algorithms 18 00526 g008
Table 1. Computational results for the instances introduced in [3].
Table 1. Computational results for the instances introduced in [3].
InstancesMILPLB-MSTLB-MIHDAMegaHDA+BCBCCP-SAT
[3][3][3][6][5][6][4][7] Dev%
nmpUBLBLBLBSecUBSecUBSecLBUBLBUBSecLBUBSecLBUB
50200199708701.1702.8705.50.37080.77260.4708.0708708.07080.27087085.10.00.0
50200398770739.8757.8761.00.37700.77800.5770.0770770.07700.57707709.20.00.0
50200597917782.7807.8867.70.49170.611760.6917.0917917.09171.891791746.00.00.0
502009951324835.7877.5961.90.41365.40.615870.81324.013241324.013247.413241324199.60.00.0
5020039031636775.1877.51042.81.216360.516532.2-----163616360.10.00.0
5020048772043698.7887.51116.31.620430.520432.5-----204320430.20.00.0
5020058642338626.91030.32338.00.823380.623380.8-----233823380.10.00.0
10030044840413893.53991.24036.60.94099.20.640991.24041.040414041.040414.640414041232.00.00.0
10030089756584508.24624.24982.01.4-1.9-2.15658.056585658.05658178.5565856582758.60.00.0
1003001344--4681.3---2.9--6621.2-6635.4-5010.0InfeasInfeas104.6−100.0−100.0
100300860974344043.45754.97434.00.674341.974340.6-----743474340.10.00.0
10030010,68679683970.56192.37968.00.679681.879680.5-----796879680.20.00.0
10030012,76181663936.36758.68166.00.581661.981660.5-----816681660.10.00.0
100500124742754124.54165.74268.62.34291.25.343013.04275.042754275.0427511.54275427586.60.00.0
100500249559974701.94805.45238.22.563255.082145.55951.460065997.059971239.4567660055010.05.40.1
100500374176654743.84871.35418.82.677883.2-6.86510.894406707.880495010.1626777875010.06.6−0.013
1005006237--4969.0---5.0--7568.7-7729.3-5010.07259-5010.06.10.0
10050012,474--5194.7---6.9--9816.9-10,560.2-5010.0InfeasInfeas15.1−100.0−100.0
10050024,74012,6524289.95104.95565.29.012,6523.412,68120.8-----12,65212,6520.10.00.0
10050030,88611,2323972.75078.85672.715.511,2323.611,28726.4-----11,23211,2320.10.00.0
10050036,82711,4813918.15710.811,481.022.911,4813.611,48124.4-----11,48111,4810.20.00.0
20040013,66017,72814,085.817,245.917,728.01.317,7287.717,7281.4-----17,72817,7280.10.00.0
20040017,08918,61714,067.318,048.218,617.01.518,6177.718,6171.4-----18,61718,6170.10.00.0
20040020,47019,14013,998.718,646.219,140.01.419,1407.619,1401.4-----19,14019,1400.10.00.0
200600179715,0291111.611,425.812,451.64.9-12.6-8.613,072.914,70713,171.214,0865010.012,84114,4055010.02.52.3
2006003594 -12,487.0 --24.0--17,532.7-17,595.0-5010.000158.9−100.0−100.0
2006005391 -12,873.2 --31.6--InfeasInfeasInfeasInfeas16.4InfeasInfeas0.00.00.0
20060034,50420,7169466.115,393.120,716.03.020,71611.620,7163.0-----20,71620,7160.10.00.0
20060042,86018,0259100.613,971.518,025.02.118,02512.018,0252.2-----18,02518,0250.20.00.0
20060050,98420,8648734.516,708.120,864.01.920,86412.520,8642.0-----20,86420,8640.10.00.0
200800319622,11017,428.817,922.619,685.18.622,350.822.2-18.920,744.221,85220,941.521,5535010.120,03022,7225010.04.45.4
2008006392--19,705.7- -28.4--26,361.3-26,526.7-5010.124,259-5010.08.50.0
2008009588--20,684.8- -38.3--29,443.6-30,634.2-5010.028,351-5010.07.50.0
20080015,980--20,226.9- -48.0--33,345.1-36,900.2-5010.00035.4−100.0−100.0
20080062,62539,89516,806.523,792.339,895.043.339,89516.739,89545.8-----39,89539,8950.20.00.0
20080078,38737,67115,803.122,174.237,671.07.737,67115.937,6718.2-----37,67137,6710.20.00.0
20080093,97838,79815,470.124,907.038,798.04.538,79817.338,7984.7-----38,79838,7980.10.00.0
30060031,00043,72134,154.242,720.643,721.03.043,72119.243,7213.4-----43,72143,7210.10.00.0
30060038,21644,26733,320.143,486.744,267.03.144,26722.344,2673.4-----44,26744,2670.20.00.0
30060045,31043,07132,072.342,149.043,071.03.043,07124.643,0713.1-----43,07143,0710.30.00.0
3008003196--30,190.1---62.8--InfeasInfeasInfeasInfeas2911.1InfeasInfeas3.30.00.0
30080059,60043,12524,384.336,629.643,125.03.343,12532.743,1253.1-----43,12543,1250.10.00.0
30080074,50042,29222,913.238,069.342,292.03.242,29235.642,2923.2-----42,29242,2920.30.00.0
30080089,30044,11421,624.638,843.044,114.03.444,11435.444,1143.2-----44,11444,1140.10.00.0
30010004995--40,732.7---79.3--51,451.3-51,398.4-5010.048,180-5010.06.40.0
30010009990--42,902.5---119.1--60,907.8-61,878.9-5010.0InfeasInfeas181.3−100.0−100.0
300100014,985--44,639.1---141.3--InfeasInfeasInfeasInfeas1820.0InfeasInfeas9.70.00.0
300100096,59071,56236,544.756,048.371,562.09.271,56241.571,5629.5-----71,56271,5620.10.00.0
3001000120,50076,34534,380.858,780.176,345.06.676,34533.476,3456.7-----76,34576,3450.20.00.0
3001000144,09078,88033,481.260,810.878,880.05.278,88036.978,8805.4-----78,88078,8800.10.00.0
Averages −9.1−9.8
Table 2. Computational results for the instances introduced in [7].
Table 2. Computational results for the instances introduced in [7].
InstancesHDAHDA+BCCP-SAT
[6][6][7] Dev%
n m p s LBSecUBSecLBUBSecLBUBSecLBUB
2560181347.00.043470.05347.03470.03473470.230.00.0
2560187389.00.043890.04389.03890.03893890.180.00.0
25601813353.00.043530.04353.03530.03533530.190.00.0
25601819346.00.043460.05346.03460.03463460.190.00.0
25601825336.00.043360.04336.03360.03363360.180.00.0
25907131379.60.093810.07381.03810.03813810.450.00.0
25607137381.50.053900.07390.03900.13903900.320.00.0
25607143372.00.053720.06372.03720.03723720.440.00.0
25607149357.00.053570.06357.03570.03573570.240.00.0
25607155406.00.054060.06406.04060.04064060.380.00.0
256012461385.00.063850.07385.03850.03853850.180.00.0
256012467432.00.064320.07432.04320.04324320.200.00.0
256012473424.50.074740.1458.04580.34584580.480.00.0
256012479398.00.074000.08400.04000.04004000.450.00.0
256012485406.80.084210.12420.04200.04204200.420.00.0
25904191310.10.053110.05311.03110.03113110.540.00.0
25904197306.00.053060.06306.03060.03063060.360.00.0
259041103299.00.052990.05299.02990.02992990.310.00.0
259041109297.00.052970.05297.02970.02972970.300.00.0
259041115318.00.053180.05318.03180.03183180.250.00.0
2590161121305.00.083050.09305.03050.03053050.540.00.0
2590161127339.00.123390.11339.03390.03393390.290.00.0
2590161133344.00.083440.09344.03440.03443440.230.00.0
2590161139328.00.093310.11329.03290.03293290.610.00.0
2590161145325.00.083270.11326.03260.03263260.890.00.0
2590281151347.90.13490.13349.03490.03493490.560.00.0
2590281157370.60.13850.16385.03850.53853852.670.00.0
2590281163330.80.113350.14335.03350.03353350.660.00.0
2590281169334.70.13580.18348.03480.13483481.910.00.0
2590281175350.10.13590.17357.03570.03573570.980.00.0
2512072181282.00.072820.06282.02820.02822820.240.00.0
2512072187294.00.062940.06294.02940.02942940.900.00.0
2512072193284.00.062840.08284.02840.02842840.480.00.0
2512072199281.00.062810.07281.02810.02812810.530.00.0
2512072205292.00.062920.06292.02920.02922920.300.00.0
25120286211320.30.123210.16321.03210.03213211.060.00.0
25120286217317.00.123170.17317.03170.03173170.640.00.0
25120286223284.00.562840.12284.02840.02842840.310.00.0
25120286229311.00.123120.17311.03110.03113110.580.00.0
25120286235290.00.132900.13290.02900.02902900.360.00.0
25120500241319.20.163410.26329.03290.13293294.720.00.0
25120500247326.10.163470.25339.03390.53393391.840.00.0
25120500253354.50.163830.3368.03680.43683681.550.00.0
25120500259306.50.163140.22311.03110.03113110.650.00.0
25120500265318.00.163250.25321.03210.03213210.740.00.0
50245299271619.00.346190.37619.06190.06196192.750.00.0
50245299277604.00.366040.38604.06040.06046041.490.00.0
50245299283634.00.346340.35634.06340.06346340.720.00.0
50245299289615.50.346160.4616.06160.16166161.490.00.0
50245299295595.00.345950.44595.05950.05955957.280.00.0
502451196301668.50.576980.96678.06781.467867827.190.00.0
502451196307655.50.567210.99681.06813.268168151.960.00.0
502451196313678.20.597251709.07096.3709709612.250.00.0
502451196319634.01.266560.86639.06391.563963916.540.00.0
502451196325658.80.567481.01681.06813.868168157.540.00.0
502452093331661.30.76--791.28205010.07788165010.001.7−0.5
502452093337706.00.75--835.08351938.78358354603.220.00.0
502452093343666.50.74--773.28115010.17608225010.001.71.4
502452093349680.80.76--820.08365010.18328322874.48−1.5−0.5
502452093355693.90.74--769.076925.7769769266.660.00.0
50367672361570.00.825700.88570.05700.15705708.050.00.0
50367672367561.00.865610.98561.05611.456156110.480.00.0
50367672373573.00.865731.06573.05730.05735732.980.00.0
50367672379560.00.865600.87560.05600.05605601.610.00.0
50367672385549.00.835510.99549.05490.554954917.120.00.0
503672687391596.41.266572.37612.06127.5612612230.760.00.0
503672687397596.71.276632.24615.06156.6615615154.670.00.0
503672687403577.11.266352.33587.05873.058758735.790.00.0
503672687409608.51.267212.4634.06347.3634634508.170.00.0
503672687415636.13.086882.45643.06433.264364372.480.00.0
503674702421624.41.66--701.37265010.16897355010.001.71.2
503674702427635.41.65--719.57535010.07127625010.001.01.2
503674702433646.91.64--723.97865010.07197845010.000.7−0.3
503674702439597.51.72--669.87115010.06667025010.000.6−1.3
503674702445665.11.718683.36737.37645010.07277755010.001.41.4
504901199451548.01.685522.03548.05480.15485488.410.00.0
504901199457530.01.665311.88530.05300.553053011.770.00.0
504901199463549.01.655491.76549.05490.05495493.080.00.0
504901199469540.01.675412.01540.05400.254054046.210.00.0
504901199475540.01.655401.71540.05400.05405404.770.00.0
504904793481584.32.386294.63594.05947.8594594109.310.00.0
504904793487559.92.46504.9579.057913.85795791473.290.00.0
504904793493578.32.436574.75589.05893.058958931.170.00.0
504904793499565.42.396434.74577.05777.5577577118.570.00.0
504904793505577.42.46704.71592.05926.059259240.340.00.0
504908387511575.02.48126.54632.26665010.06266835010.001.02.6
504908387517569.03.07--626.76515010.06186465010.001.4−0.8
504908387523592.23.08--658.46785010.06506765010.001.3−0.3
504908387529592.53.07--662.26825010.16546925010.001.21.5
504908387535587.53.098286.95644.26575010.06366745010.001.32.6
755551538541868.02.51--868.08680.786886875.240.00.0
755551538547870.92.49--871.08713.087187158.570.00.0
755551538553838.02.45--838.08380.383883833.730.00.0
755551538559855.02.47--855.08554.485585544.640.00.0
755551538565857.02.47--857.08574.185785748.190.00.0
755556150571942.33.49--1023.710475010.0101110485010.001.20.1
755556150577937.63.54--1008.810695010.299610545010.001.3−1.4
755556150583910.93.48--987.310405010.197310445010.001.40.4
755556150589913.03.53--985.69985010.197310045010.001.30.6
755556150595897.93.54--962.69945010.195310095010.001.01.5
7555510,762601922.54.44--1054.5-4647.31048-5010.000.60.0
7555510,762607948.012.01--1070.9-3483.61066-5010.000.50.0
7555510,762613901.94.44--1041.0-5010.01034-5010.000.70.0
7555510,762619888.44.44--1006.4-5010.01005-5010.000.10.0
7555510,762625914.74.42--1048.1-3208.11043-5010.000.50.0
758323457631797.86.86--798.07984.879879878.240.00.0
758323457637820.06.83--821.08211.1821821637.560.00.0
758323457643815.36.87--816.08164.0816816262.590.00.0
758323457649820.07.16--820.082023.9820820184.060.00.0
758323457655815.07.23--815.08151.481581584.810.00.0
7583213,828661830.99.08--875.78915010.08679095010.001.02.0
7583213,828667859.59.05--901.89475010.18939565010.001.01.0
7583213,828673829.09.04--873.78925010.08629345010.001.34.7
7583213,828679842.28.98--885.69154570.88749185010.001.30.3
7583213,828685846.79.05--886.98965010.08779115010.001.11.7
7583224,199691870.012.24--955.8-1305.3954-5010.000.20.0
7583224,199697837.712.33--913.0-1161.2913-5010.000.00.0
7583224,199703842.027.17--915.0-953.0913-5010.000.20.0
7583224,199709863.011.98--950.4-5010.1954-5010.00−0.40.0
7583224,199715878.712.14--960.8-962.3960-5010.000.10.0
7511106155721787.014.88--787.07872.1787787237.820.00.0
7511106155727785.014.82--785.07855.4785785214.710.00.0
7511106155733783.014.78--783.07830.0783783102.860.00.0
7511106155739783.914.94--784.07843.3784784128.210.00.0
7511106155745796.514.86--797.07975.7797797479.970.00.0
75111024,620751816.919.16--846.58575010.08408715010.000.81.6
75111024,620757798.019.28--829.28514573.58248475010.000.6−0.5
75111024,620763808.419.44--841.58922189.88379175010.000.52.8
75111024,620769808.019.31--841.68642866.08338765010.001.01.4
75111024,620775804.019.32--837.88685010.18298685010.001.00.0
75111043,085781817.027.33--873.5-2357.1870-5010.000.40.0
75111043,085787804.026.74--857.0-3106.8859-5010.00−0.20.0
75111043,085793827.326.9--885.911943443.8884-5010.000.2100.0
75111043,085799799.0 --856.70-3448.3861-5010.00−0.50.0
75111043,085805806.027.14--859.1-3146.2851-5010.000.90.0
10099048968111118.511.59--1119.0111943.7111611215010.000.30.2
10099048968171134.711.43--1137.0113711.8113711371091.570.00.0
10099048968231112.511.71--1113.0111371.811131113493.890.00.0
10099048968291109.611.48--1110.0111048.611101110942.310.00.0
10099048968351088.711.99--1090.0109035.810901090357.100.00.0
10099019,5838411175.615.37--1249.4-5010.0123915705010.000.8−100.0
10099019,5838471142.014.98--1225.814915010.0120516505010.001.710.7
10099019,5838531140.714.8--1215.015105010.0120316235010.001.07.5
10099019,5838591178.114.82--1264.214415010.2124816325010.001.313.3
10099019,5838651176.415.36--1257.315605010.1124415555010.001.1−0.3
10099034,2698711126.422.2--1264.8-5010.01251-5010.001.10.0
10099034,2698771148.924.59--1295.6-5010.01285-5010.000.80.0
10099034,2698831179.921.17--1323.7-5010.01305-5010.001.40.0
10099034,2698891146.720.3--1283.6-5010.01268-5010.001.20.0
10099034,2698951155.020.42--1309.1-5010.01297-5010.000.90.0
100148511,0199011077.934.81--1079.01079248.6107710815010.000.20.2
100148511,0199071054.934.46--1056.01056113.410561056757.170.00.0
100148511,0199131059.034.29--1059.0105947.910591059503.940.00.0
100148511,0199191046.034.09--1046.01046195.2104610461206.510.00.0
100148511,0199251071.234.17--1072.01072249.6107110725010.000.10.0
100148544,0759311096.946.07--1144.013743018.3113014445010.001.25.1
100148544,0759371091.045.6--1143.612912144.6113415115010.000.817.0
100148544,0759431084.446.54--1137.613443075.6112513905010.001.13.4
100148544,0759491089.446.01--1136.912863523.3113114175010.000.510.2
100148544,0759551088.445.84--1134.613702954.2112715245010.000.711.2
100148577,1319611083.560.68--1164.4-4773.81156-5010.000.70.0
100148577,1319671086.060.29--1168.2-5010.01160-5010.000.70.0
100148577,1319731094.060.69--1187.8-5010.01175-5010.001.10.0
100148577,1319791105.960.83--1183.7-5010.01175-5010.000.70.0
100148577,1319851090.960.63--1164.5-5010.01155-5010.000.80.0
100198019,5939911030.976.15--1031.01031214.410311031919.880.00.0
100198019,5939971034.976.02--1036.0103642.8103610361298.690.00.0
100198019,59310031024.076.43--1024.0102421.810241024622.640.00.0
100198019,59310091025.076.67--1025.0102527.410251025546.970.00.0
100198019,59310151027.577.49--1028.01028151.0102810281964.480.00.0
100198078,36910211060.5106.68--1097.012345010.1109113585010.000.510.0
100198078,36910271034.0106.82--1065.611875010.1106413055010.000.29.9
100198078,36910331050.5104.96--1087.412135010.1107613145010.001.08.3
100198078,36910391048.1103.83--1083.512215010.1107613205010.000.78.1
100198078,36910451048.9103.99--1084.112455010.1107913535010.000.58.7
1001980137,14510511041.8129.47--1100.6-5010.11086-5010.001.30.0
1001980137,14510571066.5129.26--1126.3-5010.11114-5010.001.10.0
1001980137,14510631052.4130.38--1111.3-5010.11087-5010.002.20.0
1001980137,14510691062.9130.01--1118.7-5010.11100-5010.001.70.0
1001980137,14510751055.5130.01--1114.1-5010.11105-5010.000.80.0
Averages 0.40.8
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Montemanni, R.; Smith, D.H. On Solving the Minimum Spanning Tree Problem with Conflicting Edge Pairs. Algorithms 2025, 18, 526. https://doi.org/10.3390/a18080526

AMA Style

Montemanni R, Smith DH. On Solving the Minimum Spanning Tree Problem with Conflicting Edge Pairs. Algorithms. 2025; 18(8):526. https://doi.org/10.3390/a18080526

Chicago/Turabian Style

Montemanni, Roberto, and Derek H. Smith. 2025. "On Solving the Minimum Spanning Tree Problem with Conflicting Edge Pairs" Algorithms 18, no. 8: 526. https://doi.org/10.3390/a18080526

APA Style

Montemanni, R., & Smith, D. H. (2025). On Solving the Minimum Spanning Tree Problem with Conflicting Edge Pairs. Algorithms, 18(8), 526. https://doi.org/10.3390/a18080526

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop