Abstract
In the paper, we consider a generalization of the classical assignment problem, which is called the constrained assignment problem with bounds and penalties (CA-BP). Specifically, given a set of machines and a set of independent jobs, each machine has a lower and upper bound on the number of jobs that can be executed, and each job must be either executed on some machine with a given processing time or rejected with a penalty that we must pay for. No job can be executed on more than one machine. We aim to find an assignment scheme for these jobs that satisfies the constraints mentioned above. The objective is to minimize the total processing time of executed jobs as well as the penalties from rejected jobs. The CA-BP is related to some practical applications such as edge computing, which involves selecting tasks and processing them on the edge servers of an internet network. As a result, a motivation of this study is to improve the efficiency of internet networks by limiting the lower bound of the number of objects processed by each edge server. Our main contribution is modifying the previous network flow algorithms to satisfy the lower capacity constraints, for which we design two exact combinatorial algorithms to solve the CA-BP. Our methodologies and results bring novel perspectives into other research areas related to the assignment problem.
Keywords:
cloud–edge collaborative; constrained assignment; bounds; penalties; combinatorial algorithms MSC:
05C21; 05C90; 90B35
1. Introduction
To address the substantial increase in mobile data traffic, edge computing, which refers to selecting tasks and processing them on the edge servers of the internet network [1], has emerged as a compelling solution to enhance computing performance. This approach involves the deployment of cloud computing services at the edges of the network, offering the potential for significant improvements [2]. Edge computing can effectively overcome the deficiencies of core network congestion and high latency that are commonly observed in conventional cloud computing systems.
The Cloud–Edge Collaborative Computing Framework (CECCF) [2] is a computing framework where the first step performs edge computing and the second transfers the remaining tasks to the cloud computing center for further processing. In most cases in the CECCF, the edge servers can be seen as machines. The objective of task offloading in the CECCF entails the strategic selection of specific tasks for execution by edge servers and delegating the remaining tasks to be processed by cloud computing centers, so as to minimize the total cost of processing tasks on the edge servers plus the cost of processing the remaining tasks in the cloud computing center.
1.1. Model Description
In order to use the internet network edges more efficiently, it is usually expected that the number of objects served by any edge server will exceed a certain number. Inspired by this thinking, we model the task offloading problem driven by the CECCF as a constrained assignment problem with bounds and penalties (CA-BP). Treating the cost of processing any task on the cloud computing center in the above context as a penalty, the CA-BP is modeled as follows. The input of the CA-BP consists of a set of m machines (edge servers) with two integer functions , and a set of n jobs (computation tasks) with a function . It is necessary for each machine to receive at least and at most jobs from J to execute. Each job must be either executed on some machine with its processing time or rejected (executed by the cloud computing center) and given a penalty (computing cost) that we must pay for. No job in J can be executed on more than one machine. We aim to find an assignment scheme of these n jobs that satisfies the aforementioned constraints. The objective is to minimize the total processing time of executed jobs as well as the penalties from rejected jobs.
1.2. Literature Review
The assignment problem (AP) is one of the well-known combinatorial optimization problems, which has many wide applications in real life [3]. This assignment problem was first raised in 1952 by Votaw and Orden [4]. Subsequently, Kuhn [5] in 1955 presented the Hungarian method to solve the assignment problem and examined the actual solutions of the assignment problem and its variations. In the past six decades, the assignment problem has been deeply studied in the literature [6,7,8,9].
According to the difference in the numbers of jobs and machines, assignment problems can be generally divided into two categories, namely one-to-one assignment problems (OTO-APs) and one-to-many assignment problems (OTM-APs) [3]. The OTO-AP is described as follows. Given a factory that has n machines and an order to process n jobs, each machine must receive exactly one job, and each job is only executed on one machine with its given processing time. An assignment scheme to minimize the total processing time is thus needed. Another kind of assignment problem is the OTM-AP. In this problem, the number of jobs and the number of machines are no longer equal, and a machine can execute multiple jobs.
The OTO-AP is mathematically related to the weighted bipartite matching problem in graph theory [3], and many efficient algorithms [3,5,10] have been presented to solve this problem, among which the most famous is the Hungarian method proposed in [5]. The OTM-AP can be viewed as a scheduling problem [11], which has been solved by the shortest processing time first (SPT) algorithm [12]. Moreover, by applying the circular flow method, the OTM-AP can be solved in polynomial time [10,13]. In addition, a variation of the OTM-AP is to minimize the maximum processing time of the machines. This problem and other related problems have been considered extensively in the literature [14,15,16,17].
With continuous research on the assignment problem, researchers have found that when the processing times of some jobs are very long, no matter which machines the jobs are assigned to for processing, it will cause the objective function value to become very large. As was surveyed by Shabtay et al. [18], in many cases, processing all jobs may not be a good strategy. A strategy which leads to penalties for rejecting some jobs would still have an acceptable total benefit; i.e., this scheme for n jobs would be better.
Based on the aforementioned idea, Bartal et al. [19] in 2000 first proposed the parallel machines scheduling problem with rejection, which is modeled as follows. Given a set of m parallel (identical) machines and a set of n jobs, each job has a processing time and a penalty . The model is tasked with assigning these n jobs to m machines for execution, and the objective is to minimize the maximum processing time of machines as well as the penalties from rejected jobs. Bartal et al. [19] designed an online algorithm with the best-possible competitive ratio for the online version and presented a polynomial time approximation scheme (PTAS) for the offline version. Following this pioneering work, scheduling problems with rejection have been studied extensively in the literature [20,21,22,23,24,25].
1.3. Main Contributions
The main contributions of this paper are as follows: (1) We are the first to attempt to model the task offloading problem in cloud–edge collaborative computing as the CA-BP, and based on our modeling method, many related task-offloading problems in cloud–edge collaborative computing can be solved. (2) Using a strategy that satisfies the lower capacity constraints first, we modify several previous network flow algorithms to match the capacity constraint with the upper and lower bounds. (3) Using the modified network flow algorithms in (2), we design two exact combinatorial algorithms to solve the CA-BP.
The remainder of this paper is organized as follows. In Section 2, we present some terminologies and fundamental lemmas to ensure the correctness of our algorithms. In Section 3, we design two exact combinatorial algorithms to solve the CA-BP. In Section 4, we present our conclusion and further directions.
2. Terminologies and Fundamental Lemmas
In this section, we provide some terminologies, notations, and fundamental lemmas in order to verify the algorithms used for solving the CA-BP.
For convenience, we denote as an instance of the CA-BP, where is a set of m machines and is a set of n jobs. Each machine must execute at least and at most jobs from J, and each job must be either executed on some machine within its processing time or rejected with a penalty that we must pay for. No job can be executed on more than one machine.
For an arc set A and an element e, we use the notation to denote that the element e belongs to the set A. Given a network (directed graph) N with a source s and a sink t, we restate some definitions and problems in [26]. Note that from now on the network refers to the directed graph, unlike the “network” in the Abstract and Introduction.
Definition 1.
Given a network with a source s, a sink t, and a capacity function , we define an -flow f (in N) to be a function satisfying the following three conditions:
- (1)
- The capacity constraint: for each arc , we have , where is called the flow value of this arc e;
- (2)
- The flow conservation: for each vertex , we have , where | and |;
- (3)
- For the source s, we have .
We call the value of an -flow f. In addition, for any -flow f in a network , where is a unit cost function, we define the cost of flow f as . Furthermore, if the value is an integer for each , this -flow f is called an integer -flow in N.
Problem 1
(the maximum flow problem). Given a network with a capacity function , the maximum flow problem is to find an -flow f in N. The objective is to maximize the value = among all -flows in N.
Problem 2
(the minimum-cost flow problem). Given a network and a positive integer k, where is a capacity function and is a unit cost function, the minimum-cost flow problem is to find an -flow f with value ; the objective is to minimize the cost among all -flows with value k in N.
3. Constrained Assignment Problem with Bounds and Penalties
In this section, we consider the constrained assignment problem with bounds and penalties (CA-BP). The objective is to minimize the total processing times of executed jobs as well as the penalties from rejected jobs. Without loss of generality, we assume that ; otherwise, there is no feasible solution to the CA-BP.
Given an instance of the CA-BP, we use variables and simply as a scheme , to represent an execution of n jobs on m machines, where a variable indicates the job to be executed on that machine , and otherwise, for any and . Then, we may obtain the linear integer programming (IP) to determine the CA-BP as follows:
where the first constraint indicates that each job is assigned on at most one machine to be executed; i.e., no job can be executed on more than one machine. The second constraint indicates that each machine must execute at least and at most jobs from J.
In order to optimally solve the CA-BP, and equivalently the linear integer programming (IP), we intend to transfer the CA-BP to the minimum-cost flow problem on a special network constructed in the following, where the flow value of each arc in such a problem must be between a lower bound and an upper bound. Figure 1 roughly illustrates the process of this transformation.
Figure 1.
Construction of a network .
Given an instance of the CA-BP, we can construct a network in the following ways. Denote , where s and t are two special vertices; and are two sets of vertices copied from the set , respectively; and , where , , , }, , . We may define lower and upper capacities and unit costs on these arcs as follows. For each arc , let the lower capacity and the upper capacity . For each arc , let and . At the same time, let the unit cost for each arc , the unit cost for each arc , and for each arc . In addition, if there exists an -flow in this network , to satisfy for each arc , we call this flow f a bounded -flow in N.
Using the aforementioned construction, we obtain the following key lemma.
Lemma 1.
Given an instance of the CA-BP, we can construct a network as mentioned above, such that there is a feasible solution with cost z on the instance I if and only if there is an integer-bounded -flow f of value in N, where the cost is .
Proof.
(Necessity) Suppose that there is a feasible scheme with cost z for the linear integer programming (). We construct an integer -flow f in N as follows. For every in , if , let , , , , and ; otherwise, let , , , , and . For each , let , which implies that . Using this construction, we easily obtain that f is an integer-bounded -flow of value n in N, where the cost is .
(Sufficiency) Suppose that there exists an integer-bounded -flow f with value n and cost in N. It is easy to see that for each arc , implying that , and for each arc . We construct a scheme for the linear integer programming (IP) as follows. For each arc , if , denote ; otherwise, denote . Using this construction, for each , we have , implying that . This easily shows that the scheme is a feasible solution to the linear integer programming (), i.e., a feasible solution for the CA-BP, where the cost is .
This completes the proof of the lemma. □
Using Lemma 1, we easily obtain the following.
Corollary 1.
The CA-BP has an optimal solution with cost z if and only if there exists a minimum-cost integer-bounded -flow f of value n in N (mentioned above), where the cost .
In order to find the minimum-cost integer-bounded -flow in N, we need the following definitions.
Definition 2
(The residual network). Suppose that f is a bounded -flow with value k in the network . The residual network of N, with respect to f, is constructed in the following way: (1) At the beginning, let . (2) For each arc , we add two residual arcs and to , where the residual capacities are and . (3) Then, we delete arcs in whose residual capacities are 0.
Definition 3
(The incremental network). Suppose that f is a bounded -flow with value k in the network . The incremental network of N, with respect to f, is constructed in the following way: (1) At the beginning, let . (2) For each arc , we add two incremental arcs and to , where the incremental capacities , and the unit incremental costs , . (3) Then, we delete all arcs in whose incremental capacities are 0.
Similarly, to solve the minimum-cost flow problem, we obtain a result for the bounded flow as follows. The method of proof is similar to Theorem 12.1 in [10]; we present its proof in detail for completeness.
Lemma 2.
Let f be an integer-bounded -flow with value n in the network mentioned above. Then, f is a minimum-cost integer-bounded -flow with value n if and only if the incremental network has no negative directed cycle with respect to the incremental cost function .
Proof.
(Necessity) Suppose, to the contrary, that there is a directed cycle with a negative cost in the incremental network . We can augment the current flow f along by some value to obtain a new flow with value n. According to the construction of the incremental network, the augment process does not violate the lower and upper bound constraints, so is an integer-bounded -flow with value n. Since the cost of is negative, we have , which contradicts the fact that f is a minimum-cost integer-bounded -flow.
(Sufficiency) Assume that every directed cycle in the incremental network has a non-negative cost. For each arc and , we define by the following:
Let be another feasible integer-bounded -flow. Then, is a feasible circular flow, and we have
where are directed cycles in the incremental network , and . That is, the flow can be decomposed into flows on some circles. Therefore,
Since every directed cycle has a non-negative total cost , we have .
This completes the proof of the lemma. □
According to the aforementioned results, we can use the following strategies to find a minimum-cost integer-bounded -flow with value n in the network :
- (1)
- Firstly, we determine an integer -flow with value in N to satisfy the lower bounds of arc capacities.
- (2)
- Secondly, we augment the flow obtained in (1) to a minimum-cost integer-bounded -flow with value n in the network .
To solve stage (1), we construct another network from the network , where , , and the capacity is for each and for each . This process is shown in Figure 2. In this network , we can use the Edmonds–Karp algorithm [27] in polynomial time to find an integer -flow with value .
Figure 2.
Construction of a network .
Using Lemma 2 and the two aforementioned stages, we design a combinatorial algorithm, denoted by (Algorithm 1), to solve the CA-BP.
| Algorithm 1: |
|
Using the algorithm , we obtain the following result.
Theorem 1.
The algorithm is an optimal algorithm to solve the CA-BP, and it runs in time , where m and n are the numbers of machines and jobs, respectively.
Proof.
By Lemma 2, it is easy to see that the algorithm can optimally solve the CA-BP. In the first stage (Steps 1–5) of the algorithm , we can use the Edmonds–Karp algorithm [27] to find an integer -flow with value n in time , where m and n are the numbers of machines and jobs, respectively. Furthermore, in the second stage (Steps 6–7) of the algorithm , we can use the minimum mean cycle algorithm [28] to find a minimum-cost -flow with value n in time . To sum up, the total running time of the algorithm is .
This completes the proof of the theorem. □
To facilitate the understanding of the algorithm , we give the following small example : m = 2, n = 4. The penalty costs are , , , and , respectively. The processing time for each job is given in Table 1, and the upper and lower bound constraints for each machine are given in Table 2. Now, we consider the processes of applying algorithm to this example.
Table 1.
Processing time for example .
Table 2.
Upper and lower bound constraints for example .
Applying Steps 1–4 of the algorithm , an integer -flow f with value in N can be found as follows: (a) ; (b) for each remaining arc . Then, Steps 5–7 augment the current integer -flow f, and a new integer-bounded -flow f with value in N is produced as follows: (1) ; (2) ; (3) ; (4) ; (5) ; (6) for each remaining arc . According to the flow f, a scheme with the optimal value is found, where the optimal scheme is to reject job and to execute job on machine and jobs and on machine .
On the other hand, by further analyzing the construction of N, we hope to reduce the complexity of the algorithm to solve the CA-BP. Therefore, according to the other algorithms for solving the minimum-cost flow problem, we intend to design another algorithm to resolve the CA-BP. Using similar arguments as in [26], we obtain the following result.
Lemma 3.
Let f be a minimum-cost bounded -flow with value k in the network as mentioned above, where for each . Let be the shortest directed s–t path in with respect to the cost function ,and be an -flow obtained when augmenting f along by at most the minimum augmentation capacity θ on , that is,
Then, is a minimum-cost bounded -flow with value .
Proof.
It is easy to see that is a feasible bounded -flow with value in N. Considering the incremental network , the reverse of arc e must be in for any arc .
Suppose, on the contrary, that is not a minimum-cost bounded -flow. As we know from Lemma 2, there must be a negative cycle in . Since f is the minimum-cost bounded -flow with value k in the network N, we obtain that must contain some arcs , , ⋯, in , corresponding to arcs , , ⋯, in , where we denote the set of these arcs as . Let denote a network (which may have multiple arcs) formed by combining the vertices and arcs in and negative cycle . Obviously, in , there is one more arc leaving the vertex s than entering it, there is one more arc entering t than leaving it, and the numbers of leaving arcs and entering arcs of any other vertex are equal.
Let , and update by removing the isolated vertices in . Then, is the union of an s–t path and some cycles, denoted by
where is an s–t path in , are the cycles in , and holds for each . Since , , , and , we have
contradicting the choice of . Hence, is the minimum-cost bounded -flow with value in the network N.
This completes the proof of the lemma. □
Using Lemma 3, we design a combinatorial algorithm, denoted by (Algorithm 2), to resolve the CA-BP.
| Algorithm 2: |
|
Using algorithm , we obtain the following result.
Theorem 2.
The algorithm can optimally solve the CA-BP, and it runs in time , where n is the number of jobs.
Proof.
Using the successive shortest path algorithm [10,29], the first stage (Steps 1–4) of algorithm produces a minimum-cost integer -flow in the network , which can be transformed into a minimum-cost bounded -flow with value in N. In subsequent steps, Lemma 3 guarantees the optimality of the algorithm .
The complexity of the algorithm can be determined as follows: (1) Using the successive shortest path algorithm, Steps 1–4 need time to find a minimum-cost -flow with value , where n is the number of jobs. (2) Similarly, the other steps need at most time . Hence, the algorithm needs a total time .
This completes the proof of the theorem. □
As an illustration of the algorithm , we also apply the algorithm to the example mentioned above: a four-job example to be scheduled on two machines. Applying Steps 1–4 of the algorithm , a minimum-cost integer -flow with value in N can be found as follows: (1) ; (2) for each remaining arc . Then, executing Step 5 to augment the current minimum-cost integer -flow f along , a new integer-bounded -flow f in N is produced. According to the flow f, a scheme is found by the algorithm , where the scheme is to reject job and execute job on machine and jobs and on machine . It is easy to verify that the optimal value is , and is an optimal scheme.
4. Conclusions and Further Research
In this paper, we consider the constrained assignment problem with bounds and penalties (CA-BP), and we obtain the following results:
- (1)
- We design a combinatorial algorithm to optimally solve the CA-BP, and it runs in polynomial time .
- (2)
- By considering the construction of auxiliary networks, we design another combinatorial algorithm to optimally solve the CA-BP, and it runs in polynomial time .
Intuitively, the algorithm is obviously better, and its time complexity is lower than that of the algorithm . However, in some cases in actual operation, the algorithm can perform better; for example, in some instances, the networks N and satisfy the conditions that (1) the number of augmenting flow is lower, implying that Steps 3–5 of algorithm can be executed in time , and (2) for each flow f, the corresponding incremental network has fewer negatively directed cycles, so the algorithm can be executed in time , which is slightly better than the algorithm . This means that although the time complexity of the algorithm is lower, in some special cases, the algorithm can perform better.
In addition, we introduce several interesting future research topics. First, a further challenge is to reduce the complexity of these two combinatorial algorithms for the CA-BP. Second, it would be interesting to investigate the online version of this model, or its offline versions, with other objectives. Third, it would be interesting to study a more general setting of processing time, i.e., our model with learning effects or deterioration effects [30,31,32]. Finally, it would also be an interesting direction to consider our problem with release dates and submodular rejection penalties [33], which is defined as follows.
Given a set of m machines (edge servers) with two integer functions , and a set of n jobs (computation tasks), each job has a processing time and a release time , where the job can be processed at or after its release time. For the penalty submodular function , without loss of generality, we assume that . The constrained assignment problem with release times and submodular penalties aims to find a partition of J, where A is the set of jobs that are processed on machines and is the set of rejected jobs. The objective is to minimize the total processing time of executed jobs as well as the rejection penalty .
Author Contributions
Conceptualization, G.H., P.P. and J.L.; formal analysis, G.H. and P.P.; validation, J.L.; resources, G.H. and P.P.; writing—original draft preparation, G.H.; writing—review and editing, P.P. and G.H.; methodology, G.H.; supervision, J.L. All authors have read and agreed to the published version of the manuscript.
Funding
This paper was supported by the National Natural Science Foundation of China (No. 12101593, 12361066). Junran Lichen was also supported by Fundamental Research Funds for the Central Universities (No. buctrc202219). Guojun Hu and Pengxiang Pan were also supported by the Project of Yunling Scholars Training of Yunnan Province. The work was supported by Yunnan University and the Beijing University of Chemical Technology.
Data Availability Statement
No new data were created or analyzed in this study. Data sharing is not applicable to this article.
Acknowledgments
The authors would like to thank the anonymous referees for their excellent comments and suggestions on how to improve the quality and the presentation of the paper.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Ji, T.; Wan, X.; Guan, X.; Zhu, A.; Ye, F. Towards optimal application offloading in heterogeneous edge-cloud computing. IEEE Trans. Comput. 2023, 72, 3259–3272. [Google Scholar] [CrossRef]
- Jin, H.; Gregory, M.A.; Li, S. A review of intelligent computation offloading in multiaccess edge computing. IEEE Access 2022, 10, 71481–71495. [Google Scholar] [CrossRef]
- Pentico, D.W. Assignment problems: A golden anniversary survey. Eur. J. Oper. Res. 2007, 176, 774–793. [Google Scholar] [CrossRef]
- Votaw, D.F.; Orden, A. The personnel assignment problem. In Symposium on Linear Inequalities and Programming; Planning Research Division, Comptroller, Headquarters US Air Force: Washington, DC, USA, 1952; pp. 155–163. [Google Scholar]
- Kuhn, H.W. The Hungarian method for the assignment problem. Nav. Res. Logist. Q. 1955, 2, 83–97. [Google Scholar] [CrossRef]
- Morita, K.; Shiroshita, S.; Yamaguchi, Y.; Yokoi, Y. Fast primal-dual update against local weight update in linear assignment problem and its application. Inf. Process. Lett. 2024, 183, 106432. [Google Scholar] [CrossRef]
- Karsu, O.; Azizoglu, M. An exact algorithm for the minimum squared load assignment problem. Comput. Oper. Res. 2019, 106, 76–90. [Google Scholar] [CrossRef]
- Aksoy, M.; Yanik, S.; Amasyali, M.F. Reviewer assignment problem: A systematic review of the literature. J. Artif. Intell. Res. 2023, 76, 761–827. [Google Scholar] [CrossRef]
- Misevičius, A.; Verenė, D. A hybrid genetic-hierarchical algorithm for the quadratic assignment problem. Entropy 2021, 23, 108. [Google Scholar] [CrossRef]
- Schrijver, A. Combinatorial Optimization: Polyhedra and Efficiency; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
- Hoogeveen, H. Multicriteria scheduling. Eur. J. Oper. Res. 2005, 167, 592–623. [Google Scholar] [CrossRef]
- Conway, R.W.; Maxwell, W.L.; Miller, A. Theory of Scheduling; Addison-Wesley Publishing Co.: Boston, MA, USA, 1967. [Google Scholar]
- Hu, Y.; Liu, Q. A network flow algorithm for solving generalized assignment problem. Math. Probl. Eng. 2021, 2021, 5803092. [Google Scholar] [CrossRef]
- Wei, Z.J.; Wang, L.Y.; Zhang, L.; Wang, J.B.; Wang, E. Single-machine maintenance activity scheduling with convex resource constraints and learning effects. Mathematics 2023, 11, 3536. [Google Scholar] [CrossRef]
- Graham, R.L.; Lawler, E.L.; Lenstra, J.K.; Rinnooy Kan, A.H.G. Optimization and approximation in deterministic sequencing and scheduling: A survey. Ann. Discrete Math. 1979, 5, 287–326. [Google Scholar] [CrossRef]
- Ebenlendr, T.; Krčál, M.; Sgall, J. Graph balancing: A special case of scheduling unrelated parallel machines. Algorithmica 2014, 68, 62–80. [Google Scholar] [CrossRef]
- Nguyen, T.T.; Rothe, J. Improved bi-criteria approximation schemes for load balancing on unrelated machines with cost constraints. Theor. Comput. Sci. 2021, 858, 35–48. [Google Scholar] [CrossRef]
- Shabtay, D.; Gaspar, N.; Kaspi, M. A survey on offline scheduling with rejection. J. Sched. 2013, 16, 3–28. [Google Scholar] [CrossRef]
- Bartal, Y.; Leonardi, S.; Marchetti-Spaccamela, A.; Sgall, J.; Stougie, L. Multiprocessor scheduling with rejection. SIAM Discret. Math. 2000, 13, 64–78. [Google Scholar] [CrossRef]
- Engels, D.W.; Karger, D.R.; Kolliopoulos, S.G.; Sengupta, S.; Uma, R.N.; Wein, J. Techniques for scheduling with rejection. J. Algorithms 2003, 49, 175–191. [Google Scholar] [CrossRef]
- Ou, J.; Zhong, X.; Wang, G. An improved heuristic for parallel machine scheduling with rejection. Eur. J. Oper. Res. 2015, 241, 653–661. [Google Scholar] [CrossRef]
- Li, W.; Li, J.; Zhang, X.; Chen, Z. Penalty cost constrained identical parallel machine scheduling problem. Theor. Comput. Sci. 2015, 607, 181–192. [Google Scholar] [CrossRef]
- Kones, I.; Levin, A. A unified framework for designing EPTAS for load balancing on parallel machines. Algorithmica 2019, 81, 3025–3046. [Google Scholar] [CrossRef]
- Zhang, L.; Lu, L.; Yuan, J. Single machine scheduling with release dates and rejection. Eur. J. Oper. Res. 2009, 198, 975–978. [Google Scholar] [CrossRef]
- Koulamas, C.; Steiner, G. New results for scheduling to minimize tardiness on one machine with rejection and related problems. J. Sched. 2021, 24, 27–34. [Google Scholar] [CrossRef]
- Korte, B.; Vygen, J. Combinatorial Optimization: Theory and Algorithms; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar] [CrossRef]
- Edmonds, J.; Karp, R.M. Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM 1972, 19, 248–264. [Google Scholar] [CrossRef]
- Karp, R.M. A characterization of the minimum cycle mean in a digraph. Discret. Math. 1978, 23, 309–311. [Google Scholar] [CrossRef]
- Ahuja, R.; Magnanti, T.; Orlin, J. Network Flows: Theory, Algorithms, and Applications; Prentice-Hall: Englewood Cliffs, NJ, USA, 1993. [Google Scholar]
- Qian, J.; Zhan, Y. The due date assignment scheduling problem with delivery times and truncated sum-of-processing-times-based learning effect. Mathematics 2021, 9, 3085. [Google Scholar] [CrossRef]
- He, H.; Zhao, Y.; Ma, X.; Lu, Y.Y.; Ren, N.; Wang, J.B. Study on scheduling problems with learning effects and past sequence delivery times. Mathematics 2023, 11, 4135. [Google Scholar] [CrossRef]
- Lv, D.; Xue, J.; Wang, J. Minmax common due-window assignment scheduling with deteriorating Jobs. J. Oper. Res. Soc. China 2023. [Google Scholar] [CrossRef]
- Liu, X.; Xiao, M.; Li, W.; Zhu, Y.; Ma, L. Algorithms for single machine scheduling problem with release dates and submodular penalties. J. Comb. Optim. 2023, 45, 105. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).