Next Article in Journal
Two Regularization Methods for Identifying the Spatial Source Term Problem for a Space-Time Fractional Diffusion-Wave Equation
Next Article in Special Issue
A Matheuristic Approach for the Multi-Depot Periodic Petrol Station Replenishment Problem
Previous Article in Journal
The Shape Parameter in the Shifted Surface Spline—A Sharp and Friendly Approach
Previous Article in Special Issue
Intrusion Detection in Networks by Wasserstein Enabled Many-Objective Evolutionary Algorithms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Budgeted Labeled Minimum Spanning Tree Problem

Department of Mathematics, University of Salerno, 84084 Fisciano, SA, Italy
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(2), 230; https://doi.org/10.3390/math12020230
Submission received: 17 November 2023 / Revised: 26 December 2023 / Accepted: 3 January 2024 / Published: 10 January 2024
(This article belongs to the Special Issue Combinatorial Optimization and Applications)

Abstract

:
In order to reduce complexity when designing multi-media communication networks, researchers often consider spanning tree problems defined on edge-labeled graphs. The earliest setting addressed in the literature aims to minimize the number of different media types, i.e., distinct labels, used in the network. Despite being extensively addressed, such a setting completely ignores edge costs. This led to the definition of more realistic versions, where budgets for the total cost, or the number of distinct labels allowed, were introduced. In this paper, we introduce and prove the NP-hardness of the Budgeted Labeled Minimum Spanning Tree problem, consisting in minimizing the cost of a spanning tree while satisfying specified budget constraints for each label type. This problem combines the challenges of cost efficiency and label diversity within a fixed budgetary framework, providing a more realistic and practical approach to network design. We provide three distinct mathematical programming formulations of the problem and design a Lagrangian approach to derive tighter lower bounds for the optimal solution of the problem. The performances of the proposed methods are assessed by conducting a series of computational experiments on a variety of randomly generated instances, which showed how the complexity of the problem increases as the size of the network, as well as the number of labels, increase and the budget restrictions are tightened.

1. Introduction

Designing effective multi-media communication networks is becoming increasingly relevant in today’s digital era. One of the most studied network design problems is the well-known Minimum Spanning Tree (MST) problem, in which a cost is associated with each edge of the network and the objective is to identify a spanning tree, namely a connected acyclic subgraph spanning all the nodes of the network, of minimum cost. The applications of this problem extend beyond the network design scenarios, encompassing several fields such as constructing highways or railroads connecting multiple cities; laying pipelines to connect offshore drilling sites, refineries, and consumer markets; designing local access networks; and even making electric wire connections on a control panel [1]. Researchers have delved into a wide range of spanning tree problems, particularly those associated with edge-labeled graphs [2].
One of the first proposed natural extensions of the MST is the Minimum Label Spanning Tree (MLST) problem, consisting in finding a spanning tree in a connected, undirected graph with labeled (or colored) edges, while minimizing the number of distinct labels used. Such an extension models more realistic scenarios in which different communication media, including fiber optics, cable, microwave, or telephone lines, may be implemented. In such contexts, building a spanning tree that relies on a smaller number of media types is more desirable, as it is associated with a reduced complexity of the communication process. However, the MLST does not take into account the cost of the installed edges. For this reason, more realistic variants, incorporating spanning tree cost restrictions, as well as constraints on the number of distinct labels permitted, have been proposed [3]. In the former case, one can have a maximum cost budget available to establish the links of the network and focus on using as few different media types as possible, represented by distinct labels, aiming at reducing communication complexity. In the latter case, instead, the number of different media types is upper bounded by a provided budget and the construction costs are minimized.
While this line of research has been extensively pursued, it often overlooks a critical aspect: in numerous applications, the availability of a specific type of connection may be limited and the outcome may consequently depend on the number of available connections supporting each media type.
Furthermore, as considered in previous works [4], multiple labels can be associated with each edge, representing the requirement of supporting different technologies, as well as different transmission frequencies, when establishing a connection between two endpoints. In this case, a label set is associated with each edge of the network and selecting such an edge in the solution entails the implementation of all the technologies supported by the related connection, as indicated by its label set. Budget constraints also enable the decision maker to express preferences on the available media types, thus influencing the homogeneity of the network.
To model this scenario from a cost-minimization perspective, this paper introduces the Budgeted Labeled Minimum Spanning Tree (BLMST) problem, which extends the MST problem by considering budget constraints for each label. The BLMST problem aims to minimize the total cost of the spanning tree while ensuring that, for each type of label, the number of edges using that label does not exceed the specified budget. Unlike the MST problem, which can be efficiently solved in polynomial time, the BLMST problem is NP-hard due to budget constraints. We provide three distinct mathematical programming formulations for the BLMST problem and propose a Lagrangian approach to derive tight lower bounds on the optimal solution value. Through comprehensive computational experiments conducted on randomly generated instances, we provide a comparative analysis of the formulations and detect relevant trends in terms of solution costs and computational times, as a function of several characteristics of the instances.
The rest of the paper is divided into the following sections: review of the literature on MST-related optimization problems, with a focus on those defined on edge-colored graphs and the ones equipped with budget constraints (Section 2); formal definitions and notations used in our study to describe the problem (Section 3); proof of the NP-hardness of the BLMST problem and presentation of the mathematical models proposed to solve it (Section 4 and Section 5); properties of the BLMST problem (Section 6); description of a Lagrangian approach designed to derive tighter lower bounds, eventually with upper bounds, for the problem (Section 7); computational experiments conducted to validate the proposed approaches (Section 8); and summary of the key findings, contributions, and implications of this study (Section 9).

2. Literature Review

Numerous problems defined on edge-colored graphs have been addressed in the literature, including extensions of the traveling salesman problem [5] and the Hamiltonian cycle problem [6], as well as the labeled perfect matching problem [7].The aforementioned MLST problem was first introduced and proven to be NP-complete in [8], along with an exact algorithm based on the A * paradigm and two heuristic algorithms. Since then, several contributions have been provided, including exact approaches [9], heuristics [10], and metaheuristics [11,12]. In [13], Consoli and Moreno Pérez introduced a hybrid local search algorithm for the MLST, combining variable neighborhood search and simulated annealing paradigms, while an intelligent optimization approach was proposed in [14], integrating variable neighborhood search with machine learning, statistics, and soft computing techniques.
Generalizations of the problem have subsequently been investigated. In this context, Chen et al. introduced the Generalized Minimum Labeling Spanning Tree (GMLST) problem [15], for which Silva et al. recently provided a compact binary integer programming formulation and an analysis of the associated polytope [16]. The GMLST has the same objective as the MLST, i.e., minimizing the number of used labels, but it is defined on graphs whose edges are associated with multiple labels. Chwatal and Raidl adapted single commodity flow and Miller–Tucker–Zemlin-based formulations to the GMLST problem and proposed new formulations, together with strengthening cuts [17]. Since a single label can be selected when including an edge in the solution, the GMLST problem can be reduced to the MLST problem by replacing each edge e E with a set of parallel edges whose cardinality corresponds to the number of labels associated with e [16]. Afterwards, Cerrone et al. introduced the Strong Generalized Minimum Label Spanning Tree (SGMLST) problem [4]. This further generalization of both the MLST and GMLST problems aims at minimizing the number of labels used while designing a spanning tree in contexts where selecting an edge entails the usage of all the labels associated with it. The authors proposed a mathematical programming formulation and three heuristic approaches for the problem, based on greedy, carousel greedy, and pilot-method [18] techniques.
In [19], a more realistic extension of the MLST problem, namely the Label-Constrained Minimum Spanning Tree (LCMST) problem, has been introduced. The LCMST consists in finding the min-cost spanning tree of a graph that does not exceed a specified number of labels. The authors proposed a mixed integer programming formulation of the problem, a local search heuristic, and a genetic algorithm to solve it. In the same paper, a further extension of the MLST, named Cost Constrained Minimum Spanning Tree (CCMST) problem, has been introduced. Specularly to the LCMST, the CCMST aims to find a spanning tree using the minimum number of labels without exceeding a given cost budget. Both problems have been shown to be NP-complete. In [3], a variable neighborhood search method has been proposed for the CCMST and then adapted for the LCMST as well.
Other extensions of the MLST problem include the Minimum Labeling Steiner Tree (MLST) problem [20], aiming to minimize the number of different labels while covering specified vertices of the graph, as well as the Minimum Spanning Tree with Conflicts (MSTC), involving conflicting pairs of edges, among which at most one of each pair can belong to a feasible solution. This problem was initially proposed as “MST with disjunctive constraints” in [21,22], where conflicts between edges are represented in a conflict graph. Since then, several solution approaches have been proposed in the literature [23,24,25,26,27].

3. Definitions and Notations

The BLMST problem, addressed in this paper, is defined on an undirected and weighted graph G = ( V , E ) , together with a set L of distinct labels. When referring to an edge of G, we adopt two alternative notations: when we do not need to refer to edge endpoints, we write e E ; otherwise, we use the notation { i , j } E . Additionally, let us define the neighborhood δ ( i ) of any node i V as the set containing all the nodes that are directly connected to node i in G, formally δ ( i ) = { j V : { i , j } E } .
Each edge e E is associated with a cost c e , contributing to the total cost of the spanning tree if e is selected, as well as with a subset of labels, specified by an edge-labeling function ϕ : E P ( L ) , where P ( L ) indicates the set of all possible subsets of L. Note that the same label can be associated with multiple edges and vice versa. Let us denote by E the set of edges labeled with , namely E = { e E : ϕ ( e ) } . For each label L , the number of edges in the spanning tree with label must not exceed a given budget B . The objective of the BLMST problem is to find a minimum spanning tree that minimizes the total coverage cost while satisfying the budget constraints for each label. Formally, the BLMST problem asks for a spanning tree T = ( V , E T ) of G such that:
  • e E T c e e E T ˜ c e spanning tree T ˜ of G ;
  • | E E T | B L , i.e., budget constraints are satisfied for each label.

4. Complexity

In this section, we prove the NP-hardness of the BLMST problem by providing a polynomial reduction from the Degree Constrained Minimum Spanning Tree (DCMST) problem, which is known to be NP-hard [28]. The DCMST problem consists in finding a min-cost spanning tree of a given weighted graph G = ( V , E ) while ensuring that the degree of each node does not exceed a specified integer k, i.e.,  | δ ( v ) | k , v V .
The decision version of the DCMST and BLMST problems are given below.
DCMST d : Given an undirected and weighted graph G = ( V , E ) , a non-negative integer k, and a cost threshold C, determine whether there exists a spanning tree of G of cost at most C, where the degree of each node is at most k.
BLMST d : Given an undirected and weighted graph G = ( V , E ) , a set of labels L, an edge-labeling function ϕ : E P ( L ) , a budget B for each label L m. and a cost threshold C, determine if there exists a spanning tree of G of cost at most C, s.t. the number of edges in E is at most B for each L .
Proposition 1.
Given an instance I D = ( G , k , C ) of DCMST d , where G = ( V , E ) is a weighted graph, k is an integer, and C is a cost threshold, it holds that DCMST d p BLMST d .
Proof. 
We prove a polynomial-time reduction from any instance I D = ( G , k , C ) of DCMST d to an instance I B = ( G , L , ϕ , B , C ) of BLMST d . Let G = ( V , E ) be the graph in I D . In order to build I B , let us define G = ( V , E ) , with  V = V and E = E . Furthermore, let L contain a distinct label for each node in G, i.e.,  L = { v : v V } , and assign a unique label v to each node v V ; for each edge e = { u , v } E , define ϕ ( e ) = { u , v } , meaning that each edge is associated with both the labels of its endpoints; set the budget B v of each label v L to k. This models the degree constraint in DCMST d ; finally, impose the same cost threshold for the BLMST d instance, i.e.,  C = C . This reduction maps each feasible solution of DCMST d ( I D ) to a feasible solution of BLMST d ( I B ) with an equivalent cost and vice versa. Indeed, the degree constraint in DCMST d is effectively captured by the label budgets in BLMST d . Therefore, a spanning tree of G with a total cost at most C and maximum node degree k corresponds to a spanning tree in G with a total cost at most C s.t. the number of selected edges in | E | is at most k, which corresponds to B , for each label L ; thus, all the budget constraints are satisfied. Conversely, via construction, a spanning tree of G with a total cost at most C never uses more than B = k edges labeled with , L . This means that the degree of each node v V is always at most k; thus, this represents a feasible solution for the DCMST d of cost at most C. As a result, DCMST d polynomially reduces to BLMST d .    □
Figure 1 visually represents the reduction process from DCMST to BLMST. Initially, in Figure 1a,b, we assume the cost of each edge to be one for simplicity. It is essential to note, however, that this reduction is generalizable to cases where edges have varying positive integer costs. Figure 1a shows an instance of the DCMST problem on a graph, where the maximum degree constraint is k = 2 . This figure establishes the baseline scenario for the reduction, depicting a graph where each edge is assigned a cost of one. In Figure 1b,c, we illustrate the transformation of the DCMST instance into a BLMST instance. Here, we first assign a unique label to each node (e.g., labels {a, b, c, d, e}). Then, each edge inherits labels from the nodes it connects, effectively defining its own set of labels. The budget in the BLMST instance is set for each label, which corresponds to the degree constraint of k = 2 from the DCMST problem. Thus, the budget for each label, pertaining to the edges labeled with it, is also k = 2 . Figure 1d shows a spanning tree constituting the optimal solution of both the DCMST and BLMST instances. Given the constraints and cost assumptions, the same spanning tree is identified as the optimal solution for both problems, demonstrating the effectiveness of the reduction.

5. Mathematical Formulations

The classical packing formulation based on the well-known subtour elimination constraints [29] can be extended to impose the budget requirements. The resulting linear program (LP) is as follows.
min x { i , j } E c i j x i j
s . t . { i , j } E x i j = | V | 1
j δ ( i ) x i j 1 i V
{ i , j } E ( S ) x i j | S | 1 S V : | S | 3
{ i , j } E x i j B L
x i j { 0 , 1 } { i , j } E
Formulation (1)–(6) uses a binary decision variable x i j associated with each edge { i , j } E , defined in such a way that x i j assumes a value equal to 1 if { i , j } belongs to the spanning tree, and 0 otherwise. The objective function (1) minimizes the total cost associated with the selected edges, i.e., the ones s.t. x i j = 1 . In order to obtain a tree, constraints (2) impose that the number of selected edges is exactly equal to the number of vertices minus one, while constraints (4) prevent cycles by forbidding, for each subset of nodes S V , the selection of strictly more than | S | 1 edges with both endpoints in S. Furthermore, constraints (3) are valid inequalities, satisfied by every feasible solution of the BLMST problem, eventually improving the continuous relaxation of Formulation (1)–(6) by requiring that each vertex is spanned by at least one edge. Finally, constraints (5) impose, for each label L , that the number of selected edges associated with such a label, i.e., the number of edges { i , j } in E s.t. x i j = 1 , does not exceed the budget available B .
Alternatively, constraints (5) can be modified by using additional variables to keep track of budget violations and assigning sufficiently large cost coefficients to those variables, actually preventing budget violations. To this aim, let us introduce a binary auxiliary variable y defined for each L , equal to 1 if the number of edges { i , j } E s.t. ϕ ( { i , j } ) and x i j = 1 is strictly larger than B . The resulting penalization-based formulation is given below.
min x { i , j } E c i j x i j + P L y
s . t . { i , j } E x i j = | V | 1
j δ ( i ) x i j 1 i V
{ i , j } E ( S ) x i j | S | 1 S V : | S | 3
{ i , j } E x i j | E | y + B L
x i j { 0 , 1 } { i , j } E
y { 0 , 1 } L
The objective function (7) sums up the costs associated with the selected edges and a penalty P for each budget violation. The value of P must be an upper bound on the cost of every feasible solution of the BLMST problem. A natural choice for P is the cost of the maximum spanning tree of G, which can be computed in polynomial time by replacing the cost of each edge with its additive inverse and then computing the minimum spanning tree of the resulting graph [30].
A third alternative is to incorporate the budget constraints within a single-commodity flow formulation, in which an arbitrary node s V is selected as the source node, from which | V | 1 units of flow are sent through the network, each destined for one of the remaining nodes. Continuous variables are associated with each arc of the directed network G D = ( V , A ) , having the same node set as G and an edge set containing both the arcs ( i , j ) and ( j , i ) for every edge { i , j } E . Specifically, a variable f i j 0 represents the amount of flow on the arc ( i , j ) , ( i , j ) A . If a positive flow is sent either on ( i , j ) or ( j , i ) , then { i , j } belongs to the spanning tree. Below is the compact single-commodity flow formulation.
min f , x ( i , j ) A c i j x i j
s . t . ( i , j ) A x i j = | V | 1
( i , j ) A f i j ( j , i ) A f j i = | V | 1 if i = s 1 if i V { s } i V
f i j ( | V | 1 ) x i j ( i , j ) A
x i j + x j i 1 { i , j } E
( i , j ) A x i j B L
x i j { 0 , 1 } ( i , j ) A
f i j 0 ( i , j ) A
The objective function (14) minimizes, as before, the total cost of the tree. The selection of exactly | V | 1 arcs is imposed via constraints (15), while constraints (16) are flow conservation constraints guaranteeing that each node receives exactly one unit of flow, except for the source. Constraints (17) link the f and x variables by allowing a positive flow on a given arc only if the corresponding edge belongs to the spanning tree. Although the model contains two variables for each edge of the original graph, constraints (18) prevent the related directed arcs from simultaneously carrying positive flow. Finally, the budget restrictions are imposed via constraints (19), where A denotes the set of directed arcs of G D whose corresponding edges of G have label , i.e.,  A = { ( i , j ) A : ϕ ( { i , j } ) } .

6. Properties of BLMST Solutions

Since, without the restriction on the budget, the BLMST problem reduces to the MST problem, the cost associated with an optimal solution of the latter constitutes a trivial lower bound for the former, as no spanning tree of G of a smaller cost exists. Furthermore, let us denote by ϕ ( i ) the set of labels associated with at least one edge incident on node i, i V .
ϕ ( i ) = j δ ( i ) ϕ ( { i , j } )
In any feasible solution of the BLMST, the number of selected edges incident on any node i is always at least one, for node i to the spanned, and never exceeds the sum of the budgets available for the labels associated with such edges.
1 j δ ( i ) x i j ϕ ( i ) B i V

7. Lagrangian Approach

To provide lower bounds for the BLMST problem, we employed a methodology inspired by the Lagrangian Relaxation method, previously adopted in other MST problem extensions [27,31], as well as in other contexts including assignment, network optimization, and wireless sensor network problems [32]. This involves the creation of a Lagrangian relaxation for the problem and the resolution of its associated Lagrangian dual. In our strategy, we include a greedy heuristic at the start of the Lagrangian dual algorithm to potentially enhance the upper bound for the BLMST problem.

7.1. Greedy Algorithm for BLMST

In the following, a heuristic to find feasible solutions to the problem is described.
Algorithm 1 is a modification of Kruskal’s algorithm, adapted for the BLMST problem. It begins by initializing an empty tree (Line 1) and setting the residual budget for each label (Line 2). The edges of the graph G are sorted in non-decreasing order of cost (Line 3). The algorithm then iteratively examines each edge { i , j } E (Line 4), verifying whether adding it to the tree would violate the budget constraints of any label, while also ensuring that it does not introduce cycles (Line 5). If the edge can be added without violating these constraints, it is added to the tree (Line 6) and the residual budgets are updated accordingly (Line 7). The process continues until all edges have been examined. The algorithm returns the constructed spanning tree (Line 10). Due to the budget constraints, the algorithm cannot guarantee a feasible solution as Kruskal’s algorithm does. Consequently, the resulting solution might be disconnected.
Algorithm 1: GreedyBLMST
Mathematics 12 00230 i001

7.2. Lagrangian Relaxation

We address the BLMST problem by focusing on the classical packing formulation introduced in Section 5. This formulation serves as the foundation for applying the Lagrangian relaxation method, allowing us to relax the budget constraints (5) and integrate them into the objective function. The relaxation process involves introducing a Lagrangian multiplier λ 0 for each label L , which leads to our Lagrangian function L ( x , λ ) . Each multiplier can be seen as a “tool” for weighing the importance of the associated constraint in the objective function, allowing us to remove the constraints in the definition of the feasible region of the relaxed problem, but taking into account the satisfaction or violation of the constraints themselves in the objective function. The term added to the original objective function rewards the satisfaction of the constraints and penalizes their violation, so the objective function goes in the direction of satisfying all constraints. If the multiplier is too small, the associated constraint’s impact on the objective function becomes minimal, leading to insufficient emphasis on fulfilling this constraint. Conversely, if the multiplier is too large, it can overly influence the objective function, causing it to focus excessively on satisfying the particular constraint. It is not trivial to find the right values to associate with these multipliers. This function modifies the original objective by integrating the weighted relaxed constraints, resulting in
L ( x , λ ) = { i j } E c i j x i j L ( λ B ) + L { i j } E λ x i j
which leads us to formulate the Relaxed Lagrangian Problem (RLP) as follows.
R L P L ( x , λ ) = { i , j } E c i j x i j L ( λ B ) + L { i , j } E λ x i j
s . t . { i , j } E x i j = | V | 1
j δ ( i ) x i j 1 i V
{ i , j } E ( S ) x i j | S | 1 S V : | S | 3
x i j { 0 , 1 } { i , j } E
Except for the constant term L ( λ B ) , Formulation (24) essentially conforms to a standard MST problem. In this scenario, the edge weights are determined according to a specific assignment rule: c i j ^ = c i j + ϕ ( { i , j } ) λ . Given this property, the RLP can be solved using a classic greedy algorithm typically designed for the MST problem (like Kruskal, Prim). The feasible set of the RLP is defined as   
X = x i j { 0 , 1 } | E | : { i , j } E x i j = | V | 1 , { i j } E ( S ) x i j | S | 1 S V , | S | 3
thus, we can reformulate the RLP in a compact way:
R L P : min x X , λ 0 L ( x , λ )
For a given vector λ of Lagrangian multipliers and a corresponding set of decision variables x for the problem, we define an instance of RLP as R L P ( λ , x ) . The Lagrangian Dual is formulated as
L D : max λ 0 min x X L ( x , λ )
In addressing the Lagrangian dual for this problem, we encounter a maximization problem where the objective function exhibits concavity and a piecewise affine nature, indicative of its nonsmooth characteristic. A comprehensive exploration of both theoretical foundations and practical computational strategies for nonsmooth optimization can be found in [33]. The LD problem could be solved as a Continuous Linear Programming problem, but it is often very computationally expensive. To solve LD, other heuristic methods are therefore used, including the Subgradient algorithm which is a technique for determining good Lagrangian multipliers.

7.3. Subgradient Algorithm for the BLMST Problem

We now proceed to detail our approach for updating multipliers in tackling the Lagrangian dual. In this context, we delve into the dual ascent strategy, a technique for handling nonsmooth optimization, which is crucial for enhancing our approach to derive effective lower bounds while maintaining computational efficiency.
The Subgradient Algorithm for BLMST (Algorithm 2) requires the following inputs: (i) a graph G, which serves as the problem’s structure; (ii) the labeling function ϕ ; (iii) α , a parameter influencing the rate of change in the Lagrangian multipliers; (iv) Δ , the iteration threshold, which is an integer determining when to modify the step size; (v) Ω , the maximum number of iterations the algorithm will perform; and (vi) ε , the convergence tolerance, representing a stopping criterion of the algorithm based on the convergence toward the lower bound.
The algorithm outputs the tighter lower bound identified for the BLMST problem. During the initialization phase (Lines 1–7), the algorithm sets the initial values of the Lagrangian multipliers ( λ ) equal to zero. Then, it sets the lower bounds L B and L B ¯ to negative infinity, where L B records the current lower bound, while L B ¯ tracks the previously computed lower bound. After that, the algorithm initializes the upper bound U B using the UpperBoundInitialization procedure. This procedure returns the value of the solution computed via the GreedyBLMST algorithm when feasible; otherwise, it calculates the value of the maximum MST. At the end of the initialization phase, the algorithm initializes the iteration counter i and the improvement iteration tracker i m p r I t e r a t i o n . The counter i monitors the current iteration number, while i m p r I t e r a t i o n keeps track of the last iteration in which the bound was updated.
The iteration phase of the algorithm starts at Line 8 and consists of a singular while loop spanning Lines 9–23. Each iteration involves updating the vector λ to identify the most effective Lagrangian multipliers. The loop iterates up to a maximum of Ω times. Delving into the procedural steps within each iteration, at Line 10, the algorithm starts the construction of the Relaxed Lagrangian Problem (RLP), using the current values of the λ multipliers and the x variables, extracted from the graph G; the function ϕ is used to construct the budget constraints. At Line 11, the algorithm optimally solves the subproblem, yielding the optimal solution x * for the relaxed Lagrangian. On Lines 12–14, the algorithm evaluates whether the value of the Lagrangian function L ( x * , λ ) , calculated for the current iteration, exceeds the previously established lower bound L B . If so, the algorithm updates L B and stores the current iteration into i m p r I t e r a t i o n . The algorithm performs the computation of the Lagrangian subgradients s at Line 15, subsequently determining the value of the step size parameter θ at Line 16. As already mentioned, the Lagrangian multipliers provide a reward or a penalty based on whether the solution found satisfies the relaxed constraints or not, pushing the objective function to find a solution that does not violate the relaxed constraints. Here, s indicates the growth direction of the objective function, and  θ represents the length of the step. On Lines 19–20, the algorithm verifies if the lower bound is equal to the upper bound and checks how much the lower bound computed in the current iteration ( L B ) differs from the previous one ( L B ¯ ). On Line 20, the algorithm updates L B ¯ . The if statement on Lines 21–22 evaluates whether there has been no enhancement in the lower bound over the last Δ iterations. If this is the case, the value of α is halved to moderate the convergence of the algorithm. On Line 23, the algorithm increases the iteration counter i, while on Line 24, the best computed lower bound is returned.
Algorithm 2: Subgradient algorithm for BLMST
Mathematics 12 00230 i002
The UpperBoundInitialization algorithm (Algorithm 3) provides an upper bound estimate for the BLMST problem. It first runs the GreedyBLMST algorithm to eventually build a spanning tree T from the given graph G and labeling function ϕ (Line 1). If the resulting tree T is a feasible solution for the BLMST problem, then the algorithm computes and returns the cost associated with T (Line 2), which represents an upper bound for the value of the optimal solution. However, if T is not feasible for the BLMST problem, the algorithm calculates the cost of the Maximum Spanning Tree (MaxMST) of G (Line 6). The cost of such a tree, even if associated with an infeasible solution for BLMST, provides an upper bound for any feasible solution of the problem. The algorithm then returns this value as the upper bound (Line 7). This approach ensures that an upper bound is always provided.
Algorithm 3: UpperBoundInitialization
Mathematics 12 00230 i003

8. Computational Experiments

In this section, we compare the proposed methods presenting the results of our computational tests. The methods were coded in Python on an OSX platform, running on an Apple M2 Max system with a 64 GB unified memory. All the mathematical formulations were solved by using the IBM ILOG CPLEX 12.1.1 solver with a maximum number of threads equal to three and an imposed time limit of 1800 s.

8.1. Test Instances

Since no benchmark instances for the BLMST problem are available in the literature, we generated a set of random instances according to some choices presented in the following. Provided the desired number of nodes | V | , a uniformly random Prüfer sequence of length | V | 2 is generated and then converted to the unique tree T associated with such sequence. Subsequently, a set of labels L is generated, according to a target size | L | { 5 , 10 , 20 } . Given a budget B associated with each label L , is assigned to exactly B randomly sampled edges of T, which ensures, via construction, the existence of at least one feasible solution of BLMST, i.e., the spanning tree T. A graph G = ( V , E ) is obtained by iteratively adding edges to T until a target density d is reached, where d = 2 | E | | V | ( | V | 1 ) . Finally, a random cost w i j [ w m i n , w m a x ] is assigned to each edge in { i , j } E and each label is assigned to each edge of G that does not belong to T with probability γ = 0.4 . In this way, one or more labels will be assigned to each edge.
We generated 162 instances by setting different values for each parameter. More in detail, in order to further investigate the impact of the budget restrictions, we organized the instances in three scenarios, composed of 54 instances each, depending on the values used for B . Fixed budget values have been considered, as detailed below.
Scenario 1:
B = | V | / 2 , L ;
Scenario 2:
B = | V | / 3 , L ;
Scenario 3:
B = | V | / 4 , L .
The tighter the budget, the more challenging is expected to be the resolution of an instance; thus, we will compare the performances of the proposed methods as B varies.

8.2. Results Discussion

In this section, we present the computational results obtained from solving the mathematical models using the commercial solver CPLEX, as well as the results obtained with our Subgradient algorithm.

8.2.1. Mathematical Models

We start our discussion with a comparison of the three formulations for Scenario 1. The results of this comparison are contained in Table 1 in which the first three columns report the information about the instances: the number of labels | L | , the number of nodes ( | V | ), and the network density (d). When available, the fourth column, heading Obj, reports the value of the optimal solution. If no optimal solution is available, (u) appears close to the value of the best feasible solution computed within the time limit. If no solution is available, (l) appears close to the value of the best lower bound given by the formulation. The fifth column, named Nodes, reports the number of nodes explored by CPLEX in the B&B tree, while the sixth column, i.e., Time, reports the computational times in seconds. The fourth, fifth, and sixth columns refer to the results obtained by Formulation (1)–(6), while the subsequent columns report the same information for Formulations (7)–(13) and (14)–(21), respectively.
The content of the table is divided into three main groups of instances, sharing the same number of labels | L | { 5 , 10 , 20 } . For each of these groups, two additional rows report the number of optimal solutions found by each formulation (#Opt), along with the average cost of the identified solution, computed considering only the instances where at least an upper bound is available, the average number of nodes of the B&B tree, and the average run time in seconds. The results show the computational dominance, on the tested instances, of the single commodity flow formulation, which optimally solves 40 out of 54 instances of Scenario 1, while both the packing- and the penalization-based formulations certify the optimality of the identified solution for only half this number of instances. Despite this, focusing on the upper bound values, we may notice that only in three cases the packing formulation identifies a worse solution than the single commodity flow formulation (i.e., scenarios 5-250-0.3, 5-300-0.3, and 20-300-0.2, where the notation | L | - | V | -d indicates an instance with | L | labels, | V | nodes, and a network density equal to d) and the cost percentage gap with respect to the solution identified by the latter is always reduced (1.44%, 0.27%, and 0.23%, respectively). On the other hand, the penalization-based formulation records five positive cost percentage gap values (i.e., scenarios 5-250-0.3, 5-300-0.2, 5-300-0.3, 10-300-0.4, and 20-300-0.2), but the maximum gap value equals 0.29%.
Table 2 and Table 3 confirm these results as the imposed budget changes. In particular, on Scenario 2, the single commodity flow formulation identifies 43 out of 54 optimal solutions, while the packing formulation and the penalization-based ones were able to certify optimality only in 16 and 21 cases, respectively. For the first two groups of instances, all the formulations always provided at least an upper bound, while for | L | = 20 , there exist instances for which CPLEX reaches the imposed time limit without identifying any feasible solution. This occurs in four cases for the single commodity flow formulation, five cases for the penalization-based formulation, and only one case for the packing formulation, which is then the one finding the largest number of feasible solutions in this scenario. Focusing on the instances for which a feasible solution has been identified by all the formulations, the single commodity flow formulation always identifies the best quality solutions, except for one instance (20-100-0.3), where a better solution is identified by the packing formulation and the single commodity flow one exhibits a cost percentage gap of 0.54%. On Scenario 3, the three formulations solve 23, 19, and 43 out of 54 instances to optimality, respectively. Also in this case, the single commodity flow formulation fails to identify a feasible solution for nine instances, while the packing formulation and the penalization-based one provide only lower bounds in six and two cases, respectively. A small positive percentage gap of 0.16%, with respect to the best solution found by the three methods, is recorded for the single commodity flow formulation for only one instance (20-100-0.3).
As we observed, as the number of labels increases and the budget restriction is tighter, the formulations struggle to certify optimality and sometimes even to provide a feasible solution. The single commodity flow formulation generally dominates the other ones, both in terms of computational times and the number of optimally solved instances, although it fails more frequently to identify feasible solutions for | L | = 20 . In all the scenarios, when reaching the time limit, the solutions identified by the penalized-based formulation are associated with smaller cost percentage gap values with respect to the best than those found by the packing formulation, namely 0.04%, 1.14%, and 0.93% versus 0.02%, 0.94%, and 0.89% in scenarios 1, 2, and 3, respectively.
Restricting the analysis to the best-performing formulation, Figure 2 shows how the number of instances solved to optimality by CPLEX increases with respect to the available computational time. In order to assess also the impact of the number of nodes on the computational times, a curve is associated with each group of instances with different value of n { 50 , 150 , 200 , 250 , 300 } , each one including 27 instances. In particular, the x-axis reports the run time limit t (in seconds), while the y-axis reports the number of instances optimally solved within t seconds. As we may notice, the set of instances with n = 50 is the only one for which all the 27 instances are solved to optimality, and the most challenging instance in this set is solved in ∼100 s. As for the remaining classes, the number of instances solved within 100 s is 20, 16, 11, 2n and 3 for n = 150 , 200 , 250 , 300 , respectively. Overall, the number of instances solved to optimality within the imposed time limit of 1800 s decreases as the value of n increases. With this time limit, indeed, 27 instances with n = 50 , 24 instances with n = 100 , 18 instances with n = 150 , 18 instances with n = 200 , 14 instances with n = 250 , and 12 instances with n = 300 are solved to optimality.
Let us further investigate the impact of the number of labels on the computational times required by CPLEX to solve Formulation (14)–(21) by looking at the histograms shown in Figure 3. Figure 3a, Figure 3b, and Figure 3c report, for n equal to 200, 250, and 300, respectively, the average run times of CPLEX computed over the instances of each scenario with the same number of labels. As we may notice, considering more labels often results in a relevant increase in the computational times, it is particularly observable when moving from | L | = 10 to | L | = 20 . The only exception is n = 300 in Scenario 1, where more instances reach the time limit with | L | { 5 , 10 } , thus increasing the average computational times. Tighter budgets also have some impact on the run times, which is generally more detectable for | L | = 20 .
Finally, let us analyze how the costs of the solutions identified by Formulation (14)–(21) change with respect to the characteristics of the instances. To this aim, we produced three groups of charts, restricting the analysis only to the instances for which at least one feasible solution has been identified by CPLEX. Figure 4 reports costs for instances with five labels. Figure 4a, Figure 4b, and Figure 4c refer to instances with density values equal to 20 % , 30 % , and 40 % , respectively. For the first density class, the cost of the identified spanning tree ranges from 338 associated with n = 100 in Scenario 1 to 603 associated with n = 300 in Scenario 3. More in detail, costs in [ 338 , 470 ] were recorded in Scenario 1, costs in [ 386 , 508 ] were recorded in Scenario 2, while costs in [ 401 , 603 ] were recorded in Scenario 3, highlighting higher spanning tree costs associated with tighter budgets. The remaining two density classes exhibit the same trends, with costs ranging from 207 associated with n = 50 and Scenario 1 to 476 associated with n = 300 and Scenario 3, in the former case, and from 137 associated with n = 50 and Scenario 1 to 393 associated with n = 300 and Scenario 3, in the latter case. From these results, we can further observe a decrease in the spanning tree cost as the density of the network increases, motivated by the availability of a larger number of edges. The charts in Figure 5 and Figure 6 show similar and even more recognizable trends. For | L | = 10 , costs in [ 269 , 439 ] , [ 435 , 387 ] , and [ 573 , 762 ] are recorded for Scenarios 1, 2, and 3, respectively, when d = 0.2 ; costs in [ 214 , 372 ] , [ 224 , 405 ] , and [ 392 , 536 ] are recorded for Scenarios 1, 2, and 3, respectively, when d = 0.3 ; while costs in [ 192 , 340 ] , [ 208 , 345 ] , and [ 313 , 458 ] are recorded for Scenarios 1, 2, and 3, respectively, when d = 0.3 . From these charts, we see that the cost difference among the solutions provided for Scenarios 2 and 3 is larger for d = 0.3 than for d = 0.2 . Finally, for | L | = 20 , costs in [ 322 , 405 ] , [ 436 , 521 ] , and [ 785 , 972 ] are recorded for Scenarios 1, 2, and 3, respectively, when d = 0.2 ; costs in [ 200 , 268 ] , [ 360 , 422 ] , and [ 627 , 681 ] are recorded for Scenarios 1, 2, and 3, respectively, when d = 0.3 ; while costs in [ 192 , 214 ] , [ 259 , 289 ] , and [ 406 , 720 ] are recorded for Scenarios 1, 2, and 3, respectively, when d = 0.3 . As we may notice, the cost ranges associated with the three scenarios do not even overlap with each other, making the cost difference observed also for | L | { 5 , 10 } even more relevant.

8.2.2. Subgradient Algorithm

In our computational experiments, we set the parameters of the Subgradient Algorithm for BLMST as follows: α = 4 , controlling the rate of change in the Lagrangian multipliers; Δ = 50 , the iteration threshold for modifying the step size; Ω = 300 , specifying the maximum number of iterations; and ε = 0.05 , the convergence tolerance which serves as the algorithm’s stopping criterion based on proximity to the previous computed lower bound.
Table 4 reports the results obtained by the Subgradient algorithm for the BLMST problem on the same instances, described in Section 8.1, used to test the mathematical models. As for Table 1, Table 2 and Table 3, the first columns (|L|, n, and d) report the characteristics of the instances. The remaining columns are divided into the three previously described scenarios, reporting for each of them the following columns: LB, UB, Time, and UB time. LB and UB represent the lower and upper bounds computed by the algorithm, respectively. A match between the LB and UB indicates that the solution associated with the identified upper bound is optimal for that instance. Furthermore, when the upper bound value is associated with the solution obtained by running the greedy algorithm (Algorithm 1), (g) appears close to the UB value. Finally, the Time column denotes the total computational time required by the Subgradient algorithm, while UB time refers exclusively to the time taken to compute the upper bound.
In Scenario 1, associated with the least restrictive budget ( | V | / 2 ), the algorithm performed exceptionally well, finding optimal solutions in 52 out of 54 instances. This scenario also exhibited the smallest average computational time, indicating a lower complexity in solving these instances with respect to the ones of Scenarios 2 and 3, which require increasingly larger computational times. In particular, for | L | = 5 , the Subgradient algorithm required an average computational time of 0.28, 1.29, and 6.45 s to compute bounds for an instance of Scenarios 1, 2, and 3, respectively; for | L | = 10 , the same average computational times are 0.39, 16.37, and 40.85, while for | L | = 20 , they reach 0.60, 24.10, and 47.45 s. In general, a relevant increase in the run time is recorded as the imposed budget becomes tighter, while a gentler increase is observable when the number of labels increases. This trend is consistent with the increase in the average computational times required by the mathematical models to solve an instance, as observed in Section 8.2.1.
On the other side, the Subgradient algorithm did not identify any optimal solution among the instances of Scenarios 2 and 3, highlighting the increasing challenge posed by tighter budget constraints. However, it consistently provides robust lower bounds, demonstrating its efficacy in approximating solutions for the BLMST problem under varying conditions. As the budget constraint becomes tighter, the BLMST problem becomes more complex, affecting the effectiveness of the algorithm. The subgradient approach, despite these challenges, demonstrates a fast and effective method for finding upper and lower bounds, especially in scenarios with less restrictive budgets.

9. Conclusions

In this study, we introduced the BLMST problem, a new variant of the minimum spanning tree problem. We formally proved the NP-hardness of the BLMST problem and we generated a set of computational instances to evaluate its complexity and practical implications. We developed and compared three distinct mathematical programming formulations: a single commodity flow formulation, a packing formulation, and a penalization-based formulation. These models were tested under several scenarios, characterized by varying budget restrictions, network sizes, and the number of labels. Relevant trends in the performances of the three formulations have been analyzed via a computational test phase, carried out on 162 randomly created instances. The single commodity flow formulation emerged as generally superior in all the scenarios, consistently achieving optimal solutions with competitive computational times. Its performance, however, diminished as the number of labels increased ( | L | = 20 ), where it struggled to identify feasible solutions within the time limit. Furthermore, we introduced a Lagrangian approach based on a Subgradient algorithm to derive tighter lower bounds for the optimal solution of the problem, incorporating a greedy strategy to eventually derive upper bounds. Future research might focus on enhancing these formulations or developing hybrid approaches to improve solution quality and computational efficiency, particularly for high-label and tight-budget scenarios. The exploration of heuristic and metaheuristic methods could also provide valuable insights for solving large-scale instances of the BLMST problem.

Author Contributions

All authors contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data used in this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Graham, R.; Hell, P. On the History of the Minimum Spanning Tree Problem. Ann. Hist. Comput. 1985, 7, 43–57. [Google Scholar] [CrossRef]
  2. da Silva, T.G. The Minimum Labeling Spanning Tree and Related Problems. Ph.D. Thesis, Université d’Avignon, Universidade Federal do Estado do Rio de Janeiro, Rio de Janeiro, Brasil, 2018. [Google Scholar]
  3. Naji-Azimi, Z.; Salari, M.; Golden, B.; Raghavan, S.; Toth, P. Variable neighborhood search for the cost constrained minimum label spanning tree and label constrained minimum spanning tree problems. Comput. Oper. Res. 2010, 37, 1952–1964. [Google Scholar] [CrossRef]
  4. Cerrone, C.; D’Ambrosio, C.; Raiconi, A. Heuristics for the strong generalized minimum label spanning tree problem. Networks 2019, 74, 148–160. [Google Scholar] [CrossRef]
  5. Ismkhan, H. Effective three-phase evolutionary algorithm to handle the large-scale colorful traveling salesman problem. Expert Syst. Appl. 2017, 67, 148–162. [Google Scholar] [CrossRef]
  6. Jozefowiez, N.; Laporte, G.; Semet, F. A branch-and-cut algorithm for the minimum labeling Hamiltonian cycle problem and two variants. Comput. Oper. Res. 2011, 38, 1534–1542. [Google Scholar] [CrossRef]
  7. Monnot, J. The labeled perfect matching in bipartite graphs. Inf. Process. Lett. 2005, 96, 81–88. [Google Scholar] [CrossRef]
  8. Chang, R.S.; Shing-Jiuan, L. The minimum labeling spanning trees. Inf. Process. Lett. 1997, 63, 277–282. [Google Scholar] [CrossRef]
  9. Captivo, M.; Clímaco, J.C.; Pascoal, M.M. A mixed integer linear formulation for the minimum label spanning tree problem. Comput. Oper. Res. 2009, 36, 3082–3085. [Google Scholar] [CrossRef]
  10. Xiong, Y.; Golden, B.; Wasil, E. Worst-case behavior of the MVCA heuristic for the minimum labeling spanning tree problem. Oper. Res. Lett. 2005, 33, 77–80. [Google Scholar] [CrossRef]
  11. Consoli, S.; Darby-Dowman, K.; Mladenović, N.; Moreno Pérez, J. Greedy Randomized Adaptive Search and Variable Neighbourhood Search for the minimum labelling spanning tree problem. Eur. J. Oper. Res. 2009, 196, 440–449. [Google Scholar] [CrossRef]
  12. Cerrone, C.; Cerulli, R.; Gaudioso, M. OMEGA one multi ethnic genetic approach. Optim. Lett. 2016, 10, 309–324. [Google Scholar] [CrossRef]
  13. Consoli, S.; Moreno Pérez, J. Solving the minimum labelling spanning tree problem using hybrid local search. Electron. Notes Discret. Math. 2012, 39, 75–82. [Google Scholar] [CrossRef]
  14. Consoli, S.; Mladenović, N.; Moreno Pérez, J. Solving the minimum labelling spanning tree problem by intelligent optimization. Appl. Soft Comput. 2015, 28, 440–452. [Google Scholar] [CrossRef]
  15. Chen, Y.; Cornick, N.; Hall, A.O.; Shajpal, R.; Silberholz, J.; Yahav, I.; Golden, B.L. Comparison of Heuristics for Solving the Gmlst Problem. In Telecommunications Modeling, Policy, and Technology; Raghavan, S., Golden, B., Wasil, E., Eds.; Springer: Boston, MA, USA, 2008; pp. 191–217. [Google Scholar] [CrossRef]
  16. Silva, T.; Gueye, S.; Michelon, P.; Ochi, L.; Cabral, L. A polyhedral approach to the generalized minimum labeling spanning tree problem. EURO J. Comput. Optim. 2019, 7, 47–77. [Google Scholar] [CrossRef]
  17. Chwatal, A.M.; Raidl, G.R. Solving the Minimum Label Spanning Tree Problem by Mathematical Programming Techniques. Adv. Oper. Res. 2011, 2011, 143732. [Google Scholar] [CrossRef]
  18. Voßs, S.; Fink, A.; Duin, C. Looking ahead with the pilot method. Ann. Oper. Res. 2005, 136, 285–302. [Google Scholar] [CrossRef]
  19. Xiongm, Y.; Golden, B.; Wasil, E.; Chen, S. The Label-Constrained Minimum Spanning Tree Problem. In Telecommunications Modeling, Policy, and Technology; Raghavan, S., Golden, B., Wasil, E., Eds.; Springer: Boston, MA, USA, 2008; pp. 39–58. [Google Scholar] [CrossRef]
  20. Cerulli, R.; Fink, A.; Gentili, M.; Voss, S. Extensions of the minimum labelling spanning tree problem. J. Telecommun. Inf. Technol. 2006, 39–45. [Google Scholar]
  21. Darmann, A.; Pferschy, U.; Schauer, J. Determining a Minimum Spanning Tree with Disjunctive Constraints. In Proceedings of the International Conference on Algorithmic Decision Theory, Venice, Italy, 20–23 October 2009; Rossi, F., Tsoukias, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 414–423. [Google Scholar] [CrossRef]
  22. Darmann, A.; Pferschy, U.; Schauer, J.; Woeginger, G.J. Paths, trees and matchings under disjunctive constraints. Discret. Appl. Math. 2011, 159, 1726–1735. [Google Scholar] [CrossRef]
  23. Zhang, R.; Kabadi, S.N.; Punnen, A.P. The minimum spanning tree problem with conflict constraints and its variations. Discret. Optim. 2011, 8, 191–205. [Google Scholar] [CrossRef]
  24. Carrabs, F.; Cerrone, C.; Pentangelo, R. A multiethnic genetic approach for the minimum conflict weighted spanning tree problem. Networks 2019, 74, 134–147. [Google Scholar] [CrossRef]
  25. Samer, P.; Urrutia, S. A branch and cut algorithm for minimum spanning trees under conflict constraints. Optim. Lett. 2015, 9, 41–55. [Google Scholar] [CrossRef]
  26. Carrabs, F.; Cerulli, R.; Pentangelo, R.; Raiconi, A. Minimum spanning tree with conflicting edge pairs: A branch-and-cut approach. Ann. Oper. Res. 2021, 298, 65–78. [Google Scholar] [CrossRef]
  27. Carrabs, F.; Gaudioso, M. A Lagrangian approach for the minimum spanning tree problem with conflicting edge pairs. Networks 2021, 78, 32–45. [Google Scholar] [CrossRef]
  28. Garey, M.; Johnson, D. Computers and Intractability: A Guide to the Theory of NP-Completeness; W. H. Freeman and Co.: San Francisco, CA, USA, 1979; p. 206. [Google Scholar]
  29. Dantzig, G.; Fulkerson, R.; Johnson, S. Solution of a Large-Scale Traveling-Salesman Problem. J. Oper. Res. Soc. Am. 1954, 2, 393–410. [Google Scholar] [CrossRef]
  30. Pemmaraju, S.; Skiena, S. Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  31. Carrabs, F.; Cerulli, R.; Gaudioso, M.; Gentili, M. Lower and upper bounds for the spanning tree with minimum branch vertices. Comput. Optim. Appl. 2013, 56, 405–438. [Google Scholar] [CrossRef]
  32. Gaudioso, M. A View of Lagrangian Relaxation and Its Applications. In Numerical Nonsmooth Optimization: State of the Art Algorithms; Bagirov, A.M., Gaudioso, M., Karmitsa, N., Mäkelä, M.M., Taheri, S., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 579–617. [Google Scholar] [CrossRef]
  33. Urruty, J.B.H.; Lemaréchal, C. Convex Analysis and Minimization Algorithms; Springer: Berlin/Heidelberg, Germany, 1993. [Google Scholar]
Figure 1. Example illustrating the reduction from a DCMST problem instance to a BLMST problem, with a maximum degree constraint of k = 2 . (a) Graph associated with an instance of the DCMST problem where w e = 1 e E and k = 2 . (b) Assignment of labels a , b , c , d and e to nodes 1 , 2 , 3 , 4 and 5, respectively, according to the first step of the described polynomial reduction. (c) Assignment of a label set containing the labels of both its endpoints to each edge of the graph shown in (b). The budget for each label in the BLMST problem instance is set as equal to k. (d) Optimal spanning tree for both the BLMST graph shown in (c) and the DCMST graph shown in (b).
Figure 1. Example illustrating the reduction from a DCMST problem instance to a BLMST problem, with a maximum degree constraint of k = 2 . (a) Graph associated with an instance of the DCMST problem where w e = 1 e E and k = 2 . (b) Assignment of labels a , b , c , d and e to nodes 1 , 2 , 3 , 4 and 5, respectively, according to the first step of the described polynomial reduction. (c) Assignment of a label set containing the labels of both its endpoints to each edge of the graph shown in (b). The budget for each label in the BLMST problem instance is set as equal to k. (d) Optimal spanning tree for both the BLMST graph shown in (c) and the DCMST graph shown in (b).
Mathematics 12 00230 g001
Figure 2. Number of instances solved to optimality via the single commodity flow formulation with respect to the available computational time and the number of nodes.
Figure 2. Number of instances solved to optimality via the single commodity flow formulation with respect to the available computational time and the number of nodes.
Mathematics 12 00230 g002
Figure 3. Average computational times of the single commodity formulation on the instances with 200, 250, and 300 nodes w.r.t. different number of labels and different budget values. More specifically, (a) n = 200 . (b) n = 250 . (c) n = 300 .
Figure 3. Average computational times of the single commodity formulation on the instances with 200, 250, and 300 nodes w.r.t. different number of labels and different budget values. More specifically, (a) n = 200 . (b) n = 250 . (c) n = 300 .
Mathematics 12 00230 g003
Figure 4. Impact of the available budget (scenarios 1, 2, and 3) on the cost of the spanning tree identified by Formulation (14)–(21) on networks with five different labels. Specifically, (a) | L | = 5 ; d = 0.2 . (b) | L | = 5 ; d = 0.3 . (c) | L | = 5 ; d = 0.4 .
Figure 4. Impact of the available budget (scenarios 1, 2, and 3) on the cost of the spanning tree identified by Formulation (14)–(21) on networks with five different labels. Specifically, (a) | L | = 5 ; d = 0.2 . (b) | L | = 5 ; d = 0.3 . (c) | L | = 5 ; d = 0.4 .
Mathematics 12 00230 g004
Figure 5. Impact of the available budget (scenarios 1, 2, and 3) on the cost of the spanning tree identified by Formulation (14)–(21) on networks with 10 different labels. Specifically, (a) | L | = 10 ; d = 0.2 . (b) | L | = 10 ; d = 0.3 . (c) | L | = 10 ; d = 0.4 .
Figure 5. Impact of the available budget (scenarios 1, 2, and 3) on the cost of the spanning tree identified by Formulation (14)–(21) on networks with 10 different labels. Specifically, (a) | L | = 10 ; d = 0.2 . (b) | L | = 10 ; d = 0.3 . (c) | L | = 10 ; d = 0.4 .
Mathematics 12 00230 g005
Figure 6. Impact of the available budget (scenarios 1, 2, and 3) on the cost of the spanning tree identified by Formulation (14)–(21) on networks with 20 different labels. Specifically, (a) | L | = 20 ; d = 0.2 . (b) | L | = 20 ; d = 0.3 . (c) | L | = 20 ; d = 0.4 .
Figure 6. Impact of the available budget (scenarios 1, 2, and 3) on the cost of the spanning tree identified by Formulation (14)–(21) on networks with 20 different labels. Specifically, (a) | L | = 20 ; d = 0.2 . (b) | L | = 20 ; d = 0.3 . (c) | L | = 20 ; d = 0.4 .
Mathematics 12 00230 g006
Table 1. Comparison of the three mathematical formulations on the set of instances with budget fixed to | V | / 2 (Scenario 1), in terms of optimal solutions, computational time, and nodes of the B&B tree.
Table 1. Comparison of the three mathematical formulations on the set of instances with budget fixed to | V | / 2 (Scenario 1), in terms of optimal solutions, computational time, and nodes of the B&B tree.
Packing FormulationPenalization-Based FormulationSingle-Commodity Flow Formulation
LndObjNodesTimeObjNodesTimeObjNodesTime
5500.238467821.6638468682.0138400.11
0.320730.1820730.192075480.12
0.413730.1713730.171372200.08
1000.2338170,42450.84338143,69343.9233816,3922.84
0.324750443.2024746243.6324718,1414.69
0.422345,06824.33223136,48679.59223196,43536.04
1500.2372(u)966,6521802.89372(u)1,193,2421800.893721,092,87243.13
0.327894968.7127821,91317.0027812440.74
0.4218(u)879,0931803.81218(u)933,3061804.572183,797,3261531.55
2000.2398(u)963,6891804.88398(u)1,057,3251804.2639848203.12
0.3283(u)1,219,4471800.80283(u)1,276,5331800.75283678,95863.50
0.4241(u)792,3791800.97241(u)910,4891800.82241107413.16
2500.2445(u)735,1261802.51445(u)546,4381803.44445498029.21
0.3353(u)331,2151803.87349(u)220,7561805.90348802,163364.94
0.4307(u)424,0951801.18307(u)355,6131802.863072,434,9291084.20
3000.2470(u)541,0771803.19471(u)443,6031803.94470(u)1,293,5011801.22
0.3365(u)155,2071806.46365(u)197,3611805.92364(u)221,6651800.01
0.4331(u)312,9171801.73331(u)310,4211801.4633127835.45
Avg310.94419,873.171106.74310.61431,037.611110.07310.61587,113.94376.89
#Opt7 7 16
10500.2269410.22269420.20269880.06
0.3214460.202141240.30214660.05
0.419900.1319900.0619900.08
1000.23682841.133685181.3236818380.59
0.323318,7498.8423312,5046.7523322941.96
0.41921540.961921080.991921,983,767155.06
1500.2368(u)708,3601804.84368(u)744,1561805.48368(u)2,981,5551800.00
0.3278(u)1,013,9421801.29278(u)1,946,6791801.66278240.67
0.4239(u)1,149,9431802.87239(u)1,056,9621803.4923922461.33
2000.2413(u)2,079,4341800.00413(u)2,093,6931800.01413674,995104.59
0.3333(u)388,0221805.55333(u)831,0621803.8033321341.77
0.4271(u)240,9341806.18271(u)346,3071805.582711,099,752388.40
2500.2434(u)314,7891805.58434(u)432,3821805.70434(u)5,105,6881800.01
0.3368(u)363,9411804.82368(u)346,8841806.18368(u)1,627,2381801.54
0.4301(u)400,7551802.14301(u)431,3071801.483017071107.48
3000.2439(u)902,8841801.19439(u)347,9961803.33439(u)728,6771800.62
0.3372(u)370,7041802.33372(u)324,5791801.83372(u)565,1641800.88
0.4340(u)307,2861801.38341(u)283,7201802.40340134.51
Avg312.83458,903.781202.76312.89511,056.831202.81312.83821,256.11542.76
#Opt6 6 13
20500.232220980.7132223160.9532232690.27
0.320041311.0820031150.812005410.13
0.4145600.24145740.241458830.34
1000.232714011.7132713051.7732742,2808.21
0.3219(u)952,5551803.03219(u)845,9531802.6321915632.02
0.4192(u)2,739,2621800.00192(u)3,288,2121800.0019260.30
1500.24051,762,8511075.324052,079,5911365.4840500.62
0.32681,260,067923.222681,295,691943.48268(u)15,031,4331800.01
0.4214(u)1,257,3181801.46214(u)998,0771804.00214(u)6,895,4921800.01
2000.2411(u)1,314,0701803.33411(u)960,9921803.75411(u)1,913,6361800.01
0.3302(u)1,101,4461801.22302(u)977,9881801.71302(u)1,341,9871801.07
0.4266(u)642,7591802.37266(u)656,1491802.8026612,79757.58
2500.2408(u)713,3361803.55408(u)627,6211804.91408(u)805,3481801.46
0.33334207.88333190212.52333(u)374,9601801.52
0.4286(u)467,1691801.14286(u)457,6071801.2728610,16283.79
3000.2442(u)310,2571802.56442(u)279,8231803.88441(u)481,3751800.85
0.3351(u)344,4671801.79351(u)385,7891801.3035154,33329.49
0.4321(u)280,7101802.75321(u)277,6631803.1932122,376294.25
Avg300.67730,798.721212.97300.67729,992.671230.82300.611,499,580.06726.77
#Opt7 7 11
Table 2. Comparison of the three mathematical formulations on the set of instances with budget fixed to | V | / 3 (Scenario 2), in terms of optimal solutions, computational time, and nodes of the B&B tree.
Table 2. Comparison of the three mathematical formulations on the set of instances with budget fixed to | V | / 3 (Scenario 2), in terms of optimal solutions, computational time, and nodes of the B&B tree.
Packing FormulationPenalization-Based FormulationSingle-Commodity Flow Formulation
LndObjNodesTimeObjNodesTimeObjNodesTime
5500.23863860.313864200.3938614380.25
0.32802840.252802180.2728029690.51
0.419983561.8619919,9794.211991840.18
1000.2403(u)1,542,3991800.47403(u)1,836,4461800.0240245432.18
0.3300617,286285.06300612,969324.2730090498.58
0.42092241.012091071.042097871.96
1500.2439(u)1,332,8801801.59439(u)1,574,3311800.9543845,53924.32
0.3299(u)2,003,7331800.98299(u)1,926,2421800.01299(u)3,791,7441800.01
0.4249(u)822,0901802.28249(u)915,0491801.69249396617.59
2000.2444(u)892,4031801.70444(u)859,6231801.5244223,86444.95
0.3344(u)425,3591803.16341(u)638,4211801.35339723,895563.11
0.4275(u)621,4661801.22271(u)619,9231800.90269302,171275.51
2500.2476(u)564,2031802.37476(u)433,5771802.12473397,170185.26
0.3346(u)585,8411800.88343(u)554,1151801.4834317,252112.88
0.4305(u)366,9371801.10305(u)408,7211800.8730312,448249.95
3000.2512(u)430,7041802.51513(u)479,7031801.3650811,792149.76
0.3387(u)411,3331801.03383(u)449,8271800.72381685,217534.54
0.4347(u)230,8841801.53342(u)252,9501801.573426387186.97
Avg344.44603,153.781317.18310.61643,478.941319.15342.33335,578.61231.03
#Opt5 5 17
10500.244314520.4044321020.5544314350.28
0.3224150.21224130.272243810.14
0.421419480.7121427420.7421484022.00
1000.244439,28016.1344450,05115.2744463642.17
0.328721,8868.8428711,4095.9928733,22914.82
0.4208103,00661.86208294,845204.5920827374.15
1500.2487(u)660,2322158.41484(u)791,2912126.6247631,72633.58
0.3339(u)931,6301800.99334(u)1,401,3481800.8833237496.83
0.4238(u)699,3231801.22238(u)623,1221801.58233517642.35
2000.2438(u)1,129,0621801.014351,056,2141384.73435182,707106.78
0.3326(u)806,0111800.68323(u)817,2001800.87322920772.55
0.4276(u)662,8001800.71276(u)661,0451800.7927442,928450.91
2500.2477(u)566,2401801.37479(u)388,2711801.30471(u)245,4381800.01
0.3386(u)570,4961800.55392(u)416,9651801.2238397,664102.45
0.4308(u)408,7401800.76311(u)352,9421801.15304251,202483.13
3000.2492(u)477,2261800.96491(u)397,1721801.3748795,139257.33
0.3410(u)346,9011800.80413(u)315,9591800.0240542,303266.19
0.4355(u)244,2171800.94349(u)274,3251800.6434515,707590.32
Avg352.89426,136.941225.36352.50436,500.891208.26349.2859,749.67235.33
#Opt6 7 17
20500.252147450.7252153330.8552189611.87
0.3422193,35330.83422135,23921.36422235,32887.73
0.428933,5206.5828939,7377.4828929851.56
1000.2450(u)1,482,1491800.56452(u)1,735,2181800.31436(u)1,806,5971800.03
0.3370(u)2,053,7941800.66375(u)1,586,9471800.83372(u)1,140,0361800.93
0.4259175,896109.85259322,529182.4825939,80523.34
1500.2473(u)1,274,2201800.95468(u)1,411,3551800.67465(u)562,8411800.52
0.3374(u)718,9631801.45374(u)872,9291801.20360509,112519.49
0.4293(u)947,1471800.68291(u)1,111,3441800.64286(u)283,4931800.01
2000.2547(u)269,5331801.91534(u)360,0402082.81516(u)223,0981800.00
0.3428(u)390,8882090.58443(u)332,3522070.14411(u)129,0861800.32
0.4331(u)393,9271800.96322(u)568,0581800.58316(u)132,8201800.01
2500.2639(u)218,8421801.61563(l)218,5501801.24583(u)82,5901800.57
0.3435(u)284,7701801.05425(u)343,1361800.85406(l)54,5691800.23
0.4357(u)303,9471800.88343(l)194,9421801.34342(l)54,3601800.01
3000.2550(u)258,3261800.97519(l)179,2321801.44528(u)108,3511800.01
0.3453(l)167,7261800.85454(l)168,1031801.02455(l)49,5371800.01
0.4360(u)159,8181800.77333(l)150,8251800.76335(l)32,6571800.02
Avg396.42661,511.251237.14395.83706,756.751264.11387.75422,846.831102.99
#Opt5 9 9
Table 3. Comparison of the three mathematical formulations on the set of instances with budget fixed to | V | / 4 (Scenario 3), in terms of optimal solutions, computational time, and nodes of the B&B tree.
Table 3. Comparison of the three mathematical formulations on the set of instances with budget fixed to | V | / 4 (Scenario 3), in terms of optimal solutions, computational time, and nodes of the B&B tree.
Packing FormulationPenalization-Based FormulationSingle-Commodity Flow Formulation
LndObjNodesTimeObjNodesTimeObjNodesTime
5500.245400.1145400.0645400.05
0.326100.1226150.062614480.20
0.425000.0625000.0625000.07
1000.2401191,50181.85401248,15498.9940116961.25
0.333329572.4933363574.8133320522.53
0.4245(u)2,059,4141800.00245(u)1,823,2941800.9124527904.16
1500.2509(u)1,360,5261801.92507(u)1,487,6661801.2350546536.52
0.3342980,506929.03343(u)1,667,1071800.89342325311.80
0.4286(u)1,092,2731801.61286(u)1,250,0471801.08286345016.74
2000.2460305,216377.34460430,473429.30460609720.92
0.3365(u)826,1991801.41363426,213824.94363545034.37
0.4307(u)604,1301801.78311(u)493,2451801.52307139718.61
2500.2577(u)476,5991802.55584(u)398,5201801.7857081,652112.37
0.3398(u)555,8921801.04398(u)534,6051800.913982,591,9891343.45
0.4347(u)254,4531801.33346(u)311,3671800.0234216,484236.83
3000.2611(u)4,32,5141801.81608(u)511,2741801.2660388,904132.43
0.3483(u)336,8111801.17479(u)365,2491800.95476(u)536,1361800.02
0.4399(u)186,2161802.00399(u)268,2551800.8039316,441566.36
Avg390.44536,955.941178.20310.61567,879.501176.09388.28186,827.33239.37
#Opt7 7 17
10500.257713030.435778170.315776090.20
0.339264871.4039258721.6839231161.16
0.431346,14111.2731323,7745.4831313010.71
1000.2573110,88346.8557367,71922.665732,023,5501231.06
0.342526,83314.1542574,06537.54425186,27177.61
0.432181,18450.57321572,480307.1232175149.04
1500.2681(u)964,7971801.54680(u)1,444,1851800.9167815,43548.90
0.3433645,2051051.72434(u)981,2981800.34433419121.59
0.4328(u)1,191,2071800.01327998,3931336.1732711,14117.15
2000.2642(u)700,3861801.99641(u)570,7781801.61629(u)209,6091800.03
0.3506(u)346,8001801.86501(u)463,1951801.2749316,15142.15
0.4420(u)523,7151800.87419(u)585,6611801.0841578,226196.53
2500.2778(u)575,0431801.35770(u)595,3811801.27762(u)187,7311800.01
0.3549(u)456,5301800.68546(u)435,8761800.63536296,875414.84
0.4473(u)235,1671801.54467(u)221,1011801.26458(u)318,7391800.04
3000.2753(u)214,3941801.70756(u)188,9031801.91728(u)115,9371800.41
0.3524(u)297,7101800.74519(u)351,1961800.93514(u)163,1621800.02
0.4473(u)109,7611801.58464(u)215,8951801.14456(u)294,1661800.01
Avg508.94362,974.781166.13506.94433,143.831195.74501.67218,540.22714.53
#Opt7 7 12
20500.2785378,69462.50785356,54356.2978568,05019.92
0.363324,1103.5263311,9972.0963331241.66
0.4406125,52026.9240635,5639.8540645592.68
1000.2814(u)2,349,7531800.00802(u)1,515,3581800.007941,505,3841319.16
0.3636(u)1,733,3291801.05626(u)1,565,3791801.35627(u)757,1301800.63
0.4451(u)1,262,7171800.87457(u)1,447,2321800.744432,064,088918.08
1500.2977(u)479,1991801.681033(u)546,6631801.87972(u)628,4081800.01
0.3702(u)390,7431801.29701(u)469,8991801.69681(u)110,8161800.01
0.4723(u)613,4821801.02733(u)598,6191801.23720(u)138,2181800.01
2000.21053(l)234,7901801.721053(l)249,2111801.121054(l)135,9331800.01
0.3813(u)340,7021801.76823(u)418,9771801.04754(l)72,4201800.01
0.4543(l)210,3071801.73631(u)322,8441801.55545(l)65,8681800.01
2500.21063(l)206,2091833.141300(u)355,7891802.191071(l)79,4021800.01
0.3804(u)203,5291801.10978(u)207,4121801.59729(l)65,2111800.03
0.4656(l)187,7871801.20810(u)250,0001801.32658(l)40,5271800.03
3000.21316(u)205,3891801.071242(u)265,2801801.101121(l)60,9511800.01
0.3792(l)169,9731801.19979(u)233,2431801.26793(l)32,9741800.03
0.4635(l)150,2741800.60636(l)158,0531800.82640(l)27,8991800.02
Avg680.78817,505.221210.98686.22727,472.561208.35673.44586,641.891051.35
#Opt9 5 14
Table 4. Upper and lower bounds obtained by running the subgradient algorithm for BLMST (Algorithm 2) on the instances of Scenario 1 (budget fixed to | V | / 2 ), Scenario 2 (budget fixed to | V | / 3 ), and Scenario 3 (budget fixed to | V | / 4 ).
Table 4. Upper and lower bounds obtained by running the subgradient algorithm for BLMST (Algorithm 2) on the instances of Scenario 1 (budget fixed to | V | / 2 ), Scenario 2 (budget fixed to | V | / 3 ), and Scenario 3 (budget fixed to | V | / 4 ).
Scenario 1Scenario 2Scenario 3
LndLBUBTimeUB TimeLBUBTimeUB TimeLBUBTimeUB Time
5500.2384.00384(g)0.0070.001380.0021440.0070.001408.0022480.0940
0.3207.00207(g)0.0060.001264.9822270.0660.001245.2622880.0760.001
0.4137.00137(g)0.0070.002189.03359(g)0.3200.002235.5923180.0990.001
1000.2338.00338(g)0.0240.005394.4846780.4870.001396.9746530.5230.001
0.3247.00247(g)0.0350.007285.02402(g)0.0720.009329.0048211.2010.002
0.4223.00223(g)0.0460.009202.01270(g)0.0740.01239.9548491.3430.002
1500.2372.00372(g)0.0730.015433.0871722.7240.003421.16922(g)7.8060.017
0.3278.00278(g)0.1290.021281.01402(g)0.1710.023333.4973046.0070.004
0.4218.00218(g)0.1420.028241.01386(g)0.2310.032228.90520(g)5.1430.032
2000.2398.00398(g)0.1850.033421.02616(g)0.2720.051458.48975414.5730.004
0.3283.00283(g)0.2470.049320.03664(g)0.3920.055297.61776(g)8.8930.059
0.4241.00241(g)0.3650.064263.01442(g)0.5570.073250.10563(g)0.7600.073
2500.2445.00445(g)0.3170.064471.5012,27312.4350.007566.0312,25326.3110.007
0.3348.00348(g)0.4900.094337.00463(g)0.7470.111342.10785(g)1.1030.108
0.4307.00307(g)0.6060.124303.00392(g)0.9910.132296.04636(g)0.9550.171
3000.2470.00470(g)0.5500.108490.01877(g)0.8620.118459.541341(g)37.750.123
0.3364.00364(g)0.8140.157369.00597(g)1.2610.169401.121082(g)1.7960.183
0.4331.00331(g)1.0620.223342.00422(g)1.6300.222349.03793(g)1.6360.236
Avg310.61310.610.280.06332.621932.561.290.06347.693217.006.450.06
#Opt18 0 0
10500.2269.00269(g)0.0050.002405.9922180.0750.001521.7522050.2010.001
0.3214.00214(g)0.0080.002205.4622770.0770.001356.9722610.3470.001
0.4199.00199(g)0.0090.002192.0023090.1250.001282.9722940.3370.001
1000.2368.00368(g)0.0330.009416.6647071.2440.001557.0447302.0870.001
0.3233.00233(g)0.0460.013273.7447701.0610.002401.1548124.9390.002
0.4192.00192(g)0.0620.017195.9548470.8280.002292.9948654.9010.002
1500.2368.00368(g)0.1000.028465.9971706.6180.003606.24722412.9960.003
0.3278.00278(g)0.1470.039326.0473197.9590.004401.01729215.1610.004
0.4239.00239(g)0.1950.054227.6673685.1750.005304.84734815.9400.005
2000.2413.00413(g)0.2310.063427.48968710.3460.004555.81975329.7260.004
0.3333.00333(g)0.3360.092315.76982214.8010.006448.56985334.5840.006
0.4271.00271(g)0.4780.124268.53990519.8980.008349.81988646.9160.008
2500.2434.00434(g)0.4410.122458.9612,25932.8500.007642.1112,26453.9220.007
0.3368.00368(g)0.6750.182374.2612,34938.7260.010463.2712,36485.0590.010
0.4301.00301(g)0.8600.242291.9412,40221.4030.013377.7812,40381.2800.013
3000.2439.00439(g)0.7550.21471.0414,79239.7800.010583.2014,81191.5190.010
0.3372.00372(g)1.1180.307390.8014,86656.1370.015449.0814,892111.5690.029
0.4340.00340(g)1.5440.416332.1014,91637.6020.037393.6414,919143.8040.021
Avg312.83312.830.390.11335.578554.6116.370.01443.798565.3340.850.01
#Opt18 0 0
20500.2322.00322(g)0.0080.003412.0321670.2380.001685.0421240.6230.001
0.3200.00200(g)0.0110.004335.3622940.3940.001508.9022540.8570.001
0.4145.00145(g)0.0140.005205.9523320.2240.001343.1723521.1350.001
1000.2327.00332(g)0.0760.017369.2746791.8350.001632.3347164.3690.001
0.3219.00219(g)0.0700.024339.0948043.8750.016435.2147896.3400.002
0.4192.00194(g)0.1230.031223.8848513.7320.002333.0448678.5950.002
1500.2405.00405(g)0.1480.051426.9272188.1400.003606.58717615.1540.003
0.3268.00268(g)0.2240.078325.41732311.3630.004440.81734319.3610.004
0.4214.00214(g)0.3010.104261.55736710.7630.005405.78734225.1130.005
2000.2411.00411(g)0.3540.124483.75975321.0340.005610.67978629.2320.005
0.3302.00302(g)0.5240.184360.53982534.6850.007461.50985243.7150.006
0.4266.00266(g)0.7050.245281.10988036.0010.008357.64989359.7990.009
2500.2408.00408(g)0.6700.241491.4612,23044.0240.007615.9312,27464.5760.007
0.3333.00333(g)1.0390.353368.0812,36151.5270.010440.0112,34986.2060.010
0.4286.00286(g)1.3260.471311.0912,39962.2370.029381.9812,408105.3040.013
3000.2441.00441(g)1.1630.409490.1714,78356.5970.010625.8314,78097.1310.010
0.3351.00351(g)1.7210.612402.4714,89084.9270.015478.8414,871141.4320.029
0.4321.00321(g)2.2910.826321.1314,9132.2030.038389.7014,920145.1530.037
Avg300.61301.000.600.21356.078559.3924.100.01486.288560.8947.450.01
#Opt16 0 0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cerulli, R.; D'Ambrosio, C.; Serra, D.; Sorgente, C. The Budgeted Labeled Minimum Spanning Tree Problem. Mathematics 2024, 12, 230. https://doi.org/10.3390/math12020230

AMA Style

Cerulli R, D'Ambrosio C, Serra D, Sorgente C. The Budgeted Labeled Minimum Spanning Tree Problem. Mathematics. 2024; 12(2):230. https://doi.org/10.3390/math12020230

Chicago/Turabian Style

Cerulli, Raffaele, Ciriaco D'Ambrosio, Domenico Serra, and Carmine Sorgente. 2024. "The Budgeted Labeled Minimum Spanning Tree Problem" Mathematics 12, no. 2: 230. https://doi.org/10.3390/math12020230

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop