2017
DOI: 10.1007/978-3-319-51741-4_2
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Traveling Repair Problem with an Arbitrary Time Window

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…e 1 2, 4, 9 4, 10, 13 e 2 Figure 3: Edges e 1 and e 2 share label 4. If we consider task T 1 associated with e 1 to have possible scheduling intervals (2,4) and (4,9), and task T 2 associated with e 2 to have possible scheduling intervals (4, 10) and (10,13), then a feasible schedule would execute T 1 during (2, 4) and T 2 during (4, 10). However, this does not correspond to an exploration of the edges e 1 and e 2 , since exiting e 1 with label 4 would disallow entry to e 2 with the same label (due to our definition of journeys)!…”
Section: Withinmentioning
confidence: 99%
See 1 more Smart Citation
“…e 1 2, 4, 9 4, 10, 13 e 2 Figure 3: Edges e 1 and e 2 share label 4. If we consider task T 1 associated with e 1 to have possible scheduling intervals (2,4) and (4,9), and task T 2 associated with e 2 to have possible scheduling intervals (4, 10) and (10,13), then a feasible schedule would execute T 1 during (2, 4) and T 2 during (4, 10). However, this does not correspond to an exploration of the edges e 1 and e 2 , since exiting e 1 with label 4 would disallow entry to e 2 with the same label (due to our definition of journeys)!…”
Section: Withinmentioning
confidence: 99%
“…For the Asymmetric TSP where paths may not exist in both directions or the distances might be different depending on the direction, the O(log n)-approximation of [20] was the best known for almost three decades, improved only recently to O(log n/ log log n) [7]. Online TSP-related problems as well as versions of TSP where each node must be visited within a given time window, have also been recently studied [9,34].…”
Section: Introductionmentioning
confidence: 99%
“…Online algorithms where requests can be served within some time-window (or more generally, with delay penalties) have recently been given for matching [EKW16, AAC + 17, ACK17], TSP [AV16], set cover [ACKT20], multi-level aggregation [BBB + 16, BFNT17, AT19], 1-server [AGGP17, AT19], network design [AT20], etc. The work closest to ours is that of [AGGP17] who show O(k log 3 n)competitiveness for k-Server with general delay functions, and leave open the problem of getting polylogarithmic competitiveness.…”
Section: Related Workmentioning
confidence: 99%
“…With the assumption that the arrival process of the intruders is stochastic, [21], [22], [23] consider the perimeter defense problem as a vehicle routing problem and provide insights into the average case analysis of such problems. An important distinction between the online setup of this work from [24] is that the time taken by the intruders to reach the perimeter is fixed and not the part of the input.…”
Section: Introductionmentioning
confidence: 99%