1969
DOI: 10.1137/0117061
|View full text |Cite
|
Sign up to set email alerts
|

L-Shaped Linear Programs with Applications to Optimal Control and Stochastic Programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
434
0
1

Year Published

1996
1996
2014
2014

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 1,017 publications
(449 citation statements)
references
References 20 publications
0
434
0
1
Order By: Relevance
“…We will solve problem SEF using the L-shaped method with integer first-stage variables (Van Slyke andWets (1969), Wollmer (1980)). The L-shaped method is an iterative procedure closely related to Benders' decomposition (1962) that divides the extensive form given by (2) into |Ξ| + 1 problems: a first-stage master program, and one second-stage subproblem for each scenario.…”
Section: An L-shaped Approachmentioning
confidence: 99%
“…We will solve problem SEF using the L-shaped method with integer first-stage variables (Van Slyke andWets (1969), Wollmer (1980)). The L-shaped method is an iterative procedure closely related to Benders' decomposition (1962) that divides the extensive form given by (2) into |Ξ| + 1 problems: a first-stage master program, and one second-stage subproblem for each scenario.…”
Section: An L-shaped Approachmentioning
confidence: 99%
“…When the stochastic uncertainty follows a discrete distribution with a small number of scenarios, the problem can be rewritten deterministically and solved using the simplex or interior point methods. A common approach for this is Benders' algorithm (see Benders 1962, Van Slyke andWets 1969), which uses a planecutting technique also known as the L-shaped method. With a discrete source of uncertainty, this has the advantage of scalability.…”
Section: Simulation-based Stochastic Programmingmentioning
confidence: 99%
“…In [11] it was shown how to modify a Nested Benders Decomposition [1,12,14] of problem (1.11) to exploit the recombining property (1.13) of the process ξ.…”
Section: Solution Algorithmmentioning
confidence: 99%