ON THE USE OF THE TABLE METHOD IN CONSTRAINED OPTIMIZATION

被引:2
|
作者
KALABA, R
TISHLER, A
机构
关键词
D O I
10.1007/BF00936161
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
引用
收藏
页码:157 / 165
页数:9
相关论文
共 50 条
  • [11] METHOD OF CONSTRAINED GLOBAL OPTIMIZATION - COMMENT
    ERBER, T
    HOCKNEY, GM
    [J]. PHYSICAL REVIEW LETTERS, 1995, 74 (08) : 1482 - 1482
  • [12] Constrained optimization of the randomized iterative method
    Bulgakova, T. E.
    Voytishek, A. V.
    [J]. COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2009, 49 (07) : 1093 - 1102
  • [13] A Constrained Optimization Method for Community Detection
    Wang, Ji-Guang
    Wang, Lin
    Qiu, Yu-Qing
    Wang, Yong
    Zhang, Xiang-Sun
    [J]. OPTIMIZATION AND SYSTEMS BIOLOGY, 2009, 11 : 142 - 150
  • [14] A deterministic method for constrained multicriteria optimization
    Evtushenko, Yuri
    Posypkin, Mikhail
    [J]. 2015 6TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION, AND APPLIED OPTIMIZATION (ICMSAO), 2015,
  • [15] A New Repair Method For Constrained Optimization
    Koch, Patrick
    Bagheri, Samineh
    Konen, Wolfgang
    Foussette, Christophe
    Krause, Peter
    Back, Thomas
    [J]. GECCO'15: PROCEEDINGS OF THE 2015 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2015, : 273 - 280
  • [16] A convergence of ODE method in constrained optimization
    Zhou, ZF
    Yong, S
    [J]. JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS, 1998, 218 (01) : 297 - 307
  • [17] EXPERIMENTS ON CONSTRAINED OPTIMIZATION WITH SPENCERS METHOD
    RAYCES, JL
    LEBICH, L
    [J]. OPTICAL ENGINEERING, 1988, 27 (12) : 1031 - 1034
  • [18] A NEW METHOD FOR EQUALITY CONSTRAINED OPTIMIZATION
    JIA, LX
    [J]. JOURNAL OF COMPUTATIONAL MATHEMATICS, 1990, 8 (03) : 195 - 201
  • [19] A SQP method for inequality constrained optimization
    Zhang J.-L.
    Zhang X.-S.
    [J]. Acta Mathematicae Applicatae Sinica, 2002, 18 (1) : 77 - 84
  • [20] A COMPROMISE METHOD IN CONSTRAINED OPTIMIZATION PROBLEMS
    Voronin, A. N.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2013, 49 (01) : 77 - 80