Proceedings of the Princeton Symposium on Mathematical Programming
-
Harold W. Kuhn
About this book
This volume contains thirty-three selected general research papers devoted to the theory and application of the mathematics of constrained optimization, including linear programming and its extensions to convex programming, general nonlinear programming, integer programming, and programming under uncertainty.
Originally published in 1971.
The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Topics
Publicly Available Download PDF |
i |
Requires Authentication Unlicensed Licensed Download PDF |
iii |
Requires Authentication Unlicensed Licensed Download PDF |
iv |
PART I. LARGE SCALE SYSTEMS
|
|
J. Abadie and M. Sakarovitch Requires Authentication Unlicensed Licensed Download PDF |
1 |
E. M. L. Beale Requires Authentication Unlicensed Licensed Download PDF |
25 |
R. H. Cobb and J. Cord Requires Authentication Unlicensed Licensed Download PDF |
37 |
G. B. Dantzig Requires Authentication Unlicensed Licensed Download PDF |
51 |
PART II. PROGRAMMING UNDER UNCERTAINTY
|
|
M. Avriel and D. J. Wilde Requires Authentication Unlicensed Licensed Download PDF |
73 |
M. J. L. Kirby Requires Authentication Unlicensed Licensed Download PDF |
93 |
A. Prekopa Requires Authentication Unlicensed Licensed Download PDF |
113 |
D. W. Walkup and R. J. B. Wets Requires Authentication Unlicensed Licensed Download PDF |
139 |
A. C. Williams Requires Authentication Unlicensed Licensed Download PDF |
163 |
PART III. INTEGER PROGRAMMING
|
|
E. Balas Requires Authentication Unlicensed Licensed Download PDF |
179 |
M. L. Balinski Requires Authentication Unlicensed Licensed Download PDF |
199 |
M. L. Balinski Requires Authentication Unlicensed Licensed Download PDF |
267 |
M. L. Balinski Requires Authentication Unlicensed Licensed Download PDF |
303 |
P. Huard Requires Authentication Unlicensed Licensed Download PDF |
313 |
G. Zoutendijk Requires Authentication Unlicensed Licensed Download PDF |
323 |
PART IV. ALGORITHMS
|
|
A. Ben-Israel Requires Authentication Unlicensed Licensed Download PDF |
339 |
H. D. Mills Requires Authentication Unlicensed Licensed Download PDF |
353 |
J. D. Roode Requires Authentication Unlicensed Licensed Download PDF |
359 |
PART V. APPLICATIONS
|
|
P. Bod Requires Authentication Unlicensed Licensed Download PDF |
367 |
A. Charnes and K. Kortanek Requires Authentication Unlicensed Licensed Download PDF |
377 |
A. J. Hoffman and T. J. Rivlin Requires Authentication Unlicensed Licensed Download PDF |
391 |
D. McFadden Requires Authentication Unlicensed Licensed Download PDF |
403 |
O. L. Mangasarian Requires Authentication Unlicensed Licensed Download PDF |
429 |
E. L. Peterson and J. G. Ecker Requires Authentication Unlicensed Licensed Download PDF |
445 |
R. T. Rockafellar Requires Authentication Unlicensed Licensed Download PDF |
481 |
PART VII. NONLINEAR PROGRAMMING
|
|
A. R. Colville Requires Authentication Unlicensed Licensed Download PDF |
487 |
V. De Angelis Requires Authentication Unlicensed Licensed Download PDF |
503 |
L. Haller and I. G. T. Miller Requires Authentication Unlicensed Licensed Download PDF |
511 |
G. Home and G. S. Tracz Requires Authentication Unlicensed Licensed Download PDF |
523 |
G. Zoutendijk Requires Authentication Unlicensed Licensed Download PDF |
539 |
PART VIII. PIVOTAL METHODS
|
|
R.W. Cottle, G.J. Habetler and C.E. Lemke Requires Authentication Unlicensed Licensed Download PDF |
551 |
T. D. Parsons Requires Authentication Unlicensed Licensed Download PDF |
567 |
A.W. Tucker Requires Authentication Unlicensed Licensed Download PDF |
583 |
PART IX. ABSTRACTS
|
|
R. Beals and T. C. Koopmans Requires Authentication Unlicensed Licensed Download PDF |
591 |
V. E. Benes Requires Authentication Unlicensed Licensed Download PDF |
591 |
G. E. Blau and D. J. Wilde Requires Authentication Unlicensed Licensed Download PDF |
591 |
C. P. Bruter Requires Authentication Unlicensed Licensed Download PDF |
592 |
G. Casale Requires Authentication Unlicensed Licensed Download PDF |
592 |
R. E. Cline and L. D. Pyle Requires Authentication Unlicensed Licensed Download PDF |
593 |
M. Courtillot Requires Authentication Unlicensed Licensed Download PDF |
594 |
W. P. Drews and R. G. Segers Requires Authentication Unlicensed Licensed Download PDF |
594 |
R. J. Duff and E. L. Peterson Requires Authentication Unlicensed Licensed Download PDF |
595 |
A. V. Fiacco and G. P. McCormick Requires Authentication Unlicensed Licensed Download PDF |
595 |
O. I. Franksen Requires Authentication Unlicensed Licensed Download PDF |
595 |
D. R. Fulkerson Requires Authentication Unlicensed Licensed Download PDF |
596 |
A. M. Geoffrion Requires Authentication Unlicensed Licensed Download PDF |
596 |
R. L. Graves Requires Authentication Unlicensed Licensed Download PDF |
597 |
M. Guignard Requires Authentication Unlicensed Licensed Download PDF |
597 |
H. Halkin Requires Authentication Unlicensed Licensed Download PDF |
599 |
D. W. Hallene Requires Authentication Unlicensed Licensed Download PDF |
600 |
C. A. Haverly Requires Authentication Unlicensed Licensed Download PDF |
600 |
J. R. Hemsley Requires Authentication Unlicensed Licensed Download PDF |
601 |
T. C. Hu Requires Authentication Unlicensed Licensed Download PDF |
601 |
E. L. Johnson, J. Edmonds and S. C. Lockhart Requires Authentication Unlicensed Licensed Download PDF |
601 |
A. K. Klevorick Requires Authentication Unlicensed Licensed Download PDF |
602 |
J. P. Kohli and F. W. Leavitt Requires Authentication Unlicensed Licensed Download PDF |
603 |
T. O. M. Kronsjo Requires Authentication Unlicensed Licensed Download PDF |
603 |
L. S. Lasdon and A. D. Waren Requires Authentication Unlicensed Licensed Download PDF |
605 |
V. J. Law and R. H. Fariss Requires Authentication Unlicensed Licensed Download PDF |
606 |
C. E. Lemke and R. W. Cottle Requires Authentication Unlicensed Licensed Download PDF |
607 |
J. Moravek Requires Authentication Unlicensed Licensed Download PDF |
608 |
W. Murray Requires Authentication Unlicensed Licensed Download PDF |
608 |
V. Nalbandian Requires Authentication Unlicensed Licensed Download PDF |
609 |
W. Orchard-Hays Requires Authentication Unlicensed Licensed Download PDF |
610 |
L. D. Pyle and D. K. Smith Requires Authentication Unlicensed Licensed Download PDF |
611 |
J. B. Rosen Requires Authentication Unlicensed Licensed Download PDF |
612 |
R. M. Saunders and R. Schinzinger Requires Authentication Unlicensed Licensed Download PDF |
612 |
L. E. Schwartz Requires Authentication Unlicensed Licensed Download PDF |
613 |
D. F. Shanno Requires Authentication Unlicensed Licensed Download PDF |
613 |
J . W. Suurballe Requires Authentication Unlicensed Licensed Download PDF |
614 |
D. Tabak Requires Authentication Unlicensed Licensed Download PDF |
615 |
G. L. Thompson Requires Authentication Unlicensed Licensed Download PDF |
616 |
J. K. Thurber Requires Authentication Unlicensed Licensed Download PDF |
616 |
C. A. Trauth and R. E. D. Woolsey Requires Authentication Unlicensed Licensed Download PDF |
616 |
W. F. Tyndall Requires Authentication Unlicensed Licensed Download PDF |
617 |
E. Valensi Requires Authentication Unlicensed Licensed Download PDF |
617 |
R. J. -B. Wets and C. Witzgall Requires Authentication Unlicensed Licensed Download PDF |
618 |
L. B. Willner Requires Authentication Unlicensed Licensed Download PDF |
619 |
R. D. Young Requires Authentication Unlicensed Licensed Download PDF |
619 |
W. I. Zangwill Requires Authentication Unlicensed Licensed Download PDF |
620 |